diff --git a/openapi-specs/compute/30-03/desc/SCAP/get.md b/openapi-specs/compute/30-03/desc/SCAP/get.md index a25abe94e..f5870d822 100644 --- a/openapi-specs/compute/30-03/desc/SCAP/get.md +++ b/openapi-specs/compute/30-03/desc/SCAP/get.md @@ -3,7 +3,7 @@ This endpoint will return any SCAP datastreams uploaded to the console. This end The following is an example curl command that uses basic auth to retrieve any uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/SCAP/id_delete.md b/openapi-specs/compute/30-03/desc/SCAP/id_delete.md index 39f1b0132..52923f20a 100644 --- a/openapi-specs/compute/30-03/desc/SCAP/id_delete.md +++ b/openapi-specs/compute/30-03/desc/SCAP/id_delete.md @@ -3,7 +3,7 @@ This endpoint will delete any SCAP datastreams uploaded to the console. You can The following is an example curl command that uses basic auth to delete an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/30-03/desc/SCAP/post.md b/openapi-specs/compute/30-03/desc/SCAP/post.md index d459a0e97..c45fd6b4e 100644 --- a/openapi-specs/compute/30-03/desc/SCAP/post.md +++ b/openapi-specs/compute/30-03/desc/SCAP/post.md @@ -3,7 +3,7 @@ This endpoint will allow you to add a SCAP datastream to the console. The following is an example curl command that uses basic auth to add an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/_ping/get.md b/openapi-specs/compute/30-03/desc/_ping/get.md index 8e143ef67..b7ffdc653 100644 --- a/openapi-specs/compute/30-03/desc/_ping/get.md +++ b/openapi-specs/compute/30-03/desc/_ping/get.md @@ -5,7 +5,7 @@ Checks if Console is reachable from your network host. Refer to the following cURL example command that pings Console and prints the HTTP response code: ```bash -$ curl -k \ +$ curl \ -s \ -o /dev/null \ -w "%{http_code}\n" \ diff --git a/openapi-specs/compute/30-03/desc/agentless/get_agentless_progress.md b/openapi-specs/compute/30-03/desc/agentless/get_agentless_progress.md index b98ed9da5..78396eec6 100644 --- a/openapi-specs/compute/30-03/desc/agentless/get_agentless_progress.md +++ b/openapi-specs/compute/30-03/desc/agentless/get_agentless_progress.md @@ -5,7 +5,7 @@ Shows the progress of an ongoing scan on hosts or containers for vulnerabilities Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/agentless/post_agentless_scan.md b/openapi-specs/compute/30-03/desc/agentless/post_agentless_scan.md index f1295cdc4..e2f8a4e11 100644 --- a/openapi-specs/compute/30-03/desc/agentless/post_agentless_scan.md +++ b/openapi-specs/compute/30-03/desc/agentless/post_agentless_scan.md @@ -9,7 +9,7 @@ Make sure that you download (use the agentless/templates API) and apply the perm Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/agentless/post_agentless_stop.md b/openapi-specs/compute/30-03/desc/agentless/post_agentless_stop.md index ab83960cc..ddee6ec7a 100644 --- a/openapi-specs/compute/30-03/desc/agentless/post_agentless_stop.md +++ b/openapi-specs/compute/30-03/desc/agentless/post_agentless_stop.md @@ -5,7 +5,7 @@ Stops an ongoing scan on hosts or containers for vulnerabilities and compliance. Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/agentless/post_agentless_templates.md b/openapi-specs/compute/30-03/desc/agentless/post_agentless_templates.md index 96be32555..5159c439a 100644 --- a/openapi-specs/compute/30-03/desc/agentless/post_agentless_templates.md +++ b/openapi-specs/compute/30-03/desc/agentless/post_agentless_templates.md @@ -31,7 +31,7 @@ Add the supported cloud accounts (AWS, Azure, GCP, and OCI) in Prisma Cloud Comp Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/alert-profiles/get.md b/openapi-specs/compute/30-03/desc/alert-profiles/get.md index 82647e248..f17191ac4 100644 --- a/openapi-specs/compute/30-03/desc/alert-profiles/get.md +++ b/openapi-specs/compute/30-03/desc/alert-profiles/get.md @@ -3,7 +3,7 @@ Retrieve a list of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/alert-profiles/id_delete.md b/openapi-specs/compute/30-03/desc/alert-profiles/id_delete.md index 1a67fe20e..2cf21b57e 100644 --- a/openapi-specs/compute/30-03/desc/alert-profiles/id_delete.md +++ b/openapi-specs/compute/30-03/desc/alert-profiles/id_delete.md @@ -5,7 +5,7 @@ This method has no response data. The following example curl command deletes an existing alert profile named `PROFILE-NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/30-03/desc/alert-profiles/names_get.md b/openapi-specs/compute/30-03/desc/alert-profiles/names_get.md index cac14437b..38a1f78ca 100644 --- a/openapi-specs/compute/30-03/desc/alert-profiles/names_get.md +++ b/openapi-specs/compute/30-03/desc/alert-profiles/names_get.md @@ -3,7 +3,7 @@ Retrieve a list of only the names of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles' names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/alert-profiles/post.md b/openapi-specs/compute/30-03/desc/alert-profiles/post.md index 9fa643429..19db863d5 100644 --- a/openapi-specs/compute/30-03/desc/alert-profiles/post.md +++ b/openapi-specs/compute/30-03/desc/alert-profiles/post.md @@ -3,7 +3,7 @@ Update an existing alert profile created in the system. The following example curl command uses basic auth to add a Jira Alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/alert-profiles/test_post.md b/openapi-specs/compute/30-03/desc/alert-profiles/test_post.md index 1fc745efa..2205a6e73 100644 --- a/openapi-specs/compute/30-03/desc/alert-profiles/test_post.md +++ b/openapi-specs/compute/30-03/desc/alert-profiles/test_post.md @@ -3,7 +3,7 @@ Sends a test alert to verify successful configuration of the alert profile setti The following example curl command uses basic auth to send test alert for an email alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/audits/access_delete.md b/openapi-specs/compute/30-03/desc/audits/access_delete.md index 37f33ca64..0450b534c 100644 --- a/openapi-specs/compute/30-03/desc/audits/access_delete.md +++ b/openapi-specs/compute/30-03/desc/audits/access_delete.md @@ -2,7 +2,7 @@ Deletes **all** access audits. This deletion cannot be undone. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/30-03/desc/audits/access_download_get.md b/openapi-specs/compute/30-03/desc/audits/access_download_get.md index 1700deb8d..8d8fee259 100644 --- a/openapi-specs/compute/30-03/desc/audits/access_download_get.md +++ b/openapi-specs/compute/30-03/desc/audits/access_download_get.md @@ -3,7 +3,7 @@ Returns the docker access audit events data in CSV format that are logged and ag **Note**: You can download the access events from Console under **Monitor > Events > Docker audits > Download CSV**. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/access_filters_get.md b/openapi-specs/compute/30-03/desc/audits/access_filters_get.md index 00ac061c1..4b8e9cd9b 100644 --- a/openapi-specs/compute/30-03/desc/audits/access_filters_get.md +++ b/openapi-specs/compute/30-03/desc/audits/access_filters_get.md @@ -5,7 +5,7 @@ The following example uses basic auth to list history of commands that are run o ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ The following command gives list of sudo events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -27,7 +27,7 @@ $ curl -k \ The following command gives list of SSHD events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/access_get.md b/openapi-specs/compute/30-03/desc/audits/access_get.md index 2401391c7..56e53fe12 100644 --- a/openapi-specs/compute/30-03/desc/audits/access_get.md +++ b/openapi-specs/compute/30-03/desc/audits/access_get.md @@ -8,7 +8,7 @@ You can configure Prisma Cloud Compute to log and aggregate events such as sudo Refer to the following example cURL command that gives a list of all access audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/admission_download_get.md b/openapi-specs/compute/30-03/desc/audits/admission_download_get.md index 9571c483f..d45f47c4e 100644 --- a/openapi-specs/compute/30-03/desc/audits/admission_download_get.md +++ b/openapi-specs/compute/30-03/desc/audits/admission_download_get.md @@ -4,7 +4,7 @@ Returns the access admission events data in CSV format that were alerted or bloc Refer to the following example cURL command that downloads the admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/admission_get.md b/openapi-specs/compute/30-03/desc/audits/admission_get.md index 84414496c..3640c737c 100644 --- a/openapi-specs/compute/30-03/desc/audits/admission_get.md +++ b/openapi-specs/compute/30-03/desc/audits/admission_get.md @@ -4,7 +4,7 @@ Returns all activities that were alerted or blocked by Defender functioning as O Refer to the following example cURL command that gives a list of all admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/firewall_network_container_download_get.md b/openapi-specs/compute/30-03/desc/audits/firewall_network_container_download_get.md index 29029ac6d..434e09acd 100644 --- a/openapi-specs/compute/30-03/desc/audits/firewall_network_container_download_get.md +++ b/openapi-specs/compute/30-03/desc/audits/firewall_network_container_download_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/firewall_network_container_get.md b/openapi-specs/compute/30-03/desc/audits/firewall_network_container_get.md index 454558a44..be03b2c45 100644 --- a/openapi-specs/compute/30-03/desc/audits/firewall_network_container_get.md +++ b/openapi-specs/compute/30-03/desc/audits/firewall_network_container_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/firewall_network_host_download_get.md b/openapi-specs/compute/30-03/desc/audits/firewall_network_host_download_get.md index 768dd00d7..e83e8e1c3 100644 --- a/openapi-specs/compute/30-03/desc/audits/firewall_network_host_download_get.md +++ b/openapi-specs/compute/30-03/desc/audits/firewall_network_host_download_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/firewall_network_host_get.md b/openapi-specs/compute/30-03/desc/audits/firewall_network_host_get.md index e5dc4c399..6cbda0d4b 100644 --- a/openapi-specs/compute/30-03/desc/audits/firewall_network_host_get.md +++ b/openapi-specs/compute/30-03/desc/audits/firewall_network_host_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/incidents_archive_patch.md b/openapi-specs/compute/30-03/desc/audits/incidents_archive_patch.md index a1127a001..d1f42eedd 100644 --- a/openapi-specs/compute/30-03/desc/audits/incidents_archive_patch.md +++ b/openapi-specs/compute/30-03/desc/audits/incidents_archive_patch.md @@ -7,7 +7,7 @@ You can get an incident ID from the list of incidents using the endpoint GET /ap Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/compute/30-03/desc/audits/incidents_download_get.md b/openapi-specs/compute/30-03/desc/audits/incidents_download_get.md index 2266c3471..5958756bf 100644 --- a/openapi-specs/compute/30-03/desc/audits/incidents_download_get.md +++ b/openapi-specs/compute/30-03/desc/audits/incidents_download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the **CSV** hyperlink in **Monitor > Runtime > Incident ex The following cURL command downloads all incidents and saves the result in a CSV file called `incidents.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/incidents_filters_get.md b/openapi-specs/compute/30-03/desc/audits/incidents_filters_get.md index 7d1c6f303..856881c90 100644 --- a/openapi-specs/compute/30-03/desc/audits/incidents_filters_get.md +++ b/openapi-specs/compute/30-03/desc/audits/incidents_filters_get.md @@ -3,7 +3,7 @@ This endpoint lists the incident categories found in your environment. The following example lists incident filters. ```bash -$ curl -k \ +$ curl \ -u \ https://console:8083/api/v1/audits/incidents/filters ``` diff --git a/openapi-specs/compute/30-03/desc/audits/incidents_get.md b/openapi-specs/compute/30-03/desc/audits/incidents_get.md index 7724a08c1..9b9451821 100644 --- a/openapi-specs/compute/30-03/desc/audits/incidents_get.md +++ b/openapi-specs/compute/30-03/desc/audits/incidents_get.md @@ -9,7 +9,7 @@ This endpoint maps to the table in **Monitor > Runtime > Incident explorer** in Refer to the following example cURL command that retrieves a list of unacknowledged incidents (not in the archived state): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/kubernetes_download_get.md b/openapi-specs/compute/30-03/desc/audits/kubernetes_download_get.md index 6008bd92a..62992095c 100644 --- a/openapi-specs/compute/30-03/desc/audits/kubernetes_download_get.md +++ b/openapi-specs/compute/30-03/desc/audits/kubernetes_download_get.md @@ -7,7 +7,7 @@ Returns the audit events data that occur in an integrated Kubernetes cluster tha Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/kubernetes_get.md b/openapi-specs/compute/30-03/desc/audits/kubernetes_get.md index e1ecb8a88..2e3f51b71 100644 --- a/openapi-specs/compute/30-03/desc/audits/kubernetes_get.md +++ b/openapi-specs/compute/30-03/desc/audits/kubernetes_get.md @@ -7,7 +7,7 @@ Retrieves events that occur in an integrated Kubernetes cluster that you configu Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/mgmt_download_get.md b/openapi-specs/compute/30-03/desc/audits/mgmt_download_get.md index ae3ef45b6..bcee17342 100644 --- a/openapi-specs/compute/30-03/desc/audits/mgmt_download_get.md +++ b/openapi-specs/compute/30-03/desc/audits/mgmt_download_get.md @@ -10,7 +10,7 @@ Management audits are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/mgmt_filters_get.md b/openapi-specs/compute/30-03/desc/audits/mgmt_filters_get.md index 854977b99..f910a4c2a 100644 --- a/openapi-specs/compute/30-03/desc/audits/mgmt_filters_get.md +++ b/openapi-specs/compute/30-03/desc/audits/mgmt_filters_get.md @@ -6,7 +6,7 @@ Use these filters to query management audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/mgmt_get.md b/openapi-specs/compute/30-03/desc/audits/mgmt_get.md index 5b586cb5e..abe802348 100644 --- a/openapi-specs/compute/30-03/desc/audits/mgmt_get.md +++ b/openapi-specs/compute/30-03/desc/audits/mgmt_get.md @@ -10,7 +10,7 @@ Management audit events are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/runtime_app_embedded_download_get.md b/openapi-specs/compute/30-03/desc/audits/runtime_app_embedded_download_get.md index f3d844ead..ec5ae0f2a 100644 --- a/openapi-specs/compute/30-03/desc/audits/runtime_app_embedded_download_get.md +++ b/openapi-specs/compute/30-03/desc/audits/runtime_app_embedded_download_get.md @@ -5,7 +5,7 @@ Returns the app-embedded runtime audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/runtime_app_embedded_get.md b/openapi-specs/compute/30-03/desc/audits/runtime_app_embedded_get.md index c1d72acfa..51a43b7f5 100644 --- a/openapi-specs/compute/30-03/desc/audits/runtime_app_embedded_get.md +++ b/openapi-specs/compute/30-03/desc/audits/runtime_app_embedded_get.md @@ -5,7 +5,7 @@ Retrieves all app-embedded runtime audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/runtime_container_delete.md b/openapi-specs/compute/30-03/desc/audits/runtime_container_delete.md index ddc8e82d6..62050c71f 100644 --- a/openapi-specs/compute/30-03/desc/audits/runtime_container_delete.md +++ b/openapi-specs/compute/30-03/desc/audits/runtime_container_delete.md @@ -3,7 +3,7 @@ Deletes all container runtime audits. The following example curl command uses basic auth to delete all the audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/30-03/desc/audits/runtime_container_download_get.md b/openapi-specs/compute/30-03/desc/audits/runtime_container_download_get.md index 20e673b5e..81286d929 100644 --- a/openapi-specs/compute/30-03/desc/audits/runtime_container_download_get.md +++ b/openapi-specs/compute/30-03/desc/audits/runtime_container_download_get.md @@ -6,7 +6,7 @@ Returns the container audit events data in CSV format when a runtime sensor such Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o \ diff --git a/openapi-specs/compute/30-03/desc/audits/runtime_container_get.md b/openapi-specs/compute/30-03/desc/audits/runtime_container_get.md index 11beffb24..a6b6ba484 100644 --- a/openapi-specs/compute/30-03/desc/audits/runtime_container_get.md +++ b/openapi-specs/compute/30-03/desc/audits/runtime_container_get.md @@ -7,7 +7,7 @@ Retrieves all container audit events when a runtime sensor such as process, netw Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/runtime_container_timeslice_get.md b/openapi-specs/compute/30-03/desc/audits/runtime_container_timeslice_get.md index f65d477af..01df48f28 100644 --- a/openapi-specs/compute/30-03/desc/audits/runtime_container_timeslice_get.md +++ b/openapi-specs/compute/30-03/desc/audits/runtime_container_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/runtime_file-integrity_download_get.md b/openapi-specs/compute/30-03/desc/audits/runtime_file-integrity_download_get.md index 99ec70c52..234c3ce32 100644 --- a/openapi-specs/compute/30-03/desc/audits/runtime_file-integrity_download_get.md +++ b/openapi-specs/compute/30-03/desc/audits/runtime_file-integrity_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for file-integrity checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/runtime_file-integrity_get.md b/openapi-specs/compute/30-03/desc/audits/runtime_file-integrity_get.md index 53fec9f9f..c31904422 100644 --- a/openapi-specs/compute/30-03/desc/audits/runtime_file-integrity_get.md +++ b/openapi-specs/compute/30-03/desc/audits/runtime_file-integrity_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for file-integrity checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/runtime_host_delete.md b/openapi-specs/compute/30-03/desc/audits/runtime_host_delete.md index 0ab1c877e..2ada9b15a 100644 --- a/openapi-specs/compute/30-03/desc/audits/runtime_host_delete.md +++ b/openapi-specs/compute/30-03/desc/audits/runtime_host_delete.md @@ -3,7 +3,7 @@ Deletes all host audits from the database. The following example curl command uses basic auth to delete all host audits: ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/audits/runtime/host diff --git a/openapi-specs/compute/30-03/desc/audits/runtime_host_download_get.md b/openapi-specs/compute/30-03/desc/audits/runtime_host_download_get.md index 4d0454f56..d85cc39d0 100644 --- a/openapi-specs/compute/30-03/desc/audits/runtime_host_download_get.md +++ b/openapi-specs/compute/30-03/desc/audits/runtime_host_download_get.md @@ -5,7 +5,7 @@ Returns the runtime host audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/runtime_host_get.md b/openapi-specs/compute/30-03/desc/audits/runtime_host_get.md index 044b8b42d..e063550d6 100644 --- a/openapi-specs/compute/30-03/desc/audits/runtime_host_get.md +++ b/openapi-specs/compute/30-03/desc/audits/runtime_host_get.md @@ -5,7 +5,7 @@ Retrieves the runtime host audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/runtime_host_timeslice_get.md b/openapi-specs/compute/30-03/desc/audits/runtime_host_timeslice_get.md index 8933efa74..aafd869b8 100644 --- a/openapi-specs/compute/30-03/desc/audits/runtime_host_timeslice_get.md +++ b/openapi-specs/compute/30-03/desc/audits/runtime_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/runtime_log-inspection_download_get.md b/openapi-specs/compute/30-03/desc/audits/runtime_log-inspection_download_get.md index f047ed96f..0aa1a5710 100644 --- a/openapi-specs/compute/30-03/desc/audits/runtime_log-inspection_download_get.md +++ b/openapi-specs/compute/30-03/desc/audits/runtime_log-inspection_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for log inspection checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/runtime_log-inspection_get.md b/openapi-specs/compute/30-03/desc/audits/runtime_log-inspection_get.md index 49f0d7be4..8292b623e 100644 --- a/openapi-specs/compute/30-03/desc/audits/runtime_log-inspection_get.md +++ b/openapi-specs/compute/30-03/desc/audits/runtime_log-inspection_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for log inspection checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/runtime_rasp_delete.md b/openapi-specs/compute/30-03/desc/audits/runtime_rasp_delete.md index 688e04038..14315c55b 100644 --- a/openapi-specs/compute/30-03/desc/audits/runtime_rasp_delete.md +++ b/openapi-specs/compute/30-03/desc/audits/runtime_rasp_delete.md @@ -1,7 +1,7 @@ Deletes all RASP Defender runtime audits. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/30-03/desc/audits/runtime_rasp_download_get.md b/openapi-specs/compute/30-03/desc/audits/runtime_rasp_download_get.md index 303c75858..11a85100d 100644 --- a/openapi-specs/compute/30-03/desc/audits/runtime_rasp_download_get.md +++ b/openapi-specs/compute/30-03/desc/audits/runtime_rasp_download_get.md @@ -1,7 +1,7 @@ Returns CSV data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/runtime_rasp_get.md b/openapi-specs/compute/30-03/desc/audits/runtime_rasp_get.md index 229d908b1..0475cb149 100644 --- a/openapi-specs/compute/30-03/desc/audits/runtime_rasp_get.md +++ b/openapi-specs/compute/30-03/desc/audits/runtime_rasp_get.md @@ -1,7 +1,7 @@ Returns JSON data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/runtime_serverless_delete.md b/openapi-specs/compute/30-03/desc/audits/runtime_serverless_delete.md index 99ada0515..e27ebe858 100644 --- a/openapi-specs/compute/30-03/desc/audits/runtime_serverless_delete.md +++ b/openapi-specs/compute/30-03/desc/audits/runtime_serverless_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to delete the current audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/30-03/desc/audits/runtime_serverless_download_get.md b/openapi-specs/compute/30-03/desc/audits/runtime_serverless_download_get.md index f829d2342..91693c145 100644 --- a/openapi-specs/compute/30-03/desc/audits/runtime_serverless_download_get.md +++ b/openapi-specs/compute/30-03/desc/audits/runtime_serverless_download_get.md @@ -5,7 +5,7 @@ Returns the scan audit events data in CSV format for any configured serverless f Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/runtime_serverless_filters_get.md b/openapi-specs/compute/30-03/desc/audits/runtime_serverless_filters_get.md index b9bf38610..babda78dd 100644 --- a/openapi-specs/compute/30-03/desc/audits/runtime_serverless_filters_get.md +++ b/openapi-specs/compute/30-03/desc/audits/runtime_serverless_filters_get.md @@ -2,7 +2,7 @@ Returns all serverless filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/runtime_serverless_get.md b/openapi-specs/compute/30-03/desc/audits/runtime_serverless_get.md index 045946886..f6aeb748e 100644 --- a/openapi-specs/compute/30-03/desc/audits/runtime_serverless_get.md +++ b/openapi-specs/compute/30-03/desc/audits/runtime_serverless_get.md @@ -5,7 +5,7 @@ Retrieves all scan events for any configured serverless functions in Prisma Clou Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/runtime_serverless_timeslice_get.md b/openapi-specs/compute/30-03/desc/audits/runtime_serverless_timeslice_get.md index 863890174..a2456cec0 100644 --- a/openapi-specs/compute/30-03/desc/audits/runtime_serverless_timeslice_get.md +++ b/openapi-specs/compute/30-03/desc/audits/runtime_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/trust_delete.md b/openapi-specs/compute/30-03/desc/audits/trust_delete.md index 0bfb2bd81..4aaeef3fe 100644 --- a/openapi-specs/compute/30-03/desc/audits/trust_delete.md +++ b/openapi-specs/compute/30-03/desc/audits/trust_delete.md @@ -1,7 +1,7 @@ Deletes all the trust audits from the events page in Console. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/30-03/desc/audits/trust_download_get.md b/openapi-specs/compute/30-03/desc/audits/trust_download_get.md index 21c0e55a2..234089449 100644 --- a/openapi-specs/compute/30-03/desc/audits/trust_download_get.md +++ b/openapi-specs/compute/30-03/desc/audits/trust_download_get.md @@ -5,7 +5,7 @@ Returns the trust audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/trust_get.md b/openapi-specs/compute/30-03/desc/audits/trust_get.md index 8fb3a341d..de7d47e96 100644 --- a/openapi-specs/compute/30-03/desc/audits/trust_get.md +++ b/openapi-specs/compute/30-03/desc/audits/trust_get.md @@ -4,7 +4,7 @@ Retrieves all the trust audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/waas_agentless_download_get.md b/openapi-specs/compute/30-03/desc/audits/waas_agentless_download_get.md index bbfcd12f5..f930ef6b3 100644 --- a/openapi-specs/compute/30-03/desc/audits/waas_agentless_download_get.md +++ b/openapi-specs/compute/30-03/desc/audits/waas_agentless_download_get.md @@ -7,7 +7,7 @@ Returns the agentless Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/waas_agentless_get.md b/openapi-specs/compute/30-03/desc/audits/waas_agentless_get.md index ad40ae497..b257b0385 100644 --- a/openapi-specs/compute/30-03/desc/audits/waas_agentless_get.md +++ b/openapi-specs/compute/30-03/desc/audits/waas_agentless_get.md @@ -7,7 +7,7 @@ Retrieves all agentless Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/waas_agentless_timeslice_get.md b/openapi-specs/compute/30-03/desc/audits/waas_agentless_timeslice_get.md index 007c6dba3..3eaf34b25 100644 --- a/openapi-specs/compute/30-03/desc/audits/waas_agentless_timeslice_get.md +++ b/openapi-specs/compute/30-03/desc/audits/waas_agentless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/waas_app_embedded_download_get.md b/openapi-specs/compute/30-03/desc/audits/waas_app_embedded_download_get.md index 149c10376..c94aa87b0 100644 --- a/openapi-specs/compute/30-03/desc/audits/waas_app_embedded_download_get.md +++ b/openapi-specs/compute/30-03/desc/audits/waas_app_embedded_download_get.md @@ -6,7 +6,7 @@ Returns the app-embedded WAAS audit events data in CSV format for the specified Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/waas_app_embedded_get.md b/openapi-specs/compute/30-03/desc/audits/waas_app_embedded_get.md index 400fa447d..6318fb299 100644 --- a/openapi-specs/compute/30-03/desc/audits/waas_app_embedded_get.md +++ b/openapi-specs/compute/30-03/desc/audits/waas_app_embedded_get.md @@ -6,7 +6,7 @@ Returns all app-embedded WAAS audit events for the specified query parameters. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/waas_app_embedded_timeslice_get.md b/openapi-specs/compute/30-03/desc/audits/waas_app_embedded_timeslice_get.md index 79a60038e..42a76d08c 100644 --- a/openapi-specs/compute/30-03/desc/audits/waas_app_embedded_timeslice_get.md +++ b/openapi-specs/compute/30-03/desc/audits/waas_app_embedded_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the app-embedded WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/waas_container_download_get.md b/openapi-specs/compute/30-03/desc/audits/waas_container_download_get.md index 9a5e04fad..7d26c34f4 100644 --- a/openapi-specs/compute/30-03/desc/audits/waas_container_download_get.md +++ b/openapi-specs/compute/30-03/desc/audits/waas_container_download_get.md @@ -6,7 +6,7 @@ Returns the container Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that downloads the WAAS container audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/waas_container_get.md b/openapi-specs/compute/30-03/desc/audits/waas_container_get.md index ac0df80fd..c1ad08f3c 100644 --- a/openapi-specs/compute/30-03/desc/audits/waas_container_get.md +++ b/openapi-specs/compute/30-03/desc/audits/waas_container_get.md @@ -6,7 +6,7 @@ Retrieves all container Web-Application and API Security (WAAS) audits. Refer to the following example cURL command that retrieves all container WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/waas_container_timeslice_get.md b/openapi-specs/compute/30-03/desc/audits/waas_container_timeslice_get.md index a56b4c48f..be56260d6 100644 --- a/openapi-specs/compute/30-03/desc/audits/waas_container_timeslice_get.md +++ b/openapi-specs/compute/30-03/desc/audits/waas_container_timeslice_get.md @@ -11,7 +11,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the container WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s):: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/waas_host_download_get.md b/openapi-specs/compute/30-03/desc/audits/waas_host_download_get.md index 4bc66202b..71692e682 100644 --- a/openapi-specs/compute/30-03/desc/audits/waas_host_download_get.md +++ b/openapi-specs/compute/30-03/desc/audits/waas_host_download_get.md @@ -7,7 +7,7 @@ Returns the host Web-Application and API Security (WAAS) audit events data in CS Refer to the following example cURL command that downloads the host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/waas_host_get.md b/openapi-specs/compute/30-03/desc/audits/waas_host_get.md index 14c967594..f6e3df050 100644 --- a/openapi-specs/compute/30-03/desc/audits/waas_host_get.md +++ b/openapi-specs/compute/30-03/desc/audits/waas_host_get.md @@ -7,7 +7,7 @@ Retrieves all host Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/waas_host_timeslice_get.md b/openapi-specs/compute/30-03/desc/audits/waas_host_timeslice_get.md index e28ed7b7a..67b3a54c3 100644 --- a/openapi-specs/compute/30-03/desc/audits/waas_host_timeslice_get.md +++ b/openapi-specs/compute/30-03/desc/audits/waas_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves host WAAS audit events for a specific time frame: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/waas_serverless_download_get.md b/openapi-specs/compute/30-03/desc/audits/waas_serverless_download_get.md index da05504df..0c0dbe698 100644 --- a/openapi-specs/compute/30-03/desc/audits/waas_serverless_download_get.md +++ b/openapi-specs/compute/30-03/desc/audits/waas_serverless_download_get.md @@ -7,7 +7,7 @@ Returns the serverless function Web-Application and API Security (WAAS) audit ev Refer to the following example cURL command that downloads the serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/waas_serverless_get.md b/openapi-specs/compute/30-03/desc/audits/waas_serverless_get.md index fe482a3f3..82488f7ee 100644 --- a/openapi-specs/compute/30-03/desc/audits/waas_serverless_get.md +++ b/openapi-specs/compute/30-03/desc/audits/waas_serverless_get.md @@ -7,7 +7,7 @@ Retrieves all serverless function Web-Application and API Security (WAAS) audit Refer to the following example cURL command that retrieves all serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/audits/waas_serverless_timeslice_get.md b/openapi-specs/compute/30-03/desc/audits/waas_serverless_timeslice_get.md index ec9ff3df1..a0a9a1368 100644 --- a/openapi-specs/compute/30-03/desc/audits/waas_serverless_timeslice_get.md +++ b/openapi-specs/compute/30-03/desc/audits/waas_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the serverless WAAS audit events for a : ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/authenticate-client/post.md b/openapi-specs/compute/30-03/desc/authenticate-client/post.md index bc493d04e..ce6f00afe 100644 --- a/openapi-specs/compute/30-03/desc/authenticate-client/post.md +++ b/openapi-specs/compute/30-03/desc/authenticate-client/post.md @@ -8,7 +8,7 @@ This endpoint checks the supplied client certificate and authorizes the user bas Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X POST \ --cert \ https:///api/v/authenticate-client diff --git a/openapi-specs/compute/30-03/desc/authenticate/post.md b/openapi-specs/compute/30-03/desc/authenticate/post.md index cb018de64..4f85c5d34 100644 --- a/openapi-specs/compute/30-03/desc/authenticate/post.md +++ b/openapi-specs/compute/30-03/desc/authenticate/post.md @@ -9,7 +9,7 @@ You can set the validity period in Console under **Manage > Authentication > Log Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H "Content-Type: application/json" \ -X POST \ -d \ diff --git a/openapi-specs/compute/30-03/desc/authenticate/renew_get.md b/openapi-specs/compute/30-03/desc/authenticate/renew_get.md index 6040d58e1..3458b500a 100644 --- a/openapi-specs/compute/30-03/desc/authenticate/renew_get.md +++ b/openapi-specs/compute/30-03/desc/authenticate/renew_get.md @@ -5,7 +5,7 @@ Renews an old (unexpired) access token and returns a new token. The following cURL command retrieves a new access token using an old access token. ```bash -$ curl -k \ +$ curl \ -H "Authorization: Bearer " \ https:///api/v1/authenticate/renew ``` diff --git a/openapi-specs/compute/30-03/desc/certs/capem_get.md b/openapi-specs/compute/30-03/desc/certs/capem_get.md index f0f0f1bf3..945476c9b 100644 --- a/openapi-specs/compute/30-03/desc/certs/capem_get.md +++ b/openapi-specs/compute/30-03/desc/certs/capem_get.md @@ -5,7 +5,7 @@ Retrieves the Base64-encoded SSL root certificate self-signed by primary certifi Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/certs/client-certs_get.md b/openapi-specs/compute/30-03/desc/certs/client-certs_get.md index d099b3e3d..279d196b1 100644 --- a/openapi-specs/compute/30-03/desc/certs/client-certs_get.md +++ b/openapi-specs/compute/30-03/desc/certs/client-certs_get.md @@ -3,7 +3,7 @@ Downloads a script that installs a client certificate, client private key, and c The following example curl command uses basic auth to download and run the install script for your client certs: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/certs/client-certs.sh | sh diff --git a/openapi-specs/compute/30-03/desc/certs/server-certs_get.md b/openapi-specs/compute/30-03/desc/certs/server-certs_get.md index 0bb13f51d..118a4d9b0 100644 --- a/openapi-specs/compute/30-03/desc/certs/server-certs_get.md +++ b/openapi-specs/compute/30-03/desc/certs/server-certs_get.md @@ -12,7 +12,7 @@ Retrieves the server certificate bundle from Prisma Cloud Compute that contains Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -u \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/cloud/compliance_download_get.md b/openapi-specs/compute/30-03/desc/cloud/compliance_download_get.md index 7b1ec9fea..14f2725b1 100644 --- a/openapi-specs/compute/30-03/desc/cloud/compliance_download_get.md +++ b/openapi-specs/compute/30-03/desc/cloud/compliance_download_get.md @@ -2,7 +2,7 @@ Download all cloud scan data in CSV format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/cloud/compliance_get.md b/openapi-specs/compute/30-03/desc/cloud/compliance_get.md index 48c2fe5bb..ad47e0998 100644 --- a/openapi-specs/compute/30-03/desc/cloud/compliance_get.md +++ b/openapi-specs/compute/30-03/desc/cloud/compliance_get.md @@ -2,7 +2,7 @@ Returns a list of all cloud compliance scan results. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/cloud/compliance_scan_post.md b/openapi-specs/compute/30-03/desc/cloud/compliance_scan_post.md index 7f87bf1f4..7321c3b9d 100644 --- a/openapi-specs/compute/30-03/desc/cloud/compliance_scan_post.md +++ b/openapi-specs/compute/30-03/desc/cloud/compliance_scan_post.md @@ -2,7 +2,7 @@ Initiates a new cloud compliance scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/cloud/compliance_stop_post.md b/openapi-specs/compute/30-03/desc/cloud/compliance_stop_post.md index df0febb56..60c31dc51 100644 --- a/openapi-specs/compute/30-03/desc/cloud/compliance_stop_post.md +++ b/openapi-specs/compute/30-03/desc/cloud/compliance_stop_post.md @@ -2,7 +2,7 @@ Terminates a cloud compliance scan that's in progress.. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/cloud/discovery_download_get.md b/openapi-specs/compute/30-03/desc/cloud/discovery_download_get.md index 44d60a113..a667c8471 100644 --- a/openapi-specs/compute/30-03/desc/cloud/discovery_download_get.md +++ b/openapi-specs/compute/30-03/desc/cloud/discovery_download_get.md @@ -5,7 +5,7 @@ Downloads all cloud scan data in a CSV file. Refer to the following cURL example command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/cloud/discovery_entities_get.md b/openapi-specs/compute/30-03/desc/cloud/discovery_entities_get.md index a7abbdfb6..85f1be971 100644 --- a/openapi-specs/compute/30-03/desc/cloud/discovery_entities_get.md +++ b/openapi-specs/compute/30-03/desc/cloud/discovery_entities_get.md @@ -7,7 +7,7 @@ Use this API endpoint along with the `GET, api/vVERSION/cloud/discovery` to get Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/cloud/discovery_get.md b/openapi-specs/compute/30-03/desc/cloud/discovery_get.md index 28025f140..c2b4c6e3c 100644 --- a/openapi-specs/compute/30-03/desc/cloud/discovery_get.md +++ b/openapi-specs/compute/30-03/desc/cloud/discovery_get.md @@ -8,7 +8,7 @@ Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/cloud/discovery_scan_post.md b/openapi-specs/compute/30-03/desc/cloud/discovery_scan_post.md index 51799ebdb..0717096f8 100644 --- a/openapi-specs/compute/30-03/desc/cloud/discovery_scan_post.md +++ b/openapi-specs/compute/30-03/desc/cloud/discovery_scan_post.md @@ -5,7 +5,7 @@ Initiates a new cloud discovery scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/cloud/discovery_stop_post.md b/openapi-specs/compute/30-03/desc/cloud/discovery_stop_post.md index 6a6c7a5a5..73dbf46e7 100644 --- a/openapi-specs/compute/30-03/desc/cloud/discovery_stop_post.md +++ b/openapi-specs/compute/30-03/desc/cloud/discovery_stop_post.md @@ -5,7 +5,7 @@ Terminates a cloud discovery scan that's in progress. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/cloud/discovery_vms_get.md b/openapi-specs/compute/30-03/desc/cloud/discovery_vms_get.md index 6766f4e5a..2264a27fe 100644 --- a/openapi-specs/compute/30-03/desc/cloud/discovery_vms_get.md +++ b/openapi-specs/compute/30-03/desc/cloud/discovery_vms_get.md @@ -5,7 +5,7 @@ Returns the discovered cloud VM instances. Refer to the following example cURL command that retrieves all the discovered cloud VM instances: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/coderepos/download_get.md b/openapi-specs/compute/30-03/desc/coderepos/download_get.md index 4ec0197bb..b06dd9f17 100644 --- a/openapi-specs/compute/30-03/desc/coderepos/download_get.md +++ b/openapi-specs/compute/30-03/desc/coderepos/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Code re The following cURL command generates a CSV file containing the reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/coderepos/get.md b/openapi-specs/compute/30-03/desc/coderepos/get.md index 54c4e99bf..42dc16fb6 100644 --- a/openapi-specs/compute/30-03/desc/coderepos/get.md +++ b/openapi-specs/compute/30-03/desc/coderepos/get.md @@ -10,7 +10,7 @@ This endpoint maps to the **Code repositories** table in **Monitor > Vulnerabili The following cURL command retrieves all code repository scan reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/collections/get.md b/openapi-specs/compute/30-03/desc/collections/get.md index 99120d17d..5a9e8a50c 100755 --- a/openapi-specs/compute/30-03/desc/collections/get.md +++ b/openapi-specs/compute/30-03/desc/collections/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table in **Manage > Collections and Tags > Collections Refer to the following example cURL command that returns a list of collections: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/collections/name_delete.md b/openapi-specs/compute/30-03/desc/collections/name_delete.md index 3e2debd01..033358000 100755 --- a/openapi-specs/compute/30-03/desc/collections/name_delete.md +++ b/openapi-specs/compute/30-03/desc/collections/name_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that deletes a collection with the name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/30-03/desc/collections/name_usages_get.md b/openapi-specs/compute/30-03/desc/collections/name_usages_get.md index 5c9c40424..89e383cce 100755 --- a/openapi-specs/compute/30-03/desc/collections/name_usages_get.md +++ b/openapi-specs/compute/30-03/desc/collections/name_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that retrieves all policies with name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/containers/count_get.md b/openapi-specs/compute/30-03/desc/containers/count_get.md index 4c6ecdcb4..aca59a913 100644 --- a/openapi-specs/compute/30-03/desc/containers/count_get.md +++ b/openapi-specs/compute/30-03/desc/containers/count_get.md @@ -5,7 +5,7 @@ Returns an integer representing the number of containers in your environment. Refer to the following example cURL command that returns the number of containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/containers/download_get.md b/openapi-specs/compute/30-03/desc/containers/download_get.md index 8f581aabe..d76a8de25 100644 --- a/openapi-specs/compute/30-03/desc/containers/download_get.md +++ b/openapi-specs/compute/30-03/desc/containers/download_get.md @@ -9,7 +9,7 @@ You can download the container scan reports in CSV format in Console under **Mon Refer to the following example cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/containers/filters_get.md b/openapi-specs/compute/30-03/desc/containers/filters_get.md index c8a1dfca4..6c2777819 100644 --- a/openapi-specs/compute/30-03/desc/containers/filters_get.md +++ b/openapi-specs/compute/30-03/desc/containers/filters_get.md @@ -1,7 +1,7 @@ Returns all container filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/containers/get.md b/openapi-specs/compute/30-03/desc/containers/get.md index 4cacdde60..3de9dd4af 100644 --- a/openapi-specs/compute/30-03/desc/containers/get.md +++ b/openapi-specs/compute/30-03/desc/containers/get.md @@ -16,7 +16,7 @@ Refer to the following available options for the `fields` query parameters: Refer to the following example cURL command that retrieves a scan report for all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -26,7 +26,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a scan report for a container with the collection ``: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/containers/labels_get.md b/openapi-specs/compute/30-03/desc/containers/labels_get.md index eb40a748d..7a63ab6fb 100644 --- a/openapi-specs/compute/30-03/desc/containers/labels_get.md +++ b/openapi-specs/compute/30-03/desc/containers/labels_get.md @@ -1,7 +1,7 @@ Returns an array of strings containing all of the labels. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/containers/names_get.md b/openapi-specs/compute/30-03/desc/containers/names_get.md index 8b32465d5..9025e2e10 100644 --- a/openapi-specs/compute/30-03/desc/containers/names_get.md +++ b/openapi-specs/compute/30-03/desc/containers/names_get.md @@ -5,7 +5,7 @@ Returns an array of strings containing all container names. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/containers/scan_post.md b/openapi-specs/compute/30-03/desc/containers/scan_post.md index 6b2bdaaba..56137cf64 100644 --- a/openapi-specs/compute/30-03/desc/containers/scan_post.md +++ b/openapi-specs/compute/30-03/desc/containers/scan_post.md @@ -4,7 +4,7 @@ This endpoint returns the time that the scans were initiated. The following example command uses curl and basic auth to force Prisma Cloud Compute to re-scan all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/credentials/get.md b/openapi-specs/compute/30-03/desc/credentials/get.md index ee4309dee..b807ce8f3 100644 --- a/openapi-specs/compute/30-03/desc/credentials/get.md +++ b/openapi-specs/compute/30-03/desc/credentials/get.md @@ -6,7 +6,7 @@ This endpoint maps to **Manage > Authentication > Credentials store** in the Con Refer to the following example cURL command that retrieves all credentials: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/credentials/id_delete.md b/openapi-specs/compute/30-03/desc/credentials/id_delete.md index e5c70259e..27f090158 100644 --- a/openapi-specs/compute/30-03/desc/credentials/id_delete.md +++ b/openapi-specs/compute/30-03/desc/credentials/id_delete.md @@ -14,7 +14,7 @@ To invoke this endpoint in the Prisma Cloud Compute user interface: Refer to the following example cURL command that deletes an existing credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/30-03/desc/credentials/id_usages_get.md b/openapi-specs/compute/30-03/desc/credentials/id_usages_get.md index 76c1099aa..ca2ce6216 100644 --- a/openapi-specs/compute/30-03/desc/credentials/id_usages_get.md +++ b/openapi-specs/compute/30-03/desc/credentials/id_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following cURL command that retrieves all usages for a credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/curl_examples.md b/openapi-specs/compute/30-03/desc/curl_examples.md index 3d4fcd468..745d21db3 100644 --- a/openapi-specs/compute/30-03/desc/curl_examples.md +++ b/openapi-specs/compute/30-03/desc/curl_examples.md @@ -6,7 +6,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -17,7 +17,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -29,7 +29,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/compute/30-03/desc/custom-compliance/get.md b/openapi-specs/compute/30-03/desc/custom-compliance/get.md index 9022a87b7..9dddcff4e 100644 --- a/openapi-specs/compute/30-03/desc/custom-compliance/get.md +++ b/openapi-specs/compute/30-03/desc/custom-compliance/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example curl command that gets the list of custom compliance checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/custom-compliance/id_delete.md b/openapi-specs/compute/30-03/desc/custom-compliance/id_delete.md index 72c7183ee..f6536e51d 100644 --- a/openapi-specs/compute/30-03/desc/custom-compliance/id_delete.md +++ b/openapi-specs/compute/30-03/desc/custom-compliance/id_delete.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example cURL command that uses basic auth to delete the compliance check with id 9000: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/30-03/desc/custom-compliance/put.md b/openapi-specs/compute/30-03/desc/custom-compliance/put.md index 480e41b54..b8760a11f 100644 --- a/openapi-specs/compute/30-03/desc/custom-compliance/put.md +++ b/openapi-specs/compute/30-03/desc/custom-compliance/put.md @@ -21,7 +21,7 @@ Create `custom_check.json` file (example): Refer to the following example curl command that uses basic auth to update the checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/30-03/desc/custom-rules/get.md b/openapi-specs/compute/30-03/desc/custom-rules/get.md index f0385f81a..f77924be8 100644 --- a/openapi-specs/compute/30-03/desc/custom-rules/get.md +++ b/openapi-specs/compute/30-03/desc/custom-rules/get.md @@ -7,7 +7,7 @@ This endpoint maps to the policy table in **Defend > Custom rules** in the Conso Refer to the following example cURL command that retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/custom-rules/id_delete.md b/openapi-specs/compute/30-03/desc/custom-rules/id_delete.md index c0d6dc8b0..01412abf3 100644 --- a/openapi-specs/compute/30-03/desc/custom-rules/id_delete.md +++ b/openapi-specs/compute/30-03/desc/custom-rules/id_delete.md @@ -5,7 +5,7 @@ Deletes a custom rule. Refer to the following example cURL command that deletes a custom rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/30-03/desc/cves/distribution_get.md b/openapi-specs/compute/30-03/desc/cves/distribution_get.md index aecddce23..7365e1a5e 100644 --- a/openapi-specs/compute/30-03/desc/cves/distribution_get.md +++ b/openapi-specs/compute/30-03/desc/cves/distribution_get.md @@ -3,7 +3,7 @@ Retrieves CVEs from the vulnerability database grouped into distribution where y The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/cves/get.md b/openapi-specs/compute/30-03/desc/cves/get.md index 469ea4b28..f81223298 100644 --- a/openapi-specs/compute/30-03/desc/cves/get.md +++ b/openapi-specs/compute/30-03/desc/cves/get.md @@ -6,7 +6,7 @@ A null response indicates that the CVE is not in our database. The following example curl command queries the Prisma Cloud Compute database for `CVE-2018-1102`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/defenders/app_embedded_post.md b/openapi-specs/compute/30-03/desc/defenders/app_embedded_post.md index 9167469d0..7999cbadb 100644 --- a/openapi-specs/compute/30-03/desc/defenders/app_embedded_post.md +++ b/openapi-specs/compute/30-03/desc/defenders/app_embedded_post.md @@ -5,7 +5,7 @@ Creates an augmented Dockerfile with Defender and dependencies included as a ZIP Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/defenders/daemonset_yaml_get.md b/openapi-specs/compute/30-03/desc/defenders/daemonset_yaml_get.md index 678901a8a..b68869081 100644 --- a/openapi-specs/compute/30-03/desc/defenders/daemonset_yaml_get.md +++ b/openapi-specs/compute/30-03/desc/defenders/daemonset_yaml_get.md @@ -10,7 +10,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https://:8083/api/v1/defenders/daemonset.yaml?consoleaddr=&listener=none&namespace=twistlock&orchestration=kubernetes' diff --git a/openapi-specs/compute/30-03/desc/defenders/daemonset_yaml_post.md b/openapi-specs/compute/30-03/desc/defenders/daemonset_yaml_post.md index 8dcf30639..91abe241f 100644 --- a/openapi-specs/compute/30-03/desc/defenders/daemonset_yaml_post.md +++ b/openapi-specs/compute/30-03/desc/defenders/daemonset_yaml_post.md @@ -5,7 +5,7 @@ Creates a DaemonSet deployment file in YAML format that you can use to deploy De Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/defenders/download_get.md b/openapi-specs/compute/30-03/desc/defenders/download_get.md index 2d9435506..67f08c0e5 100644 --- a/openapi-specs/compute/30-03/desc/defenders/download_get.md +++ b/openapi-specs/compute/30-03/desc/defenders/download_get.md @@ -8,7 +8,7 @@ Use the query parameters to filter what data is returned. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o \ diff --git a/openapi-specs/compute/30-03/desc/defenders/fargate_json_post.md b/openapi-specs/compute/30-03/desc/defenders/fargate_json_post.md index 5128e90a1..e2e4e85ab 100644 --- a/openapi-specs/compute/30-03/desc/defenders/fargate_json_post.md +++ b/openapi-specs/compute/30-03/desc/defenders/fargate_json_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command: Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -23,7 +23,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/defenders/fargate_yaml_post.md b/openapi-specs/compute/30-03/desc/defenders/fargate_yaml_post.md index 9a8306a1b..95560526a 100644 --- a/openapi-specs/compute/30-03/desc/defenders/fargate_yaml_post.md +++ b/openapi-specs/compute/30-03/desc/defenders/fargate_yaml_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.yaml` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/yaml' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/defenders/get.md b/openapi-specs/compute/30-03/desc/defenders/get.md index 471e7ef9d..8d2f5cd4c 100644 --- a/openapi-specs/compute/30-03/desc/defenders/get.md +++ b/openapi-specs/compute/30-03/desc/defenders/get.md @@ -7,7 +7,7 @@ This endpoint maps to the UI Console page in **Manage > Defenders > Defenders**. Refer to the following example cURL command that retrieves all deployed Defenders. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/defenders/helm_get.md b/openapi-specs/compute/30-03/desc/defenders/helm_get.md index b11f9c4b9..487c8b7e8 100644 --- a/openapi-specs/compute/30-03/desc/defenders/helm_get.md +++ b/openapi-specs/compute/30-03/desc/defenders/helm_get.md @@ -13,7 +13,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o twistlock-defender-helm.tar.gz \ diff --git a/openapi-specs/compute/30-03/desc/defenders/helm_post.md b/openapi-specs/compute/30-03/desc/defenders/helm_post.md index 2046e63eb..fb76807ae 100644 --- a/openapi-specs/compute/30-03/desc/defenders/helm_post.md +++ b/openapi-specs/compute/30-03/desc/defenders/helm_post.md @@ -5,7 +5,7 @@ Creates a Helm deployment file that you can use to deploy Defenders to your clus Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/defenders/id_delete.md b/openapi-specs/compute/30-03/desc/defenders/id_delete.md index f637ef850..e3ac52daf 100644 --- a/openapi-specs/compute/30-03/desc/defenders/id_delete.md +++ b/openapi-specs/compute/30-03/desc/defenders/id_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes an existing Defender on a host. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/30-03/desc/defenders/id_features_post.md b/openapi-specs/compute/30-03/desc/defenders/id_features_post.md index ec8e4c5f3..9b42f5fa0 100644 --- a/openapi-specs/compute/30-03/desc/defenders/id_features_post.md +++ b/openapi-specs/compute/30-03/desc/defenders/id_features_post.md @@ -3,7 +3,7 @@ Updates a deployed Defender's configuration. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/defenders/id_restart_post.md b/openapi-specs/compute/30-03/desc/defenders/id_restart_post.md index da0cc7811..7296a186b 100644 --- a/openapi-specs/compute/30-03/desc/defenders/id_restart_post.md +++ b/openapi-specs/compute/30-03/desc/defenders/id_restart_post.md @@ -3,7 +3,7 @@ Restarts Defender on a given host. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/defenders/id_upgrade_post.md b/openapi-specs/compute/30-03/desc/defenders/id_upgrade_post.md index f0d30d1e9..3e63c6414 100644 --- a/openapi-specs/compute/30-03/desc/defenders/id_upgrade_post.md +++ b/openapi-specs/compute/30-03/desc/defenders/id_upgrade_post.md @@ -7,7 +7,7 @@ Upgrades Defender on ``. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/defenders/image-name_get.md b/openapi-specs/compute/30-03/desc/defenders/image-name_get.md index e81ba3e19..19f360c07 100644 --- a/openapi-specs/compute/30-03/desc/defenders/image-name_get.md +++ b/openapi-specs/compute/30-03/desc/defenders/image-name_get.md @@ -5,7 +5,7 @@ Returns the full Docker image name for Defender. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/defenders/install-bundle_get.md b/openapi-specs/compute/30-03/desc/defenders/install-bundle_get.md index 882d0cd53..9b09e733f 100644 --- a/openapi-specs/compute/30-03/desc/defenders/install-bundle_get.md +++ b/openapi-specs/compute/30-03/desc/defenders/install-bundle_get.md @@ -5,7 +5,7 @@ Returns the certificate bundle that Defender needs to securely connect to Consol Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/defenders/names_get.md b/openapi-specs/compute/30-03/desc/defenders/names_get.md index 728eb6364..6339c1483 100644 --- a/openapi-specs/compute/30-03/desc/defenders/names_get.md +++ b/openapi-specs/compute/30-03/desc/defenders/names_get.md @@ -5,7 +5,7 @@ Retrieves a list of Defender hostnames that can be used as the `{id}` query para Refer to the following example cURL command that retrieves a list of all Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -15,7 +15,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of connected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -25,7 +25,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of disconnected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -37,7 +37,7 @@ The endpoint enlists all the connected and disconnected Defenders if do not spec Refer to the following example cURL command that retrieves a list of Defenders by type: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/defenders/rasp_post.md b/openapi-specs/compute/30-03/desc/defenders/rasp_post.md index 526a9e112..e110044dd 100644 --- a/openapi-specs/compute/30-03/desc/defenders/rasp_post.md +++ b/openapi-specs/compute/30-03/desc/defenders/rasp_post.md @@ -7,7 +7,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o rasp-defender.zip diff --git a/openapi-specs/compute/30-03/desc/defenders/serverless-bundle_post.md b/openapi-specs/compute/30-03/desc/defenders/serverless-bundle_post.md index df4f13e6a..7533e436b 100644 --- a/openapi-specs/compute/30-03/desc/defenders/serverless-bundle_post.md +++ b/openapi-specs/compute/30-03/desc/defenders/serverless-bundle_post.md @@ -5,7 +5,7 @@ Downloads a ZIP file with serverless Defender bundle. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/octet-stream' \ -o serverless_bundle.zip \ diff --git a/openapi-specs/compute/30-03/desc/defenders/summary_get.md b/openapi-specs/compute/30-03/desc/defenders/summary_get.md index 08be4ebc4..e308ef64b 100644 --- a/openapi-specs/compute/30-03/desc/defenders/summary_get.md +++ b/openapi-specs/compute/30-03/desc/defenders/summary_get.md @@ -6,7 +6,7 @@ Lists the number of Defenders in each defender category. Refer to the following example cURL command that retrieves a summary of Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/defenders/upgrade_post.md b/openapi-specs/compute/30-03/desc/defenders/upgrade_post.md index 2f0b4d39e..eacd6b779 100644 --- a/openapi-specs/compute/30-03/desc/defenders/upgrade_post.md +++ b/openapi-specs/compute/30-03/desc/defenders/upgrade_post.md @@ -9,7 +9,7 @@ To upgrade Serverless and Fargate Defenders, re-embed them. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/deployment/daemonsets_deploy_post.md b/openapi-specs/compute/30-03/desc/deployment/daemonsets_deploy_post.md index 94ec9386b..b60f28346 100644 --- a/openapi-specs/compute/30-03/desc/deployment/daemonsets_deploy_post.md +++ b/openapi-specs/compute/30-03/desc/deployment/daemonsets_deploy_post.md @@ -5,7 +5,7 @@ It identifies the cluster's API server, user, and credentials. Use the various request parameters to control the properties of the deployed DaemonSet. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/deployment/daemonsets_get.md b/openapi-specs/compute/30-03/desc/deployment/daemonsets_get.md index a0b7f3798..0385acf75 100644 --- a/openapi-specs/compute/30-03/desc/deployment/daemonsets_get.md +++ b/openapi-specs/compute/30-03/desc/deployment/daemonsets_get.md @@ -3,7 +3,7 @@ You must specify a `credentialID`, of type `kubeconfig`, which identifies your c Credentials are managed in Console's credentials store (`/api/v1/credentials`). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/feeds/custom_vuln_get.md b/openapi-specs/compute/30-03/desc/feeds/custom_vuln_get.md index 71834f19d..d661acf55 100644 --- a/openapi-specs/compute/30-03/desc/feeds/custom_vuln_get.md +++ b/openapi-specs/compute/30-03/desc/feeds/custom_vuln_get.md @@ -11,7 +11,7 @@ Vulnerability rules can be created using the Prisma Cloud Compute. Refer to the following cURL command that retrieves a list of all the custom vulnerabilities and associated rules. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/feeds/custom_vuln_put.md b/openapi-specs/compute/30-03/desc/feeds/custom_vuln_put.md index 4fe1c1898..149ada978 100644 --- a/openapi-specs/compute/30-03/desc/feeds/custom_vuln_put.md +++ b/openapi-specs/compute/30-03/desc/feeds/custom_vuln_put.md @@ -5,7 +5,7 @@ Updates all the custom vulnerabilities and associated rules simultaneously for h Refer to the following cURL command that updates a vulnerability for a library named `internal-lib`, and specifies that its versions `1.1` to `1.8` are known to be vulnerable. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -37,7 +37,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: **Note:** You will need `jq` to execute this command. ``` - $ curl -k \ + $ curl \ -u \ https:///api/v/feeds/custom/custom-vulnerabilities \ | jq '.' > custom_vulnerability_rules.json @@ -66,7 +66,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 3. Update the rules by pushing the new JSON payload. **Note:** Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -77,7 +77,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 4. Run the cURL command for the `GET /api/vVERSION/feeds/custom/custom-vulnerabilities` endpoint and you can see that the previously installed rules are now overwritten with your new rules. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/feeds/custom_vulnerabilities_digest_get.md b/openapi-specs/compute/30-03/desc/feeds/custom_vulnerabilities_digest_get.md index 0eb501d9b..02af9a3ab 100644 --- a/openapi-specs/compute/30-03/desc/feeds/custom_vulnerabilities_digest_get.md +++ b/openapi-specs/compute/30-03/desc/feeds/custom_vulnerabilities_digest_get.md @@ -5,7 +5,7 @@ Returns the unique digest for the custom vulnerabilities and associated rules fo The following cURL command retrieves the digest for the configured custom vulnerabilities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/feeds/cve_allow_list_digest_get.md b/openapi-specs/compute/30-03/desc/feeds/cve_allow_list_digest_get.md index e27f21251..911a07fd9 100644 --- a/openapi-specs/compute/30-03/desc/feeds/cve_allow_list_digest_get.md +++ b/openapi-specs/compute/30-03/desc/feeds/cve_allow_list_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the Common Vulnerabilities and Exposures (CVE) a The following cURL command retrieves the digest for the configured CVE allow list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/feeds/cve_allow_list_get.md b/openapi-specs/compute/30-03/desc/feeds/cve_allow_list_get.md index 34fb2c7f8..d73ce17c2 100644 --- a/openapi-specs/compute/30-03/desc/feeds/cve_allow_list_get.md +++ b/openapi-specs/compute/30-03/desc/feeds/cve_allow_list_get.md @@ -5,7 +5,7 @@ Retrieves the globally allow-listed Common Vulnerabilities and Exposures (CVE). The following cURL command retrieves the globally allow-listed CVEs. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/feeds/cve_allow_list_put.md b/openapi-specs/compute/30-03/desc/feeds/cve_allow_list_put.md index 850016965..c4e2ce0af 100644 --- a/openapi-specs/compute/30-03/desc/feeds/cve_allow_list_put.md +++ b/openapi-specs/compute/30-03/desc/feeds/cve_allow_list_put.md @@ -7,7 +7,7 @@ Globally allow-lists a set of Common Vulnerabilities and Exposures (CVE). The following cURL command installs a global CVE allow-list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/30-03/desc/feeds/ips_digest_get.md b/openapi-specs/compute/30-03/desc/feeds/ips_digest_get.md index d059271ea..ae2a09915 100644 --- a/openapi-specs/compute/30-03/desc/feeds/ips_digest_get.md +++ b/openapi-specs/compute/30-03/desc/feeds/ips_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the list of suspicious or high risk IP endpoints The following cURL command retrieves the digest for the banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/feeds/ips_get.md b/openapi-specs/compute/30-03/desc/feeds/ips_get.md index 381257d47..f51c577a7 100644 --- a/openapi-specs/compute/30-03/desc/feeds/ips_get.md +++ b/openapi-specs/compute/30-03/desc/feeds/ips_get.md @@ -5,7 +5,7 @@ Retrieves the customized list of block-listed suspicious or high-risk IP address The following cURL command retrieves the list of globally block-listed suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/feeds/ips_put.md b/openapi-specs/compute/30-03/desc/feeds/ips_put.md index 6f8fc2419..5bf791044 100644 --- a/openapi-specs/compute/30-03/desc/feeds/ips_put.md +++ b/openapi-specs/compute/30-03/desc/feeds/ips_put.md @@ -7,7 +7,7 @@ Bans a custom list of suspicious or high-risk IP addresses. The following cURL command installs a custom list of banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/30-03/desc/feeds/malware_digest_get.md b/openapi-specs/compute/30-03/desc/feeds/malware_digest_get.md index 005c476a2..522a59aef 100644 --- a/openapi-specs/compute/30-03/desc/feeds/malware_digest_get.md +++ b/openapi-specs/compute/30-03/desc/feeds/malware_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for all the MD5 signatures of malicious executables The following cURL command retrieves the digest for the configured list for the MD5 signatures of malicious executables. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/feeds/malware_get.md b/openapi-specs/compute/30-03/desc/feeds/malware_get.md index 2a7aa128b..72bee6594 100644 --- a/openapi-specs/compute/30-03/desc/feeds/malware_get.md +++ b/openapi-specs/compute/30-03/desc/feeds/malware_get.md @@ -5,7 +5,7 @@ Returns the customized list of MD5 signatures of malicious executables. Refer to the following cURL command that retrieves the list of MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/feeds/malware_put.md b/openapi-specs/compute/30-03/desc/feeds/malware_put.md index 7e6ec5da0..176304cb9 100644 --- a/openapi-specs/compute/30-03/desc/feeds/malware_put.md +++ b/openapi-specs/compute/30-03/desc/feeds/malware_put.md @@ -7,7 +7,7 @@ Creates a custom list of malware MD5 signatures of malicious executables. Refer to the following cURL command that installs a custom list of malware MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/30-03/desc/feeds/refresh_post.md b/openapi-specs/compute/30-03/desc/feeds/refresh_post.md index a83c40d10..1c756edae 100644 --- a/openapi-specs/compute/30-03/desc/feeds/refresh_post.md +++ b/openapi-specs/compute/30-03/desc/feeds/refresh_post.md @@ -1,7 +1,7 @@ Triggers Console to refresh its data from the **Intelligence Stream** ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/forensic/activities_download_get.md b/openapi-specs/compute/30-03/desc/forensic/activities_download_get.md index 8a2dbd926..1918e3790 100644 --- a/openapi-specs/compute/30-03/desc/forensic/activities_download_get.md +++ b/openapi-specs/compute/30-03/desc/forensic/activities_download_get.md @@ -3,7 +3,7 @@ Downloads all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/forensic/activities_get.md b/openapi-specs/compute/30-03/desc/forensic/activities_get.md index c8fb1d0cd..c0761aa60 100644 --- a/openapi-specs/compute/30-03/desc/forensic/activities_get.md +++ b/openapi-specs/compute/30-03/desc/forensic/activities_get.md @@ -3,7 +3,7 @@ Retrieves all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/groups/get.md b/openapi-specs/compute/30-03/desc/groups/get.md index 6a0daa2eb..34a2711e0 100644 --- a/openapi-specs/compute/30-03/desc/groups/get.md +++ b/openapi-specs/compute/30-03/desc/groups/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups. ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/30-03/desc/groups/id_delete.md b/openapi-specs/compute/30-03/desc/groups/id_delete.md index 5962a1135..0c3cfa1cd 100644 --- a/openapi-specs/compute/30-03/desc/groups/id_delete.md +++ b/openapi-specs/compute/30-03/desc/groups/id_delete.md @@ -13,7 +13,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes a collection with the name `{id}`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/30-03/desc/groups/names.md b/openapi-specs/compute/30-03/desc/groups/names.md index 80f34f536..9c2dd1089 100644 --- a/openapi-specs/compute/30-03/desc/groups/names.md +++ b/openapi-specs/compute/30-03/desc/groups/names.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/30-03/desc/groups/post.md b/openapi-specs/compute/30-03/desc/groups/post.md index d0fc23a6d..ebad011f4 100644 --- a/openapi-specs/compute/30-03/desc/groups/post.md +++ b/openapi-specs/compute/30-03/desc/groups/post.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that creates a new group named `my-group`: ```bash -$ curl -k \ +$ curl \ -X POST \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/30-03/desc/high-availability/get.md b/openapi-specs/compute/30-03/desc/high-availability/get.md index a988d47ef..83d5d9b46 100644 --- a/openapi-specs/compute/30-03/desc/high-availability/get.md +++ b/openapi-specs/compute/30-03/desc/high-availability/get.md @@ -3,7 +3,7 @@ Returns the status of high high availability. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/30-03/desc/hosts/download_get.md b/openapi-specs/compute/30-03/desc/hosts/download_get.md index ab691fb49..34e546573 100644 --- a/openapi-specs/compute/30-03/desc/hosts/download_get.md +++ b/openapi-specs/compute/30-03/desc/hosts/download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Hosts > Refer to the following example cURL command that downloads all host scan reports to a CSV file called `hosts_report.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o hosts_report.csv \ diff --git a/openapi-specs/compute/30-03/desc/hosts/filters_get.md b/openapi-specs/compute/30-03/desc/hosts/filters_get.md index 4bf6df5e6..a39ec8a97 100644 --- a/openapi-specs/compute/30-03/desc/hosts/filters_get.md +++ b/openapi-specs/compute/30-03/desc/hosts/filters_get.md @@ -3,7 +3,7 @@ Returns host filters such as distribution and host name. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/hosts/get.md b/openapi-specs/compute/30-03/desc/hosts/get.md index d125c9d7b..26df89cef 100644 --- a/openapi-specs/compute/30-03/desc/hosts/get.md +++ b/openapi-specs/compute/30-03/desc/hosts/get.md @@ -35,7 +35,7 @@ Refer to the following available options for the `fields` query parameters: Refer to the following cURL command that retrieves all host scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/hosts/info_get.md b/openapi-specs/compute/30-03/desc/hosts/info_get.md index be456b46b..b71c6be2f 100644 --- a/openapi-specs/compute/30-03/desc/hosts/info_get.md +++ b/openapi-specs/compute/30-03/desc/hosts/info_get.md @@ -3,7 +3,7 @@ Returns minimal information that includes hostname, distro, distro-release, coll A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/hosts/scan_post.md b/openapi-specs/compute/30-03/desc/hosts/scan_post.md index 6b72cbfa3..0e0e7b074 100644 --- a/openapi-specs/compute/30-03/desc/hosts/scan_post.md +++ b/openapi-specs/compute/30-03/desc/hosts/scan_post.md @@ -3,7 +3,7 @@ Re-scan all hosts immediately. Refer to the following example command that forces Prisma Cloud Compute to re-scan all hosts: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/hosts/scan diff --git a/openapi-specs/compute/30-03/desc/images/defender_layer_get.md b/openapi-specs/compute/30-03/desc/images/defender_layer_get.md index 1dfe3633d..4bb88d62c 100644 --- a/openapi-specs/compute/30-03/desc/images/defender_layer_get.md +++ b/openapi-specs/compute/30-03/desc/images/defender_layer_get.md @@ -5,7 +5,7 @@ Returns the the Prisma Cloud Compute Defender in as a layer that can be used in Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/compute/30-03/desc/images/defender_rasp_get.md b/openapi-specs/compute/30-03/desc/images/defender_rasp_get.md index a8e145ff7..260e271a1 100644 --- a/openapi-specs/compute/30-03/desc/images/defender_rasp_get.md +++ b/openapi-specs/compute/30-03/desc/images/defender_rasp_get.md @@ -3,7 +3,7 @@ Returns the the Prisma Cloud Compute Defender as the RASP Defender A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/compute/30-03/desc/images/download_get.md b/openapi-specs/compute/30-03/desc/images/download_get.md index 713114955..fcae06e3d 100644 --- a/openapi-specs/compute/30-03/desc/images/download_get.md +++ b/openapi-specs/compute/30-03/desc/images/download_get.md @@ -15,7 +15,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -26,7 +26,7 @@ $ curl -k \ Refer to the following example cURL command that might be useful for developers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/images/get.md b/openapi-specs/compute/30-03/desc/images/get.md index 6c82341b6..bb636e101 100644 --- a/openapi-specs/compute/30-03/desc/images/get.md +++ b/openapi-specs/compute/30-03/desc/images/get.md @@ -19,7 +19,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that retrieves a compact scan report for all images: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -29,7 +29,7 @@ $ curl -k \ Refer to the following cURL command that retrieves a compact scan report for an Ubuntu image: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -40,7 +40,7 @@ The name query is synonymous with the filter images text field in the Console UI Refer to the following cURL command that retrieves the scan report for an image with the matching SHA-256 hash: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/images/names_get.md b/openapi-specs/compute/30-03/desc/images/names_get.md index 3db6f5429..ad5fd25dc 100644 --- a/openapi-specs/compute/30-03/desc/images/names_get.md +++ b/openapi-specs/compute/30-03/desc/images/names_get.md @@ -5,7 +5,7 @@ Returns an array of strings containing image names. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/30-03/desc/images/scan_post.md b/openapi-specs/compute/30-03/desc/images/scan_post.md index 8d802727a..36278249b 100644 --- a/openapi-specs/compute/30-03/desc/images/scan_post.md +++ b/openapi-specs/compute/30-03/desc/images/scan_post.md @@ -5,7 +5,7 @@ Re-scan all images immediately. This endpoint returns the time that the scans we Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all images: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/images/scan diff --git a/openapi-specs/compute/30-03/desc/images/twistlock_defender_tar_gz_get.md b/openapi-specs/compute/30-03/desc/images/twistlock_defender_tar_gz_get.md index 7852e12ba..36fb66ae8 100644 --- a/openapi-specs/compute/30-03/desc/images/twistlock_defender_tar_gz_get.md +++ b/openapi-specs/compute/30-03/desc/images/twistlock_defender_tar_gz_get.md @@ -1,7 +1,7 @@ Download the Container Defender image for Linux platforms. ```bash -$ curl -k \ +$ curl \ -u \ -H "Content-Type: application/octet-stream" \ -o twistlock_defender.tar.gz \ diff --git a/openapi-specs/compute/30-03/desc/intro.md b/openapi-specs/compute/30-03/desc/intro.md index 9038a3734..5b4ed5864 100644 --- a/openapi-specs/compute/30-03/desc/intro.md +++ b/openapi-specs/compute/30-03/desc/intro.md @@ -47,7 +47,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -58,7 +58,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -70,7 +70,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/compute/30-03/desc/kubernetes/scan_post.md b/openapi-specs/compute/30-03/desc/kubernetes/scan_post.md index 15d614c1a..ab74d5d96 100644 --- a/openapi-specs/compute/30-03/desc/kubernetes/scan_post.md +++ b/openapi-specs/compute/30-03/desc/kubernetes/scan_post.md @@ -3,7 +3,7 @@ This endpoint will trigger a Kubernetes scan. The following example curl command uses basic auth to initiate this scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/logs/console_get.md b/openapi-specs/compute/30-03/desc/logs/console_get.md index 80ece6611..113543540 100644 --- a/openapi-specs/compute/30-03/desc/logs/console_get.md +++ b/openapi-specs/compute/30-03/desc/logs/console_get.md @@ -3,7 +3,7 @@ Retrieves the latest Console log messages. The following example curl command retrieves the 10 latest Console log messages: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/logs/defender_download_get.md b/openapi-specs/compute/30-03/desc/logs/defender_download_get.md index 5d6718db0..05bbc6a75 100644 --- a/openapi-specs/compute/30-03/desc/logs/defender_download_get.md +++ b/openapi-specs/compute/30-03/desc/logs/defender_download_get.md @@ -5,7 +5,7 @@ The hostname can be returned from the endpoint `/defenders/names` The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/logs/defender_get.md b/openapi-specs/compute/30-03/desc/logs/defender_get.md index 1e733a746..f2e3b25df 100644 --- a/openapi-specs/compute/30-03/desc/logs/defender_get.md +++ b/openapi-specs/compute/30-03/desc/logs/defender_get.md @@ -7,7 +7,7 @@ Note that you must quote the URL when running the following command. Otherwise the shell misinterprets the ampersand (`&`) as the end of the command, and puts the curl command in the background. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/logs/system_download_get.md b/openapi-specs/compute/30-03/desc/logs/system_download_get.md index 1e5b5b873..43bb0abce 100644 --- a/openapi-specs/compute/30-03/desc/logs/system_download_get.md +++ b/openapi-specs/compute/30-03/desc/logs/system_download_get.md @@ -4,7 +4,7 @@ This endpoint will return the system debug logs with `tar.gz` file extension. The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/pcf-droplets/addresses_get.md b/openapi-specs/compute/30-03/desc/pcf-droplets/addresses_get.md index 257a47455..bb3365015 100644 --- a/openapi-specs/compute/30-03/desc/pcf-droplets/addresses_get.md +++ b/openapi-specs/compute/30-03/desc/pcf-droplets/addresses_get.md @@ -5,7 +5,7 @@ You can also add optional query parameters to this API call, in this example `cl The following example curl command retrieves the list of addresses: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/pcf-droplets/download_get.md b/openapi-specs/compute/30-03/desc/pcf-droplets/download_get.md index ad761e744..ac8546a25 100644 --- a/openapi-specs/compute/30-03/desc/pcf-droplets/download_get.md +++ b/openapi-specs/compute/30-03/desc/pcf-droplets/download_get.md @@ -3,7 +3,7 @@ This endpoint will download the list of configured cloud controller addresses co The following example curl command retrieves the list of addresses and outputs it to a file call `PCF_blobstores.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/pcf-droplets/get.md b/openapi-specs/compute/30-03/desc/pcf-droplets/get.md index 930d16948..aad607cba 100644 --- a/openapi-specs/compute/30-03/desc/pcf-droplets/get.md +++ b/openapi-specs/compute/30-03/desc/pcf-droplets/get.md @@ -3,7 +3,7 @@ This endpoint will return the full metadata of PCF blobstore from page **Monitor The following example curl command will retrieve this: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/pcf-droplets/scan_post.md b/openapi-specs/compute/30-03/desc/pcf-droplets/scan_post.md index 34e75b26c..d9c9df4dd 100644 --- a/openapi-specs/compute/30-03/desc/pcf-droplets/scan_post.md +++ b/openapi-specs/compute/30-03/desc/pcf-droplets/scan_post.md @@ -3,7 +3,7 @@ This endpoint will kick off a scan of the any PCF Blobstores you have configured Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/pcf-droplets/stop_post.md b/openapi-specs/compute/30-03/desc/pcf-droplets/stop_post.md index 94c376972..2c4d5264a 100644 --- a/openapi-specs/compute/30-03/desc/pcf-droplets/stop_post.md +++ b/openapi-specs/compute/30-03/desc/pcf-droplets/stop_post.md @@ -3,7 +3,7 @@ This endpoint will instruct the PFC Defenders to stop scanning. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/policies/compliance_ci_images_get.md b/openapi-specs/compute/30-03/desc/policies/compliance_ci_images_get.md index f97130a97..9a2b2abf5 100644 --- a/openapi-specs/compute/30-03/desc/policies/compliance_ci_images_get.md +++ b/openapi-specs/compute/30-03/desc/policies/compliance_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > CI** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/policies/compliance_ci_serverless_get.md b/openapi-specs/compute/30-03/desc/policies/compliance_ci_serverless_get.md index 59195f070..2f30e2d74 100644 --- a/openapi-specs/compute/30-03/desc/policies/compliance_ci_serverless_get.md +++ b/openapi-specs/compute/30-03/desc/policies/compliance_ci_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Functions > CI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/policies/compliance_container_get.md b/openapi-specs/compute/30-03/desc/policies/compliance_container_get.md index 7f10245ea..657d4f2dd 100644 --- a/openapi-specs/compute/30-03/desc/policies/compliance_container_get.md +++ b/openapi-specs/compute/30-03/desc/policies/compliance_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > Deployed** Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/policies/compliance_container_impacted_get.md b/openapi-specs/compute/30-03/desc/policies/compliance_container_impacted_get.md index 607bfa3c8..de9e0ee77 100644 --- a/openapi-specs/compute/30-03/desc/policies/compliance_container_impacted_get.md +++ b/openapi-specs/compute/30-03/desc/policies/compliance_container_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of containers captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/compliance/container/impacted?ruleName=' diff --git a/openapi-specs/compute/30-03/desc/policies/compliance_host_get.md b/openapi-specs/compute/30-03/desc/policies/compliance_host_get.md index c029ecf7f..a5e429af5 100755 --- a/openapi-specs/compute/30-03/desc/policies/compliance_host_get.md +++ b/openapi-specs/compute/30-03/desc/policies/compliance_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Hosts > Running hosts** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/policies/compliance_serverless_get.md b/openapi-specs/compute/30-03/desc/policies/compliance_serverless_get.md index c7de886c1..f559179f6 100755 --- a/openapi-specs/compute/30-03/desc/policies/compliance_serverless_get.md +++ b/openapi-specs/compute/30-03/desc/policies/compliance_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Functions > Functions** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/policies/compliance_vms_get.md b/openapi-specs/compute/30-03/desc/policies/compliance_vms_get.md index f7d7e1a49..b61d20d9d 100755 --- a/openapi-specs/compute/30-03/desc/policies/compliance_vms_get.md +++ b/openapi-specs/compute/30-03/desc/policies/compliance_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Hosts > VM ima The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/policies/compliance_vms_impacted_get.md b/openapi-specs/compute/30-03/desc/policies/compliance_vms_impacted_get.md index 9cf5b9d03..4ac3f2832 100644 --- a/openapi-specs/compute/30-03/desc/policies/compliance_vms_impacted_get.md +++ b/openapi-specs/compute/30-03/desc/policies/compliance_vms_impacted_get.md @@ -8,7 +8,7 @@ Use query parameters to retrieve the list of impacted resources by *account ID*, Refer to the following example cURL command, which retrieves a list of impacted resources: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/policies/docker_get.md b/openapi-specs/compute/30-03/desc/policies/docker_get.md index f56872c67..e8ab3d5bb 100644 --- a/openapi-specs/compute/30-03/desc/policies/docker_get.md +++ b/openapi-specs/compute/30-03/desc/policies/docker_get.md @@ -3,7 +3,7 @@ Retrieves a list of all access control rules for Docker Engine commands. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/policies/docker_put.md b/openapi-specs/compute/30-03/desc/policies/docker_put.md index 860e2bb1e..a5d0c0230 100644 --- a/openapi-specs/compute/30-03/desc/policies/docker_put.md +++ b/openapi-specs/compute/30-03/desc/policies/docker_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove Docker access control rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/docker \ | jq '.' > docker_access_control_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove Docker access control rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/30-03/desc/policies/firewall_app-embedded_get.md b/openapi-specs/compute/30-03/desc/policies/firewall_app-embedded_get.md index 3da2a7cd6..4e59c4c21 100644 --- a/openapi-specs/compute/30-03/desc/policies/firewall_app-embedded_get.md +++ b/openapi-specs/compute/30-03/desc/policies/firewall_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > App-Embedded** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/policies/firewall_app_container_get.md b/openapi-specs/compute/30-03/desc/policies/firewall_app_container_get.md index 3b8c157fa..f0486aa4c 100644 --- a/openapi-specs/compute/30-03/desc/policies/firewall_app_container_get.md +++ b/openapi-specs/compute/30-03/desc/policies/firewall_app_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Container** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/container' diff --git a/openapi-specs/compute/30-03/desc/policies/firewall_app_host_get.md b/openapi-specs/compute/30-03/desc/policies/firewall_app_host_get.md index adb90128a..75c22add4 100644 --- a/openapi-specs/compute/30-03/desc/policies/firewall_app_host_get.md +++ b/openapi-specs/compute/30-03/desc/policies/firewall_app_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Host** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/policies/firewall_app_network_list_get.md b/openapi-specs/compute/30-03/desc/policies/firewall_app_network_list_get.md index 13f7fb450..5a1f87d85 100644 --- a/openapi-specs/compute/30-03/desc/policies/firewall_app_network_list_get.md +++ b/openapi-specs/compute/30-03/desc/policies/firewall_app_network_list_get.md @@ -11,7 +11,7 @@ This endpoint maps to **Defend > WAAS > Network lists** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/network-list' diff --git a/openapi-specs/compute/30-03/desc/policies/firewall_app_out-of-band_get.md b/openapi-specs/compute/30-03/desc/policies/firewall_app_out-of-band_get.md index d4f72d041..9ae662687 100644 --- a/openapi-specs/compute/30-03/desc/policies/firewall_app_out-of-band_get.md +++ b/openapi-specs/compute/30-03/desc/policies/firewall_app_out-of-band_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/policies/firewall_app_out-of-band_impacted_get.md b/openapi-specs/compute/30-03/desc/policies/firewall_app_out-of-band_impacted_get.md index 25d2c6691..96a427f94 100644 --- a/openapi-specs/compute/30-03/desc/policies/firewall_app_out-of-band_impacted_get.md +++ b/openapi-specs/compute/30-03/desc/policies/firewall_app_out-of-band_impacted_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/policies/firewall_app_rasp_get.md b/openapi-specs/compute/30-03/desc/policies/firewall_app_rasp_get.md index 15d481cf3..a201d3beb 100644 --- a/openapi-specs/compute/30-03/desc/policies/firewall_app_rasp_get.md +++ b/openapi-specs/compute/30-03/desc/policies/firewall_app_rasp_get.md @@ -1,7 +1,7 @@ Retrieves a list of all application firewall (CNAF) rules for RASP. ``` -$ curl -k \ +$ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp ``` diff --git a/openapi-specs/compute/30-03/desc/policies/firewall_app_rasp_put.md b/openapi-specs/compute/30-03/desc/policies/firewall_app_rasp_put.md index 04ba86483..1101c7690 100644 --- a/openapi-specs/compute/30-03/desc/policies/firewall_app_rasp_put.md +++ b/openapi-specs/compute/30-03/desc/policies/firewall_app_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp \ | jq '.' > app_firewall_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/30-03/desc/policies/firewall_app_serverless_get.md b/openapi-specs/compute/30-03/desc/policies/firewall_app_serverless_get.md index d19e909f3..90cac0015 100644 --- a/openapi-specs/compute/30-03/desc/policies/firewall_app_serverless_get.md +++ b/openapi-specs/compute/30-03/desc/policies/firewall_app_serverless_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Serverless** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/serverless' diff --git a/openapi-specs/compute/30-03/desc/policies/firewall_network_container_get.md b/openapi-specs/compute/30-03/desc/policies/firewall_network_container_get.md index 3f1343b53..82e656818 100644 --- a/openapi-specs/compute/30-03/desc/policies/firewall_network_container_get.md +++ b/openapi-specs/compute/30-03/desc/policies/firewall_network_container_get.md @@ -4,7 +4,7 @@ Retrieves a list of all CNNS container and host rules. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/policies/firewall_network_container_put.md b/openapi-specs/compute/30-03/desc/policies/firewall_network_container_put.md index fd9263430..cffb3f1c4 100644 --- a/openapi-specs/compute/30-03/desc/policies/firewall_network_container_put.md +++ b/openapi-specs/compute/30-03/desc/policies/firewall_network_container_put.md @@ -9,7 +9,7 @@ The procedure to add, edit, or remove rules is: Refer to the following example cURL command that retrieves a list of all rules, pretty-print the JSON response, and save the results to a file: ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -26,7 +26,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/30-03/desc/policies/firewall_network_entities_get.md b/openapi-specs/compute/30-03/desc/policies/firewall_network_entities_get.md index 757121f70..28ed8dbcb 100644 --- a/openapi-specs/compute/30-03/desc/policies/firewall_network_entities_get.md +++ b/openapi-specs/compute/30-03/desc/policies/firewall_network_entities_get.md @@ -1,7 +1,7 @@ Retrieves a list of all CNNF network objects. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/policies/firewall_network_entities_put.md b/openapi-specs/compute/30-03/desc/policies/firewall_network_entities_put.md index 83c023286..39044ee10 100644 --- a/openapi-specs/compute/30-03/desc/policies/firewall_network_entities_put.md +++ b/openapi-specs/compute/30-03/desc/policies/firewall_network_entities_put.md @@ -3,7 +3,7 @@ Updates the list of CNNF network objects. The following example curl command updates the network objects. There is an example of all three types (images,subnets, and applications ): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/30-03/desc/policies/policies.md b/openapi-specs/compute/30-03/desc/policies/policies.md index 69768c03d..97be7b616 100644 --- a/openapi-specs/compute/30-03/desc/policies/policies.md +++ b/openapi-specs/compute/30-03/desc/policies/policies.md @@ -21,7 +21,7 @@ To add, edit, or remove vulnerability rules from a policy: For example, the following cURL command uses basic auth to retrieve a list of all image vulnerability rules, pretty-prints the JSON response, and saves the results to a `vulnerability_rules.json` file. ```bash - $ curl -k \ + $ curl \ -u \ https:///api/v1/policies/runtime/host \ | jq '.' > vulnerability_rules.json @@ -36,7 +36,7 @@ To add, edit, or remove vulnerability rules from a policy: **Note:** Remember to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -107,7 +107,7 @@ Use the `PUT` method to delete all rules by submitting an empty JSON object. For example, to delete all host runtime rules: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/30-03/desc/policies/runtime_app-embedded_get.md b/openapi-specs/compute/30-03/desc/policies/runtime_app-embedded_get.md index fcf0ba8b9..517b741bb 100755 --- a/openapi-specs/compute/30-03/desc/policies/runtime_app-embedded_get.md +++ b/openapi-specs/compute/30-03/desc/policies/runtime_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > App-Embedded policy** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/policies/runtime_container_get.md b/openapi-specs/compute/30-03/desc/policies/runtime_container_get.md index f1b50b727..65cd10660 100644 --- a/openapi-specs/compute/30-03/desc/policies/runtime_container_get.md +++ b/openapi-specs/compute/30-03/desc/policies/runtime_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Container policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/policies/runtime_container_impacted_get.md b/openapi-specs/compute/30-03/desc/policies/runtime_container_impacted_get.md index 195f75547..e026d33b9 100644 --- a/openapi-specs/compute/30-03/desc/policies/runtime_container_impacted_get.md +++ b/openapi-specs/compute/30-03/desc/policies/runtime_container_impacted_get.md @@ -6,7 +6,7 @@ In the Console UI, you can see how it works by going to the **Defend > Runtime > Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ $ curl -k \ For additional help with your `ruleName`: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/policies/runtime_host_get.md b/openapi-specs/compute/30-03/desc/policies/runtime_host_get.md index 38800596c..559ef690a 100644 --- a/openapi-specs/compute/30-03/desc/policies/runtime_host_get.md +++ b/openapi-specs/compute/30-03/desc/policies/runtime_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Host policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/policies/runtime_rasp_get.md b/openapi-specs/compute/30-03/desc/policies/runtime_rasp_get.md index 5b7a76457..55a6ff05b 100644 --- a/openapi-specs/compute/30-03/desc/policies/runtime_rasp_get.md +++ b/openapi-specs/compute/30-03/desc/policies/runtime_rasp_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your RASP runtime policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/policies/runtime_rasp_put.md b/openapi-specs/compute/30-03/desc/policies/runtime_rasp_put.md index bba60ba81..f71fb4b93 100644 --- a/openapi-specs/compute/30-03/desc/policies/runtime_rasp_put.md +++ b/openapi-specs/compute/30-03/desc/policies/runtime_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve the rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET @@ -24,7 +24,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -H "Content-Type:application/json" \ -X PUT \ diff --git a/openapi-specs/compute/30-03/desc/policies/runtime_serverless_get.md b/openapi-specs/compute/30-03/desc/policies/runtime_serverless_get.md index 44326bbf6..c98489e16 100644 --- a/openapi-specs/compute/30-03/desc/policies/runtime_serverless_get.md +++ b/openapi-specs/compute/30-03/desc/policies/runtime_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Serverless policy** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/policies/secrets_get.md b/openapi-specs/compute/30-03/desc/policies/secrets_get.md index 89e6b9c0e..cb4ecb37c 100644 --- a/openapi-specs/compute/30-03/desc/policies/secrets_get.md +++ b/openapi-specs/compute/30-03/desc/policies/secrets_get.md @@ -3,7 +3,7 @@ Retrieves a list of all secrets rules. The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/policies/secrets diff --git a/openapi-specs/compute/30-03/desc/policies/secrets_put.md b/openapi-specs/compute/30-03/desc/policies/secrets_put.md index 1e8877ca1..04fd41f24 100644 --- a/openapi-specs/compute/30-03/desc/policies/secrets_put.md +++ b/openapi-specs/compute/30-03/desc/policies/secrets_put.md @@ -10,7 +10,7 @@ The procedure to add, edit, or remove secrets rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/secrets \ | jq '.' > secrets_rules.json @@ -24,7 +24,7 @@ The procedure to add, edit, or remove secrets rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/30-03/desc/policies/trust_get.md b/openapi-specs/compute/30-03/desc/policies/trust_get.md index 8de1ba409..0805d6777 100644 --- a/openapi-specs/compute/30-03/desc/policies/trust_get.md +++ b/openapi-specs/compute/30-03/desc/policies/trust_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/policies/trust_put.md b/openapi-specs/compute/30-03/desc/policies/trust_put.md index fccd4b91e..7fec72031 100644 --- a/openapi-specs/compute/30-03/desc/policies/trust_put.md +++ b/openapi-specs/compute/30-03/desc/policies/trust_put.md @@ -1,7 +1,7 @@ Updates the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/30-03/desc/policies/vulnerability_ci_images_get.md b/openapi-specs/compute/30-03/desc/policies/vulnerability_ci_images_get.md index abc3da8fa..ce0d50a29 100644 --- a/openapi-specs/compute/30-03/desc/policies/vulnerability_ci_images_get.md +++ b/openapi-specs/compute/30-03/desc/policies/vulnerability_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/policies/vulnerability_ci_serverless_get.md b/openapi-specs/compute/30-03/desc/policies/vulnerability_ci_serverless_get.md index 958c86495..6fb5f93ce 100644 --- a/openapi-specs/compute/30-03/desc/policies/vulnerability_ci_serverless_get.md +++ b/openapi-specs/compute/30-03/desc/policies/vulnerability_ci_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/policies/vulnerability_coderepos_get.md b/openapi-specs/compute/30-03/desc/policies/vulnerability_coderepos_get.md index 08dfed8e1..a4ac62f33 100644 --- a/openapi-specs/compute/30-03/desc/policies/vulnerability_coderepos_get.md +++ b/openapi-specs/compute/30-03/desc/policies/vulnerability_coderepos_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Code repositories** in the Co Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/vulnerability/coderepos' diff --git a/openapi-specs/compute/30-03/desc/policies/vulnerability_coderepos_impacted_get.md b/openapi-specs/compute/30-03/desc/policies/vulnerability_coderepos_impacted_get.md index a401a12c4..e64ef768e 100644 --- a/openapi-specs/compute/30-03/desc/policies/vulnerability_coderepos_impacted_get.md +++ b/openapi-specs/compute/30-03/desc/policies/vulnerability_coderepos_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/coderepos/impacted?project=&ruleName=' ``` diff --git a/openapi-specs/compute/30-03/desc/policies/vulnerability_coderepos_put.md b/openapi-specs/compute/30-03/desc/policies/vulnerability_coderepos_put.md index 514eec136..a002415b9 100644 --- a/openapi-specs/compute/30-03/desc/policies/vulnerability_coderepos_put.md +++ b/openapi-specs/compute/30-03/desc/policies/vulnerability_coderepos_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Code repo Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT 'https:///api/v/policies/vulnerability/coderepos' \ diff --git a/openapi-specs/compute/30-03/desc/policies/vulnerability_host_get.md b/openapi-specs/compute/30-03/desc/policies/vulnerability_host_get.md index 3b9b14b9c..260da7675 100644 --- a/openapi-specs/compute/30-03/desc/policies/vulnerability_host_get.md +++ b/openapi-specs/compute/30-03/desc/policies/vulnerability_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Hosts > Running hosts** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/policies/vulnerability_host_impacted_get.md b/openapi-specs/compute/30-03/desc/policies/vulnerability_host_impacted_get.md index 346368518..f44592830 100644 --- a/openapi-specs/compute/30-03/desc/policies/vulnerability_host_impacted_get.md +++ b/openapi-specs/compute/30-03/desc/policies/vulnerability_host_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by `RULE_NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/host/impacted?project={PROJECT_NAME}&ruleName={RULE_NAME}' ``` diff --git a/openapi-specs/compute/30-03/desc/policies/vulnerability_images_get.md b/openapi-specs/compute/30-03/desc/policies/vulnerability_images_get.md index 33581be37..57359bb8f 100644 --- a/openapi-specs/compute/30-03/desc/policies/vulnerability_images_get.md +++ b/openapi-specs/compute/30-03/desc/policies/vulnerability_images_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images?project=" diff --git a/openapi-specs/compute/30-03/desc/policies/vulnerability_images_impacted_get.md b/openapi-specs/compute/30-03/desc/policies/vulnerability_images_impacted_get.md index ae1d5e396..e2a4efa23 100644 --- a/openapi-specs/compute/30-03/desc/policies/vulnerability_images_impacted_get.md +++ b/openapi-specs/compute/30-03/desc/policies/vulnerability_images_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of images caught by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images/impacted?project=&ruleName=" diff --git a/openapi-specs/compute/30-03/desc/policies/vulnerability_images_put.md b/openapi-specs/compute/30-03/desc/policies/vulnerability_images_put.md index b3330dab7..8c3cc8af2 100644 --- a/openapi-specs/compute/30-03/desc/policies/vulnerability_images_put.md +++ b/openapi-specs/compute/30-03/desc/policies/vulnerability_images_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -X PUT 'https:///api/v/policies/vulnerability/images' \ --data '{ diff --git a/openapi-specs/compute/30-03/desc/policies/vulnerability_serverless_get.md b/openapi-specs/compute/30-03/desc/policies/vulnerability_serverless_get.md index c7a8e2ef5..41c7e75d8 100644 --- a/openapi-specs/compute/30-03/desc/policies/vulnerability_serverless_get.md +++ b/openapi-specs/compute/30-03/desc/policies/vulnerability_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Functions** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/policies/vulnerability_serverless_put.md b/openapi-specs/compute/30-03/desc/policies/vulnerability_serverless_put.md index 2b567b5b1..5199f0997 100644 --- a/openapi-specs/compute/30-03/desc/policies/vulnerability_serverless_put.md +++ b/openapi-specs/compute/30-03/desc/policies/vulnerability_serverless_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k 'https:///api/v/policies/vulnerability/serverless' \ +$ curl 'https:///api/v/policies/vulnerability/serverless' \ -X PUT \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/30-03/desc/policies/vulnerability_vms_get.md b/openapi-specs/compute/30-03/desc/policies/vulnerability_vms_get.md index 117d2cc4a..e37c1520f 100644 --- a/openapi-specs/compute/30-03/desc/policies/vulnerability_vms_get.md +++ b/openapi-specs/compute/30-03/desc/policies/vulnerability_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Hosts > V The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/policies/vulnerability_vms_impacted_get.md b/openapi-specs/compute/30-03/desc/policies/vulnerability_vms_impacted_get.md index 29d9621ea..f1a7f7ef5 100644 --- a/openapi-specs/compute/30-03/desc/policies/vulnerability_vms_impacted_get.md +++ b/openapi-specs/compute/30-03/desc/policies/vulnerability_vms_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/vms?project=&ruleName=' ``` diff --git a/openapi-specs/compute/30-03/desc/profiles/app-embedded_download_get.md b/openapi-specs/compute/30-03/desc/profiles/app-embedded_download_get.md index 4b3f7ff8a..2e8cac56d 100644 --- a/openapi-specs/compute/30-03/desc/profiles/app-embedded_download_get.md +++ b/openapi-specs/compute/30-03/desc/profiles/app-embedded_download_get.md @@ -5,7 +5,7 @@ Downloads the app-embedded observations in a CSV format. Refer to the following example cURL command that downloads all the app-embedded runtime profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/profiles/app-embedded_get.md b/openapi-specs/compute/30-03/desc/profiles/app-embedded_get.md index f3ddb3125..c332061e5 100644 --- a/openapi-specs/compute/30-03/desc/profiles/app-embedded_get.md +++ b/openapi-specs/compute/30-03/desc/profiles/app-embedded_get.md @@ -5,7 +5,7 @@ Retrieves the app-embedded observations. Refer to the following example cURL command that lists all the app-embedded runtime: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/profiles/container_download_get.md b/openapi-specs/compute/30-03/desc/profiles/container_download_get.md index ad7a86101..ee9d5e9e4 100644 --- a/openapi-specs/compute/30-03/desc/profiles/container_download_get.md +++ b/openapi-specs/compute/30-03/desc/profiles/container_download_get.md @@ -6,7 +6,7 @@ Retrieves the details and state of all runtime models in CSV format. Refer to the following example cURL command that downloads a complete list in CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/profiles/container_filters_get.md b/openapi-specs/compute/30-03/desc/profiles/container_filters_get.md index 8b6122b80..13535b520 100644 --- a/openapi-specs/compute/30-03/desc/profiles/container_filters_get.md +++ b/openapi-specs/compute/30-03/desc/profiles/container_filters_get.md @@ -4,7 +4,7 @@ Returns a list of os and images from page monitor/runtime/container-models in Co Example curl command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/profiles/container_get.md b/openapi-specs/compute/30-03/desc/profiles/container_get.md index cdbc24c3e..59a3764fb 100644 --- a/openapi-specs/compute/30-03/desc/profiles/container_get.md +++ b/openapi-specs/compute/30-03/desc/profiles/container_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of all runtime models. Refer to the following example cURL command that lists all runtime models in a system: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/profiles/container_learn_post.md b/openapi-specs/compute/30-03/desc/profiles/container_learn_post.md index 5fef2e31e..2c1d08af1 100644 --- a/openapi-specs/compute/30-03/desc/profiles/container_learn_post.md +++ b/openapi-specs/compute/30-03/desc/profiles/container_learn_post.md @@ -7,7 +7,7 @@ For more information, refer to [Learning mode](https://docs.prismacloud.io/en/cl Refer to the following example cURL command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/profiles/host_download_get.md b/openapi-specs/compute/30-03/desc/profiles/host_download_get.md index ace270a32..2dfb51ec0 100644 --- a/openapi-specs/compute/30-03/desc/profiles/host_download_get.md +++ b/openapi-specs/compute/30-03/desc/profiles/host_download_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of each host service runtime model in CSV format Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/profiles/host_get.md b/openapi-specs/compute/30-03/desc/profiles/host_get.md index 208a24de3..55d8bf8ff 100644 --- a/openapi-specs/compute/30-03/desc/profiles/host_get.md +++ b/openapi-specs/compute/30-03/desc/profiles/host_get.md @@ -15,7 +15,7 @@ The returned JSON object has the following structure: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/profiles/host_id_rule_get.md b/openapi-specs/compute/30-03/desc/profiles/host_id_rule_get.md index 672cb4c62..8be668fca 100644 --- a/openapi-specs/compute/30-03/desc/profiles/host_id_rule_get.md +++ b/openapi-specs/compute/30-03/desc/profiles/host_id_rule_get.md @@ -10,7 +10,7 @@ This is the `PROFILE_ID`. The following example command uses curl and basic auth to specify the learning mode for a profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/profiles/service_download_get.md b/openapi-specs/compute/30-03/desc/profiles/service_download_get.md index 63dff3354..4c1c431c1 100644 --- a/openapi-specs/compute/30-03/desc/profiles/service_download_get.md +++ b/openapi-specs/compute/30-03/desc/profiles/service_download_get.md @@ -1,7 +1,7 @@ Retrieves the details and state of all host service runtime models in CSV format ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/profiles/service_get.md b/openapi-specs/compute/30-03/desc/profiles/service_get.md index a4f8c348d..5d786d919 100644 --- a/openapi-specs/compute/30-03/desc/profiles/service_get.md +++ b/openapi-specs/compute/30-03/desc/profiles/service_get.md @@ -10,7 +10,7 @@ The returned JSON object has the following structure: Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/profiles/service_id_learn_post.md b/openapi-specs/compute/30-03/desc/profiles/service_id_learn_post.md index fb338b80d..fa85fc3a2 100644 --- a/openapi-specs/compute/30-03/desc/profiles/service_id_learn_post.md +++ b/openapi-specs/compute/30-03/desc/profiles/service_id_learn_post.md @@ -11,7 +11,7 @@ The `PROFILE_ID` is typically the service's name, such as `sshd` or `ntpd`. The following example command uses curl and basic auth to specify the learning mode for a host service profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/profiles/service_learn_post.md b/openapi-specs/compute/30-03/desc/profiles/service_learn_post.md index 02a1f299e..ceff8e5a5 100644 --- a/openapi-specs/compute/30-03/desc/profiles/service_learn_post.md +++ b/openapi-specs/compute/30-03/desc/profiles/service_learn_post.md @@ -3,7 +3,7 @@ Specify the learning mode for all host service profiles. The following example command uses curl and basic auth to specify the learning mode for all host service profiles. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/profiles/service_names_get.md b/openapi-specs/compute/30-03/desc/profiles/service_names_get.md index 7da863545..afae56f0d 100644 --- a/openapi-specs/compute/30-03/desc/profiles/service_names_get.md +++ b/openapi-specs/compute/30-03/desc/profiles/service_names_get.md @@ -3,7 +3,7 @@ Retrieves the name of all host service runtime models from within the app at **M The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/projects/get.md b/openapi-specs/compute/30-03/desc/projects/get.md index 05485c24c..1ac04d2c0 100644 --- a/openapi-specs/compute/30-03/desc/projects/get.md +++ b/openapi-specs/compute/30-03/desc/projects/get.md @@ -3,7 +3,7 @@ Lists all projects visible to the given user. Assuming the given user is an admin, the following example curl command would list all projects: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/projects/name_delete.md b/openapi-specs/compute/30-03/desc/projects/name_delete.md index fba889f7e..0a34e72a2 100644 --- a/openapi-specs/compute/30-03/desc/projects/name_delete.md +++ b/openapi-specs/compute/30-03/desc/projects/name_delete.md @@ -6,7 +6,7 @@ The value for `` can be retrieved from the `_id` field in the resp The DELETE method returns the decommissioned supervisor's admin username and password. ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/compute/30-03/desc/projects/name_put.md b/openapi-specs/compute/30-03/desc/projects/name_put.md index b5a83a67d..1bde9b0c7 100644 --- a/openapi-specs/compute/30-03/desc/projects/name_put.md +++ b/openapi-specs/compute/30-03/desc/projects/name_put.md @@ -4,7 +4,7 @@ The following example curl command updates a project named ``. The value for `` can be retrieved from the `_id` field in the response object from `GET /api/v1/projects`. ```bash -$ curl -k \ +$ curl \ -u \ -X PUT \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/compute/30-03/desc/projects/post.md b/openapi-specs/compute/30-03/desc/projects/post.md index 8862c0fd4..38c574173 100644 --- a/openapi-specs/compute/30-03/desc/projects/post.md +++ b/openapi-specs/compute/30-03/desc/projects/post.md @@ -3,7 +3,7 @@ Provisions a new project. The following example curl command provisions a new project named `my-project`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ $ curl -k \ If you have installed a new instance of Console, and you have already created an initial admin user for it, then you can specify the admin username name and password when you provision the project. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/projects/projects.md b/openapi-specs/compute/30-03/desc/projects/projects.md index 7e7dcff66..19c904e9e 100644 --- a/openapi-specs/compute/30-03/desc/projects/projects.md +++ b/openapi-specs/compute/30-03/desc/projects/projects.md @@ -20,7 +20,7 @@ If `project` is not specified, it is set to `Central+Console`. For example, to retrieve the compliance policies for a tenant project named `mobile_payments_division`, use the following curl command: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/radar/container_clean_post.md b/openapi-specs/compute/30-03/desc/radar/container_clean_post.md index 662b6d53f..d4f87e91e 100644 --- a/openapi-specs/compute/30-03/desc/radar/container_clean_post.md +++ b/openapi-specs/compute/30-03/desc/radar/container_clean_post.md @@ -1,7 +1,7 @@ Cleans the container runtime profiles and Radar entities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/radar/container_delete.md b/openapi-specs/compute/30-03/desc/radar/container_delete.md index 4eabe337f..b6cc69cf2 100644 --- a/openapi-specs/compute/30-03/desc/radar/container_delete.md +++ b/openapi-specs/compute/30-03/desc/radar/container_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/30-03/desc/radar/container_export_get.md b/openapi-specs/compute/30-03/desc/radar/container_export_get.md index 7f577568f..f776c7e6c 100644 --- a/openapi-specs/compute/30-03/desc/radar/container_export_get.md +++ b/openapi-specs/compute/30-03/desc/radar/container_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for containers) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/radar/container_filters_get.md b/openapi-specs/compute/30-03/desc/radar/container_filters_get.md index f66463da1..8d7cd6df3 100644 --- a/openapi-specs/compute/30-03/desc/radar/container_filters_get.md +++ b/openapi-specs/compute/30-03/desc/radar/container_filters_get.md @@ -1,7 +1,7 @@ Returns the namespaces from the container view on the Radar page. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/radar/container_get.md b/openapi-specs/compute/30-03/desc/radar/container_get.md index 280d683d9..404629a25 100644 --- a/openapi-specs/compute/30-03/desc/radar/container_get.md +++ b/openapi-specs/compute/30-03/desc/radar/container_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (container view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/radar/host_delete.md b/openapi-specs/compute/30-03/desc/radar/host_delete.md index 738fa7a7c..b4910a8b7 100644 --- a/openapi-specs/compute/30-03/desc/radar/host_delete.md +++ b/openapi-specs/compute/30-03/desc/radar/host_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two apps in CNNF for hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/30-03/desc/radar/host_export_get.md b/openapi-specs/compute/30-03/desc/radar/host_export_get.md index dd91b5335..851d6f40f 100644 --- a/openapi-specs/compute/30-03/desc/radar/host_export_get.md +++ b/openapi-specs/compute/30-03/desc/radar/host_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for hosts) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/radar/host_get.md b/openapi-specs/compute/30-03/desc/radar/host_get.md index a12025856..222d075aa 100644 --- a/openapi-specs/compute/30-03/desc/radar/host_get.md +++ b/openapi-specs/compute/30-03/desc/radar/host_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (host view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/radar/serverless_get.md b/openapi-specs/compute/30-03/desc/radar/serverless_get.md index b2f329149..170cfb48d 100644 --- a/openapi-specs/compute/30-03/desc/radar/serverless_get.md +++ b/openapi-specs/compute/30-03/desc/radar/serverless_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/radar/serverless_progress_get.md b/openapi-specs/compute/30-03/desc/radar/serverless_progress_get.md index a11c1ae20..0808dfbf4 100644 --- a/openapi-specs/compute/30-03/desc/radar/serverless_progress_get.md +++ b/openapi-specs/compute/30-03/desc/radar/serverless_progress_get.md @@ -1,7 +1,7 @@ Returns the scan progress from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/radar/serverless_scan_post.md b/openapi-specs/compute/30-03/desc/radar/serverless_scan_post.md index 0d519ba88..2d444ac88 100644 --- a/openapi-specs/compute/30-03/desc/radar/serverless_scan_post.md +++ b/openapi-specs/compute/30-03/desc/radar/serverless_scan_post.md @@ -1,7 +1,7 @@ Initiates a serverless scan of your environments. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/radar/serverless_stop_post.md b/openapi-specs/compute/30-03/desc/radar/serverless_stop_post.md index 5c0bdf186..f15bef34d 100644 --- a/openapi-specs/compute/30-03/desc/radar/serverless_stop_post.md +++ b/openapi-specs/compute/30-03/desc/radar/serverless_stop_post.md @@ -1,7 +1,7 @@ Stops an in-progress serverless scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/rbac/role_delete.md b/openapi-specs/compute/30-03/desc/rbac/role_delete.md index 87015b6e8..46efcf9c9 100644 --- a/openapi-specs/compute/30-03/desc/rbac/role_delete.md +++ b/openapi-specs/compute/30-03/desc/rbac/role_delete.md @@ -4,7 +4,7 @@ System roles and roles assigned to users/groups cannot be deleted. The following example curl command uses basic auth to delete role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/30-03/desc/rbac/roles_get.md b/openapi-specs/compute/30-03/desc/rbac/roles_get.md index 4cd1d9bc7..112026937 100644 --- a/openapi-specs/compute/30-03/desc/rbac/roles_get.md +++ b/openapi-specs/compute/30-03/desc/rbac/roles_get.md @@ -3,7 +3,7 @@ This endpoint will return a list in JSON format of the roles can be found under The following example curl command uses basic auth to return: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/rbac/roles_post.md b/openapi-specs/compute/30-03/desc/rbac/roles_post.md index 1f20772ce..6988766e8 100644 --- a/openapi-specs/compute/30-03/desc/rbac/roles_post.md +++ b/openapi-specs/compute/30-03/desc/rbac/roles_post.md @@ -37,7 +37,7 @@ The added role must contain the "user" permission with read-write access. This p The following example curl command uses basic auth to create the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/rbac/roles_put.md b/openapi-specs/compute/30-03/desc/rbac/roles_put.md index 34d7b41a7..f62e34ccb 100644 --- a/openapi-specs/compute/30-03/desc/rbac/roles_put.md +++ b/openapi-specs/compute/30-03/desc/rbac/roles_put.md @@ -38,7 +38,7 @@ The updated role must contain the "user" permission with read-write access. This The following example curl command uses basic auth to update the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/30-03/desc/recovery/backup_get.md b/openapi-specs/compute/30-03/desc/recovery/backup_get.md index 4da46f356..bf735905a 100644 --- a/openapi-specs/compute/30-03/desc/recovery/backup_get.md +++ b/openapi-specs/compute/30-03/desc/recovery/backup_get.md @@ -3,7 +3,7 @@ Returns a list of available backups. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/recovery/backup_id_delete.md b/openapi-specs/compute/30-03/desc/recovery/backup_id_delete.md index ae9c33e90..80cd4c3f6 100644 --- a/openapi-specs/compute/30-03/desc/recovery/backup_id_delete.md +++ b/openapi-specs/compute/30-03/desc/recovery/backup_id_delete.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/30-03/desc/recovery/backup_id_patch.md b/openapi-specs/compute/30-03/desc/recovery/backup_id_patch.md index 4a78cd67d..b3699972f 100644 --- a/openapi-specs/compute/30-03/desc/recovery/backup_id_patch.md +++ b/openapi-specs/compute/30-03/desc/recovery/backup_id_patch.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/compute/30-03/desc/recovery/backup_post.md b/openapi-specs/compute/30-03/desc/recovery/backup_post.md index f45161712..41436fe5f 100644 --- a/openapi-specs/compute/30-03/desc/recovery/backup_post.md +++ b/openapi-specs/compute/30-03/desc/recovery/backup_post.md @@ -3,7 +3,7 @@ Creates a backup named `backup_name` by invoking the MongoDB dump process. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/recovery/restore_id_post.md b/openapi-specs/compute/30-03/desc/recovery/restore_id_post.md index 850fceeaa..e424641cc 100644 --- a/openapi-specs/compute/30-03/desc/recovery/restore_id_post.md +++ b/openapi-specs/compute/30-03/desc/recovery/restore_id_post.md @@ -5,7 +5,7 @@ Restores Prisma Cloud Compute from the given backup. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/registry/download_get.md b/openapi-specs/compute/30-03/desc/registry/download_get.md index 5a3eb0141..3eef8d50e 100644 --- a/openapi-specs/compute/30-03/desc/registry/download_get.md +++ b/openapi-specs/compute/30-03/desc/registry/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Compliance > Images > Reg Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/registry/get.md b/openapi-specs/compute/30-03/desc/registry/get.md index 96b46382e..7474b119a 100644 --- a/openapi-specs/compute/30-03/desc/registry/get.md +++ b/openapi-specs/compute/30-03/desc/registry/get.md @@ -20,7 +20,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that retrieves a scan report for all images in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -32,7 +32,7 @@ The compact query can be used to get a general overview of the number of Vulnera Refer to the following cURL command that retrieves a compact scan report for the Ubuntu image in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -43,7 +43,7 @@ The name query is synonymous with the filter registry text field in the Console Refer to the following cURL that retrieves the scan report for the image in the registry with the matching **sha256** hash: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -53,7 +53,7 @@ $ curl -k \ Refer to the following cURL command that retrieves the images in the first 10 registries: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/registry/get_registry_progress.md b/openapi-specs/compute/30-03/desc/registry/get_registry_progress.md index 03c5d0896..c08331d5b 100644 --- a/openapi-specs/compute/30-03/desc/registry/get_registry_progress.md +++ b/openapi-specs/compute/30-03/desc/registry/get_registry_progress.md @@ -9,7 +9,7 @@ For a regular scan, use the API path only without any query parameters. Refer to the following example cURL request that retrieves the ongoing scan details for a regular registry scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -63,7 +63,7 @@ For an on-demand scan that is started using the `/registry/scan` endpoint with t Refer to the following example cURL request that retrieves the ongoing scan details for an on-demand registry scan that is started using the `/registry/scan` endpoint for the repository `alpine` with tag `3.16`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/registry/names_get.md b/openapi-specs/compute/30-03/desc/registry/names_get.md index 1e5bed727..f3b8676a8 100644 --- a/openapi-specs/compute/30-03/desc/registry/names_get.md +++ b/openapi-specs/compute/30-03/desc/registry/names_get.md @@ -5,7 +5,7 @@ Retrieves a list of image names from current scanned registry images. The base ` Refer to the following example cURL command that retrieves a list of image names from your scanned registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/registry/scan_post.md b/openapi-specs/compute/30-03/desc/registry/scan_post.md index ce7e19533..96bfd5f16 100644 --- a/openapi-specs/compute/30-03/desc/registry/scan_post.md +++ b/openapi-specs/compute/30-03/desc/registry/scan_post.md @@ -17,7 +17,7 @@ For information on scan result, see [Get Registry Scan Report](https://prisma.pa Refer to the following example cURL command that forces Prisma Cloud Compute to rescan all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -27,7 +27,7 @@ $ curl -k \ Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan a specific image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -52,7 +52,7 @@ For information on scan result, see [Get Registry Scan Report](https://pan.dev/p Refer to the following example cURL command to trigger an on-demand scan for an image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/registry/stop_post.md b/openapi-specs/compute/30-03/desc/registry/stop_post.md index 29e103ac1..05ac2f436 100644 --- a/openapi-specs/compute/30-03/desc/registry/stop_post.md +++ b/openapi-specs/compute/30-03/desc/registry/stop_post.md @@ -5,7 +5,7 @@ Stops current registry scan immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to stop scanning all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/scans/download_get.md b/openapi-specs/compute/30-03/desc/scans/download_get.md index 61a0ccc2d..3785bf562 100644 --- a/openapi-specs/compute/30-03/desc/scans/download_get.md +++ b/openapi-specs/compute/30-03/desc/scans/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Images The following cURL command retrieves and saves your Jenkins and twistcli scan reports to a CSV file called `scans_report.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/scans/filter_get.md b/openapi-specs/compute/30-03/desc/scans/filter_get.md index 58550ad35..df3e9cdb0 100644 --- a/openapi-specs/compute/30-03/desc/scans/filter_get.md +++ b/openapi-specs/compute/30-03/desc/scans/filter_get.md @@ -3,7 +3,7 @@ Retrieves the list of Jenkins projects that have been scanned by the Jenkins plu The following example curl command uses basic auth to retrieve the list of Jenkins project names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/scans/get.md b/openapi-specs/compute/30-03/desc/scans/get.md index 9bc06317f..775d9934f 100644 --- a/openapi-specs/compute/30-03/desc/scans/get.md +++ b/openapi-specs/compute/30-03/desc/scans/get.md @@ -10,7 +10,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command that retrieves the scan reports for all images scanned using the Jenkins CI plugin or the twistcli tool: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -22,7 +22,7 @@ To get the report of a specific scan, add query parameters to narrow the scope o The following cURL command retrieves the scan report for an image with a SHA256 ID of `sha256:f756e84300d8e53006090573dd33abe5b8cfac3e42d104fc4be37f435fe512f3`. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/scans/id_get.md b/openapi-specs/compute/30-03/desc/scans/id_get.md index 7a342ef60..1557b1905 100644 --- a/openapi-specs/compute/30-03/desc/scans/id_get.md +++ b/openapi-specs/compute/30-03/desc/scans/id_get.md @@ -3,7 +3,7 @@ Retrieves all scan reports for images scanned by the Jenkins plugin or twistcli The following example curl command uses basic auth to retrieve the scan report for just an image with a SHA256 ID of `5c3385fd2e76c5c16124c077`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/scripts/console_sh_get.md b/openapi-specs/compute/30-03/desc/scripts/console_sh_get.md index d8f02038f..1622321ca 100644 --- a/openapi-specs/compute/30-03/desc/scripts/console_sh_get.md +++ b/openapi-specs/compute/30-03/desc/scripts/console_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/scripts/defender_ps1_get.md b/openapi-specs/compute/30-03/desc/scripts/defender_ps1_get.md index a47616983..45e4a6133 100644 --- a/openapi-specs/compute/30-03/desc/scripts/defender_ps1_get.md +++ b/openapi-specs/compute/30-03/desc/scripts/defender_ps1_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/scripts/defender_sh_get.md b/openapi-specs/compute/30-03/desc/scripts/defender_sh_get.md index 98ad6cf62..a8a302426 100644 --- a/openapi-specs/compute/30-03/desc/scripts/defender_sh_get.md +++ b/openapi-specs/compute/30-03/desc/scripts/defender_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/serverless/download_get.md b/openapi-specs/compute/30-03/desc/serverless/download_get.md index a8e49ff25..4d7d3adc1 100644 --- a/openapi-specs/compute/30-03/desc/serverless/download_get.md +++ b/openapi-specs/compute/30-03/desc/serverless/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Functio The following cURL command retrieves a list of all serverless resources monitored by Prisma Cloud Compute and saves the results in a CSV file called `serverless.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/serverless/download' \ diff --git a/openapi-specs/compute/30-03/desc/serverless/embed_post.md b/openapi-specs/compute/30-03/desc/serverless/embed_post.md index 6cce784b8..353b5721c 100644 --- a/openapi-specs/compute/30-03/desc/serverless/embed_post.md +++ b/openapi-specs/compute/30-03/desc/serverless/embed_post.md @@ -1,7 +1,7 @@ The following curl command uses basic auth to retrieve a list of all Serverless resources that monitored by Prisma Cloud Compute, and save the results to a CSV file: ```bash -$ curl -k \ +$ curl \ -X POST \ -H "Content-Type: application/octet-stream" \ -u \ diff --git a/openapi-specs/compute/30-03/desc/serverless/get.md b/openapi-specs/compute/30-03/desc/serverless/get.md index 77a0d8a4e..c6c75c480 100644 --- a/openapi-specs/compute/30-03/desc/serverless/get.md +++ b/openapi-specs/compute/30-03/desc/serverless/get.md @@ -10,7 +10,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Functions > Scanned function Refer to the following example cURL command that retrieves the scan reports for serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/serverless/names_get.md b/openapi-specs/compute/30-03/desc/serverless/names_get.md index 62cbcd53b..ab229e0f8 100644 --- a/openapi-specs/compute/30-03/desc/serverless/names_get.md +++ b/openapi-specs/compute/30-03/desc/serverless/names_get.md @@ -1,7 +1,7 @@ The following curl command uses basic auth to retrieve a list of names of all Serverless resources monitored by Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -X GET \ -H "Content-Type: application/json" \ -u \ diff --git a/openapi-specs/compute/30-03/desc/serverless/scan_post.md b/openapi-specs/compute/30-03/desc/serverless/scan_post.md index 159285349..70a3a3b4e 100644 --- a/openapi-specs/compute/30-03/desc/serverless/scan_post.md +++ b/openapi-specs/compute/30-03/desc/serverless/scan_post.md @@ -5,7 +5,7 @@ Re-scan all serverless functions immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/scan diff --git a/openapi-specs/compute/30-03/desc/serverless/stop_post.md b/openapi-specs/compute/30-03/desc/serverless/stop_post.md index 763710842..67c0d2239 100644 --- a/openapi-specs/compute/30-03/desc/serverless/stop_post.md +++ b/openapi-specs/compute/30-03/desc/serverless/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing serverless scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/stop diff --git a/openapi-specs/compute/30-03/desc/settings/alerts_get.md b/openapi-specs/compute/30-03/desc/settings/alerts_get.md index 060114c39..2b25dc6c9 100644 --- a/openapi-specs/compute/30-03/desc/settings/alerts_get.md +++ b/openapi-specs/compute/30-03/desc/settings/alerts_get.md @@ -1,7 +1,7 @@ Retrieves a list of your alert settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/settings/alerts_options_get.md b/openapi-specs/compute/30-03/desc/settings/alerts_options_get.md index 095c1f1b7..aa7a1d250 100644 --- a/openapi-specs/compute/30-03/desc/settings/alerts_options_get.md +++ b/openapi-specs/compute/30-03/desc/settings/alerts_options_get.md @@ -3,7 +3,7 @@ This endpoint will return the alert profile configuration options that can be fo The following example curl command uses basic auth to retrieve all alert profile configuration options: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/settings/alerts_post.md b/openapi-specs/compute/30-03/desc/settings/alerts_post.md index 3acb8d543..cd303f880 100644 --- a/openapi-specs/compute/30-03/desc/settings/alerts_post.md +++ b/openapi-specs/compute/30-03/desc/settings/alerts_post.md @@ -3,7 +3,7 @@ Configure alerts. The following example curl command sets the aggregation period for alerts to one hour. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/settings/certificates_post.md b/openapi-specs/compute/30-03/desc/settings/certificates_post.md index fbdc8a5a9..bd30ea399 100644 --- a/openapi-specs/compute/30-03/desc/settings/certificates_post.md +++ b/openapi-specs/compute/30-03/desc/settings/certificates_post.md @@ -9,7 +9,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to set the validity period for client certificates to seven days: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/30-03/desc/settings/certs_get.md b/openapi-specs/compute/30-03/desc/settings/certs_get.md index ba6674a3c..dbf1d3790 100644 --- a/openapi-specs/compute/30-03/desc/settings/certs_get.md +++ b/openapi-specs/compute/30-03/desc/settings/certs_get.md @@ -6,7 +6,7 @@ Defenders use these names to connect to Console. Refer to the following example cURL request that uses basic auth to retrieve the SANs in Console's cert: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/settings/certs_post.md b/openapi-specs/compute/30-03/desc/settings/certs_post.md index a6e429006..fb2cedee5 100644 --- a/openapi-specs/compute/30-03/desc/settings/certs_post.md +++ b/openapi-specs/compute/30-03/desc/settings/certs_post.md @@ -12,7 +12,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to add `node-01.example.com` to the `subjectAltName` field in the certificate: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/30-03/desc/settings/coderepos_get.md b/openapi-specs/compute/30-03/desc/settings/coderepos_get.md index 6cbfb78cb..286a8d905 100644 --- a/openapi-specs/compute/30-03/desc/settings/coderepos_get.md +++ b/openapi-specs/compute/30-03/desc/settings/coderepos_get.md @@ -20,7 +20,7 @@ Construct the full webhook using Console's publicly accessible DNS name or IP ad Refer to the following example cURL command that retrieves all code repositories to scan, as well as the webhook URL suffix: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/settings/console-certificate_post.md b/openapi-specs/compute/30-03/desc/settings/console-certificate_post.md index 5673af840..392061c8f 100644 --- a/openapi-specs/compute/30-03/desc/settings/console-certificate_post.md +++ b/openapi-specs/compute/30-03/desc/settings/console-certificate_post.md @@ -9,7 +9,7 @@ For the custom TLS certificate for securing browser access, this file must be in Refer to the following example cURL request that uses basic auth and configures the custom certificate to use for securing browser access to the console: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/settings/custom-labels_get.md b/openapi-specs/compute/30-03/desc/settings/custom-labels_get.md index a849dd8a8..19c1cadde 100644 --- a/openapi-specs/compute/30-03/desc/settings/custom-labels_get.md +++ b/openapi-specs/compute/30-03/desc/settings/custom-labels_get.md @@ -5,7 +5,7 @@ Returns the list of alert labels configured in Prisma Cloud Compute. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/settings/custom-labels_post.md b/openapi-specs/compute/30-03/desc/settings/custom-labels_post.md index 6bb66e706..9b0702fe8 100644 --- a/openapi-specs/compute/30-03/desc/settings/custom-labels_post.md +++ b/openapi-specs/compute/30-03/desc/settings/custom-labels_post.md @@ -5,7 +5,7 @@ Creates a custom alert label to augment audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/settings/defender_get.md b/openapi-specs/compute/30-03/desc/settings/defender_get.md index ecb8b6989..cf43bb304 100644 --- a/openapi-specs/compute/30-03/desc/settings/defender_get.md +++ b/openapi-specs/compute/30-03/desc/settings/defender_get.md @@ -5,7 +5,7 @@ Returns the advanced settings for Defenders. Refer to the following example cURL command that gets all advanced settings for Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/settings/forensic_get.md b/openapi-specs/compute/30-03/desc/settings/forensic_get.md index 9c16b70b9..3486b2bf9 100644 --- a/openapi-specs/compute/30-03/desc/settings/forensic_get.md +++ b/openapi-specs/compute/30-03/desc/settings/forensic_get.md @@ -1,7 +1,7 @@ Retrieves the settings for the forensics system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/settings/forensic_post.md b/openapi-specs/compute/30-03/desc/settings/forensic_post.md index 31f809d39..8943842fb 100644 --- a/openapi-specs/compute/30-03/desc/settings/forensic_post.md +++ b/openapi-specs/compute/30-03/desc/settings/forensic_post.md @@ -3,7 +3,7 @@ Configures the forensics system. The following example curl command allocates 100 MB of local disk space for container forensic data and 10 MB for host forensics data. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/settings/initialized_get.md b/openapi-specs/compute/30-03/desc/settings/initialized_get.md index 3134912d1..2af8462f1 100644 --- a/openapi-specs/compute/30-03/desc/settings/initialized_get.md +++ b/openapi-specs/compute/30-03/desc/settings/initialized_get.md @@ -4,7 +4,7 @@ After first installing Console, the first thing you must do is create an admin a Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/settings/intelligence-windows_post.md b/openapi-specs/compute/30-03/desc/settings/intelligence-windows_post.md index c39e256d2..0721dab3b 100644 --- a/openapi-specs/compute/30-03/desc/settings/intelligence-windows_post.md +++ b/openapi-specs/compute/30-03/desc/settings/intelligence-windows_post.md @@ -3,7 +3,7 @@ This endpoint will enable or disable the Windows Intelligence Service from **Man The following example curl command uses basic auth to enable online updates of Windows vulnerabilities from the intelligence stream: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/settings/intelligence_get.md b/openapi-specs/compute/30-03/desc/settings/intelligence_get.md index 26c694246..15e9f24ae 100644 --- a/openapi-specs/compute/30-03/desc/settings/intelligence_get.md +++ b/openapi-specs/compute/30-03/desc/settings/intelligence_get.md @@ -5,7 +5,7 @@ Returns the details about the Intelligence Stream configuration. Refer to the following example cURL command that uses basic auth to retrieve your Intelligence Stream configuration settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/settings/intelligence_post.md b/openapi-specs/compute/30-03/desc/settings/intelligence_post.md index 74b06a3a0..2dbbd0168 100644 --- a/openapi-specs/compute/30-03/desc/settings/intelligence_post.md +++ b/openapi-specs/compute/30-03/desc/settings/intelligence_post.md @@ -7,7 +7,7 @@ For more information, see [Intelligence Stream](https://docs.paloaltonetworks.co Refer to the following example cURL command that uses basic auth to configure settings of your Intelligence Stream. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/settings/latest-version_get.md b/openapi-specs/compute/30-03/desc/settings/latest-version_get.md index c443fa7b5..16601fb5b 100644 --- a/openapi-specs/compute/30-03/desc/settings/latest-version_get.md +++ b/openapi-specs/compute/30-03/desc/settings/latest-version_get.md @@ -3,7 +3,7 @@ Retrieves the version number of the latest available Prisma Cloud Compute releas Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/settings/latest_version_get.md b/openapi-specs/compute/30-03/desc/settings/latest_version_get.md index 18e436668..5c64edff1 100644 --- a/openapi-specs/compute/30-03/desc/settings/latest_version_get.md +++ b/openapi-specs/compute/30-03/desc/settings/latest_version_get.md @@ -1,7 +1,7 @@ This endpoint will return the latest version of the product. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/settings/ldap_get.md b/openapi-specs/compute/30-03/desc/settings/ldap_get.md index 4ad0ad0c9..7d803ba1c 100644 --- a/openapi-specs/compute/30-03/desc/settings/ldap_get.md +++ b/openapi-specs/compute/30-03/desc/settings/ldap_get.md @@ -5,7 +5,7 @@ Returns the LDAP integration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/settings/ldap_post.md b/openapi-specs/compute/30-03/desc/settings/ldap_post.md index c152c7dc5..34bc06ef4 100644 --- a/openapi-specs/compute/30-03/desc/settings/ldap_post.md +++ b/openapi-specs/compute/30-03/desc/settings/ldap_post.md @@ -7,7 +7,7 @@ For more information, see [Active Directory](https://docs.paloaltonetworks.com/p Refer to the following example cURL command that enables the LDAP integration and specifies the parameters required to integrate with an Active Directory service. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/settings/license_get.md b/openapi-specs/compute/30-03/desc/settings/license_get.md index 5c792cae8..2b4b548e3 100644 --- a/openapi-specs/compute/30-03/desc/settings/license_get.md +++ b/openapi-specs/compute/30-03/desc/settings/license_get.md @@ -5,7 +5,7 @@ Returns the details about the installed license. Refer to the following example cURL request that retrieves the license details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/settings/license_post.md b/openapi-specs/compute/30-03/desc/settings/license_post.md index b77800a5f..ce74b0d0f 100644 --- a/openapi-specs/compute/30-03/desc/settings/license_post.md +++ b/openapi-specs/compute/30-03/desc/settings/license_post.md @@ -8,7 +8,7 @@ For more information, see [Licensing](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to set your license: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/settings/logging_get.md b/openapi-specs/compute/30-03/desc/settings/logging_get.md index 6eda3e484..012be5def 100644 --- a/openapi-specs/compute/30-03/desc/settings/logging_get.md +++ b/openapi-specs/compute/30-03/desc/settings/logging_get.md @@ -5,7 +5,7 @@ Returns the logging settings. Refer to the following example cURL request that uses basic auth to retrieve your logging details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/settings/logging_post.md b/openapi-specs/compute/30-03/desc/settings/logging_post.md index 3619d9c0f..8d27ee1b3 100644 --- a/openapi-specs/compute/30-03/desc/settings/logging_post.md +++ b/openapi-specs/compute/30-03/desc/settings/logging_post.md @@ -8,7 +8,7 @@ For more information, see [Logging](https://docs.paloaltonetworks.com/prisma/pri Refer to the following example cURL request that enables verbose scan output for syslog and stdout: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/settings/logon_get.md b/openapi-specs/compute/30-03/desc/settings/logon_get.md index 1559f2405..b1e9164f2 100644 --- a/openapi-specs/compute/30-03/desc/settings/logon_get.md +++ b/openapi-specs/compute/30-03/desc/settings/logon_get.md @@ -5,7 +5,7 @@ Configures the logon settings. Refer to the following example cURL request that uses basic auth to retrieve all current logon settings. ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/settings/logon_post.md b/openapi-specs/compute/30-03/desc/settings/logon_post.md index 5c2b60c9f..691e082fe 100644 --- a/openapi-specs/compute/30-03/desc/settings/logon_post.md +++ b/openapi-specs/compute/30-03/desc/settings/logon_post.md @@ -7,7 +7,7 @@ For more information, see [Logon Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that uses basic auth to set the timeout to 900 seconds (15 minutes): ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/30-03/desc/settings/oauth_get.md b/openapi-specs/compute/30-03/desc/settings/oauth_get.md index 6dcf70fb5..5d997f016 100644 --- a/openapi-specs/compute/30-03/desc/settings/oauth_get.md +++ b/openapi-specs/compute/30-03/desc/settings/oauth_get.md @@ -5,7 +5,7 @@ Returns the OAuth configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/settings/oauth_post.md b/openapi-specs/compute/30-03/desc/settings/oauth_post.md index c593b9237..da3c83d2f 100644 --- a/openapi-specs/compute/30-03/desc/settings/oauth_post.md +++ b/openapi-specs/compute/30-03/desc/settings/oauth_post.md @@ -7,7 +7,7 @@ For more information, see [GitHub OAuth](https://docs.paloaltonetworks.com/prism Refer to the following example cURL response: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/settings/oidc_get.md b/openapi-specs/compute/30-03/desc/settings/oidc_get.md index ee439622b..1f27f93ba 100644 --- a/openapi-specs/compute/30-03/desc/settings/oidc_get.md +++ b/openapi-specs/compute/30-03/desc/settings/oidc_get.md @@ -5,7 +5,7 @@ Returns the OpenID Connect configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/settings/oidc_post.md b/openapi-specs/compute/30-03/desc/settings/oidc_post.md index e0270247e..5bd3a9192 100644 --- a/openapi-specs/compute/30-03/desc/settings/oidc_post.md +++ b/openapi-specs/compute/30-03/desc/settings/oidc_post.md @@ -7,7 +7,7 @@ For more information, see [OIDC](https://docs.paloaltonetworks.com/prisma/prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/settings/pcf_get.md b/openapi-specs/compute/30-03/desc/settings/pcf_get.md index 5dc21eb17..c5e42a823 100644 --- a/openapi-specs/compute/30-03/desc/settings/pcf_get.md +++ b/openapi-specs/compute/30-03/desc/settings/pcf_get.md @@ -3,7 +3,7 @@ This endpoint will return settings for PCF (Pivotal Cloud Foundry)Blobstore scan The following example curl command uses basic auth to retrieve the current PCF Blobstore scanning settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/settings/pcf_post.md b/openapi-specs/compute/30-03/desc/settings/pcf_post.md index 139e947cb..657e14f27 100644 --- a/openapi-specs/compute/30-03/desc/settings/pcf_post.md +++ b/openapi-specs/compute/30-03/desc/settings/pcf_post.md @@ -3,7 +3,7 @@ This endpoint will allow for updating settings for PCF (Pivotal Cloud Foundry) B The following example curl command uses basic auth to set up a PCF Blobstore scanner that scans the last `5` droplets for every droplet in the PCF Blobstore: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/settings/projects_get.md b/openapi-specs/compute/30-03/desc/settings/projects_get.md index f5dd20395..bc95414a1 100644 --- a/openapi-specs/compute/30-03/desc/settings/projects_get.md +++ b/openapi-specs/compute/30-03/desc/settings/projects_get.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command retrieves the state of the Projects feature from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ All API calls must be proxied through Central Console, where the request is auto To retrieve the Projects settings from a supervisor Console, append the `project` query parameter to your request. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/settings/projects_post.md b/openapi-specs/compute/30-03/desc/settings/projects_post.md index d29f8e9d5..b3472e6b9 100644 --- a/openapi-specs/compute/30-03/desc/settings/projects_post.md +++ b/openapi-specs/compute/30-03/desc/settings/projects_post.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command designates `` as master. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/settings/proxy_get.md b/openapi-specs/compute/30-03/desc/settings/proxy_get.md index 9a4922d59..477563069 100644 --- a/openapi-specs/compute/30-03/desc/settings/proxy_get.md +++ b/openapi-specs/compute/30-03/desc/settings/proxy_get.md @@ -5,7 +5,7 @@ Returns the proxy settings for Prisma Cloud Compute containers to access the Int Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/settings/proxy_post.md b/openapi-specs/compute/30-03/desc/settings/proxy_post.md index a1bdc07ed..df926524e 100644 --- a/openapi-specs/compute/30-03/desc/settings/proxy_post.md +++ b/openapi-specs/compute/30-03/desc/settings/proxy_post.md @@ -7,7 +7,7 @@ For more information, see [Proxy Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that specifies the proxy to use to access the Internet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/settings/registry_get.md b/openapi-specs/compute/30-03/desc/settings/registry_get.md index 12745005d..64e70b698 100644 --- a/openapi-specs/compute/30-03/desc/settings/registry_get.md +++ b/openapi-specs/compute/30-03/desc/settings/registry_get.md @@ -17,7 +17,7 @@ Construct the full webhook using the publicly accessible DNS name or IP address, The following cURL command retrieves all the registries to scan and the URL suffix for the registry's webhook URL suffix. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/settings/registry_post.md b/openapi-specs/compute/30-03/desc/settings/registry_post.md index 0fae2c481..f9ff1b8e6 100644 --- a/openapi-specs/compute/30-03/desc/settings/registry_post.md +++ b/openapi-specs/compute/30-03/desc/settings/registry_post.md @@ -30,7 +30,7 @@ The API response returns an HTTP 400 error, if the number of registry specificat Refer to the following example cURL command that configures Prisma Cloud Compute to scan the Ubuntu 16.04 repository on Docker Hub: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -64,7 +64,7 @@ To add settings for a GitLab Container Registry, you must specify the following Refer to the following example cURL command: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/settings/registry_put.md b/openapi-specs/compute/30-03/desc/settings/registry_put.md index 3768914f6..75d6c79a2 100644 --- a/openapi-specs/compute/30-03/desc/settings/registry_put.md +++ b/openapi-specs/compute/30-03/desc/settings/registry_put.md @@ -127,7 +127,7 @@ To remove a registry from the list: To delete all entries, submit an empty `specifications` array. For example: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/30-03/desc/settings/saml_get.md b/openapi-specs/compute/30-03/desc/settings/saml_get.md index f2228a440..4fb940e80 100644 --- a/openapi-specs/compute/30-03/desc/settings/saml_get.md +++ b/openapi-specs/compute/30-03/desc/settings/saml_get.md @@ -5,7 +5,7 @@ Returns the configured SAML settings that is used to authenticate to the Prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/settings/saml_post.md b/openapi-specs/compute/30-03/desc/settings/saml_post.md index 0bd9c4a25..dfe8d380f 100644 --- a/openapi-specs/compute/30-03/desc/settings/saml_post.md +++ b/openapi-specs/compute/30-03/desc/settings/saml_post.md @@ -7,7 +7,7 @@ For more information, see [Okta via SAML 2.0](https://docs.paloaltonetworks.com/ Refer to the following example cURL request that uses the basic auth to set up and enable the SAML integration with Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/settings/scan_get.md b/openapi-specs/compute/30-03/desc/settings/scan_get.md index 5c1df30a2..543ea7662 100644 --- a/openapi-specs/compute/30-03/desc/settings/scan_get.md +++ b/openapi-specs/compute/30-03/desc/settings/scan_get.md @@ -5,7 +5,7 @@ Returns the global settings for image, host, container, and registry scanning. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/settings/scan_post.md b/openapi-specs/compute/30-03/desc/settings/scan_post.md index f043d1c9f..9ddb521a2 100644 --- a/openapi-specs/compute/30-03/desc/settings/scan_post.md +++ b/openapi-specs/compute/30-03/desc/settings/scan_post.md @@ -9,7 +9,7 @@ Refer to the following example cURL request that configures the following scan i * Scan images, containers, and hosts once per day. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/settings/secrets_get.md b/openapi-specs/compute/30-03/desc/settings/secrets_get.md index 75e2b32c7..339009641 100644 --- a/openapi-specs/compute/30-03/desc/settings/secrets_get.md +++ b/openapi-specs/compute/30-03/desc/settings/secrets_get.md @@ -3,7 +3,7 @@ This endpoint will return configured secret store already configured in the cons The following example curl command retrieves any configured secret stores, as well as the refresh period in hours: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/settings/secrets_post.md b/openapi-specs/compute/30-03/desc/settings/secrets_post.md index d302ecdf8..730d031bf 100644 --- a/openapi-specs/compute/30-03/desc/settings/secrets_post.md +++ b/openapi-specs/compute/30-03/desc/settings/secrets_post.md @@ -5,7 +5,7 @@ Please note the data structure returned from endpoint /settings/secrets GET to s Refer to the following example curl command that adds a CyberArk secret store to the console with the appID set to `Prisma_Cloud_Compute_Console` and set the URL to `https://services-myca.twistlock.com:10882`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/settings/serverless-scan_get.md b/openapi-specs/compute/30-03/desc/settings/serverless-scan_get.md index bb8ce06ba..eb42e4a12 100644 --- a/openapi-specs/compute/30-03/desc/settings/serverless-scan_get.md +++ b/openapi-specs/compute/30-03/desc/settings/serverless-scan_get.md @@ -8,7 +8,7 @@ This endpoint maps to the **Function scope** table data in the **Defend > Vulner Refer to the following example cURL command that retrieves a list of serverless scan scopes: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/settings/serverless_get.md b/openapi-specs/compute/30-03/desc/settings/serverless_get.md index b6122c460..8c654807c 100644 --- a/openapi-specs/compute/30-03/desc/settings/serverless_get.md +++ b/openapi-specs/compute/30-03/desc/settings/serverless_get.md @@ -3,7 +3,7 @@ This endpoint will return any configured serverless function scanners found in * The following example curl command uses basic auth to retrieve serverless settings in an array, sorted by Cloud Provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/settings/serverless_post.md b/openapi-specs/compute/30-03/desc/settings/serverless_post.md index 6e26ea1d3..c0e0f3225 100644 --- a/openapi-specs/compute/30-03/desc/settings/serverless_post.md +++ b/openapi-specs/compute/30-03/desc/settings/serverless_post.md @@ -3,7 +3,7 @@ This endpoint will add serverless function providers to scan for vulnerabilities The following example curl command uses basic auth to add a serverless account to scan for serverless functions. This is assuming that you already have the [credential](https://docs.twistlock.com/docs/latest/configure/credentials_store.html) added to the console that is needed to scan that provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/settings/system_get.md b/openapi-specs/compute/30-03/desc/settings/system_get.md index 6f893abf0..0e8a3cba3 100644 --- a/openapi-specs/compute/30-03/desc/settings/system_get.md +++ b/openapi-specs/compute/30-03/desc/settings/system_get.md @@ -3,7 +3,7 @@ This endpoint will return all system settings in JSON format. The following example curl command does exactly that: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/settings/tas_get.md b/openapi-specs/compute/30-03/desc/settings/tas_get.md index 52f392433..d2d0017f0 100644 --- a/openapi-specs/compute/30-03/desc/settings/tas_get.md +++ b/openapi-specs/compute/30-03/desc/settings/tas_get.md @@ -5,7 +5,7 @@ Retrieves Tanzu Application Service (TAS) settings. Refer to the following example cURL command that retrieves all TAS settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/settings/telemetry_get.md b/openapi-specs/compute/30-03/desc/settings/telemetry_get.md index 6460c3fc3..46a807e77 100644 --- a/openapi-specs/compute/30-03/desc/settings/telemetry_get.md +++ b/openapi-specs/compute/30-03/desc/settings/telemetry_get.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that retrieves the settings if telemetry is enabled or not: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/settings/telemetry_post.md b/openapi-specs/compute/30-03/desc/settings/telemetry_post.md index bc97a6d0f..662846f33 100644 --- a/openapi-specs/compute/30-03/desc/settings/telemetry_post.md +++ b/openapi-specs/compute/30-03/desc/settings/telemetry_post.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to turn off telemetry: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/settings/trusted_certificate_post.md b/openapi-specs/compute/30-03/desc/settings/trusted_certificate_post.md index 5a2a30bda..c54b96fa5 100644 --- a/openapi-specs/compute/30-03/desc/settings/trusted_certificate_post.md +++ b/openapi-specs/compute/30-03/desc/settings/trusted_certificate_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/trusted-certificates` endpoint. Refer to the following example cURL request that uses basic auth to add a certificate to the list: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/30-03/desc/settings/trusted_certificates_post.md b/openapi-specs/compute/30-03/desc/settings/trusted_certificates_post.md index 78c07982b..e9bdc72a1 100644 --- a/openapi-specs/compute/30-03/desc/settings/trusted_certificates_post.md +++ b/openapi-specs/compute/30-03/desc/settings/trusted_certificates_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/certificates` endpoint. Refer to the following example cURL request that uses basic auth to enable this feature: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/30-03/desc/settings/vm_get.md b/openapi-specs/compute/30-03/desc/settings/vm_get.md index 8043742f5..b98b94240 100644 --- a/openapi-specs/compute/30-03/desc/settings/vm_get.md +++ b/openapi-specs/compute/30-03/desc/settings/vm_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **VM images scope** table data in the **Defend > Vulne Refer to the following example cURL command that retrieves all the scopes used for pattern matching on VM functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/signup/post.md b/openapi-specs/compute/30-03/desc/signup/post.md index 1db21df29..67344a0b1 100644 --- a/openapi-specs/compute/30-03/desc/signup/post.md +++ b/openapi-specs/compute/30-03/desc/signup/post.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i The following cURL command creates the initial admin user with the username `admin` and password `password`. ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -X POST \ -d '{"username": "admin", "password": "password"}' \ diff --git a/openapi-specs/compute/30-03/desc/static/capabilities_get.md b/openapi-specs/compute/30-03/desc/static/capabilities_get.md index ea119d2a9..f9b60278c 100644 --- a/openapi-specs/compute/30-03/desc/static/capabilities_get.md +++ b/openapi-specs/compute/30-03/desc/static/capabilities_get.md @@ -1,7 +1,7 @@ Returns a list of capabilities used in host models. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/static/regions_get.md b/openapi-specs/compute/30-03/desc/static/regions_get.md index 4a07097ee..3b1adb5f1 100644 --- a/openapi-specs/compute/30-03/desc/static/regions_get.md +++ b/openapi-specs/compute/30-03/desc/static/regions_get.md @@ -1,7 +1,7 @@ Returns a list of regions used in cloud radar. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/static/syscalls_get.md b/openapi-specs/compute/30-03/desc/static/syscalls_get.md index 9e2ddcde7..09505ba39 100644 --- a/openapi-specs/compute/30-03/desc/static/syscalls_get.md +++ b/openapi-specs/compute/30-03/desc/static/syscalls_get.md @@ -2,7 +2,7 @@ Returns a list of the Linux kernel system calls. Runtime rules for containers can allow-list and deny-list specific system calls. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/static/vulnerabilities_get.md b/openapi-specs/compute/30-03/desc/static/vulnerabilities_get.md index cb6acab28..19809472b 100644 --- a/openapi-specs/compute/30-03/desc/static/vulnerabilities_get.md +++ b/openapi-specs/compute/30-03/desc/static/vulnerabilities_get.md @@ -3,7 +3,7 @@ This data can be used for building out reports with the API. This data can be correlated with the `/api/v1/images` endpoint, specifically the the `complianceVulnerabilities` and `cveVulnerabilities` objects, to generate more thorough reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/stats/compliance.md b/openapi-specs/compute/30-03/desc/stats/compliance.md index 5c5be3991..4f4c90071 100644 --- a/openapi-specs/compute/30-03/desc/stats/compliance.md +++ b/openapi-specs/compute/30-03/desc/stats/compliance.md @@ -5,7 +5,7 @@ For the current day, the response will also include detailed compliance stats fo The following example command that uses curl and basic auth to retrieve compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/stats/compliance_get.md b/openapi-specs/compute/30-03/desc/stats/compliance_get.md index 314f6a179..2ef2f9f75 100644 --- a/openapi-specs/compute/30-03/desc/stats/compliance_get.md +++ b/openapi-specs/compute/30-03/desc/stats/compliance_get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Compliance > Compliance explorer* Refer to the following example cURL command that retrieves compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/stats/compliance_refresh.md b/openapi-specs/compute/30-03/desc/stats/compliance_refresh.md index b75491a69..d8ce211a8 100644 --- a/openapi-specs/compute/30-03/desc/stats/compliance_refresh.md +++ b/openapi-specs/compute/30-03/desc/stats/compliance_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/compliance endpoint return The following example command that uses curl and basic auth to refresh compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/stats/compliance_refresh_post.md b/openapi-specs/compute/30-03/desc/stats/compliance_refresh_post.md index 541a54d16..0f329d1db 100644 --- a/openapi-specs/compute/30-03/desc/stats/compliance_refresh_post.md +++ b/openapi-specs/compute/30-03/desc/stats/compliance_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/compliance`, b Refer to the following example cURL command that refreshes compliance statistics for the current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/stats/daily.md b/openapi-specs/compute/30-03/desc/stats/daily.md index 082f58a27..9fd4c6138 100644 --- a/openapi-specs/compute/30-03/desc/stats/daily.md +++ b/openapi-specs/compute/30-03/desc/stats/daily.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/stats/daily_get.md b/openapi-specs/compute/30-03/desc/stats/daily_get.md index 0db89bdc3..fe852126c 100644 --- a/openapi-specs/compute/30-03/desc/stats/daily_get.md +++ b/openapi-specs/compute/30-03/desc/stats/daily_get.md @@ -3,7 +3,7 @@ Returns a historical list of per-day statistics for the resources protected by P The following example command uses curl and basic auth to retrieve the daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/stats/dashboard.md b/openapi-specs/compute/30-03/desc/stats/dashboard.md index be90a2d32..1e5fabf08 100644 --- a/openapi-specs/compute/30-03/desc/stats/dashboard.md +++ b/openapi-specs/compute/30-03/desc/stats/dashboard.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/stats/dashboard_get.md b/openapi-specs/compute/30-03/desc/stats/dashboard_get.md index 601769645..8f0bc827c 100644 --- a/openapi-specs/compute/30-03/desc/stats/dashboard_get.md +++ b/openapi-specs/compute/30-03/desc/stats/dashboard_get.md @@ -5,7 +5,7 @@ Returns statistics about the resources protected by Prisma Cloud Compute, includ Refer to the following example cURL command that retrieves dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/stats/events_get.md b/openapi-specs/compute/30-03/desc/stats/events_get.md index 3be5eb4e7..e64f98e57 100644 --- a/openapi-specs/compute/30-03/desc/stats/events_get.md +++ b/openapi-specs/compute/30-03/desc/stats/events_get.md @@ -5,7 +5,7 @@ Returns events statistics for your environment. Refer to the following example cURL command retrieves event stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/stats/vulnerabilities.md b/openapi-specs/compute/30-03/desc/stats/vulnerabilities.md index 40c4dd1f1..199cfab62 100644 --- a/openapi-specs/compute/30-03/desc/stats/vulnerabilities.md +++ b/openapi-specs/compute/30-03/desc/stats/vulnerabilities.md @@ -5,7 +5,7 @@ For the current day, the response will also include descriptions of the CVEs cur The following example command that uses curl and basic auth to retrieve vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/stats/vulnerabilities_download_get.md b/openapi-specs/compute/30-03/desc/stats/vulnerabilities_download_get.md index 753af8c7f..9930a636b 100644 --- a/openapi-specs/compute/30-03/desc/stats/vulnerabilities_download_get.md +++ b/openapi-specs/compute/30-03/desc/stats/vulnerabilities_download_get.md @@ -17,7 +17,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a summary count of the CVEs and detailed descriptions for each CVE in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/stats/vulnerabilities_get.md b/openapi-specs/compute/30-03/desc/stats/vulnerabilities_get.md index 1a6f1c152..aaa5a907b 100644 --- a/openapi-specs/compute/30-03/desc/stats/vulnerabilities_get.md +++ b/openapi-specs/compute/30-03/desc/stats/vulnerabilities_get.md @@ -19,7 +19,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a summary count of the CVEs and detailed descriptions for each CVE: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/stats/vulnerabilities_impacted_resources_download_get.md b/openapi-specs/compute/30-03/desc/stats/vulnerabilities_impacted_resources_download_get.md index 0821d6a9f..502c09a6c 100644 --- a/openapi-specs/compute/30-03/desc/stats/vulnerabilities_impacted_resources_download_get.md +++ b/openapi-specs/compute/30-03/desc/stats/vulnerabilities_impacted_resources_download_get.md @@ -15,7 +15,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a list of impacted resources for `CVE-2015-0313` in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/stats/vulnerabilities_impacted_resources_get.md b/openapi-specs/compute/30-03/desc/stats/vulnerabilities_impacted_resources_get.md index c1e6d0ba2..014a5f4a2 100644 --- a/openapi-specs/compute/30-03/desc/stats/vulnerabilities_impacted_resources_get.md +++ b/openapi-specs/compute/30-03/desc/stats/vulnerabilities_impacted_resources_get.md @@ -18,7 +18,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a list of impacted resources for `CVE-2022-28391`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -95,7 +95,7 @@ Refer to the following example JSON response that shows the risk tree for the im Refer to the following example cURL command that retrieves a the impacted registry images `CVE-2015-0313` by using an optional query parameter `resourceType`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -108,7 +108,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a paginated list of impacted resources for `CVE-2015-0313` by using optional query parameters `limit` and `offset`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/stats/vulnerabilities_refresh.md b/openapi-specs/compute/30-03/desc/stats/vulnerabilities_refresh.md index 505a99d98..2aa7da8a1 100644 --- a/openapi-specs/compute/30-03/desc/stats/vulnerabilities_refresh.md +++ b/openapi-specs/compute/30-03/desc/stats/vulnerabilities_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/vulnerabilities endpoint r The following example command that uses curl and basic auth to refresh vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/stats/vulnerabilities_refresh_post.md b/openapi-specs/compute/30-03/desc/stats/vulnerabilities_refresh_post.md index 1e3210e18..85e3ddd7a 100644 --- a/openapi-specs/compute/30-03/desc/stats/vulnerabilities_refresh_post.md +++ b/openapi-specs/compute/30-03/desc/stats/vulnerabilities_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/vulnerabilitie Refer to the following example cURL command that refreshes the vulnerability statistics for current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/stats/workload_get.md b/openapi-specs/compute/30-03/desc/stats/workload_get.md index a25deed5c..940a835ee 100644 --- a/openapi-specs/compute/30-03/desc/stats/workload_get.md +++ b/openapi-specs/compute/30-03/desc/stats/workload_get.md @@ -1,7 +1,7 @@ Returns the workload statistics from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/statuses/intelligence.md b/openapi-specs/compute/30-03/desc/statuses/intelligence.md index 74da8c7ff..ac102e81f 100644 --- a/openapi-specs/compute/30-03/desc/statuses/intelligence.md +++ b/openapi-specs/compute/30-03/desc/statuses/intelligence.md @@ -3,7 +3,7 @@ Returns the connection status of the intelligence stream and the last intelligen The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/statuses/intelligence_get.md b/openapi-specs/compute/30-03/desc/statuses/intelligence_get.md index c18dd9611..b5f620ad9 100644 --- a/openapi-specs/compute/30-03/desc/statuses/intelligence_get.md +++ b/openapi-specs/compute/30-03/desc/statuses/intelligence_get.md @@ -3,7 +3,7 @@ Returns the connection status for the Intelligence Stream, along with the time o The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/statuses/registry_get.md b/openapi-specs/compute/30-03/desc/statuses/registry_get.md index 427c4915c..e4fd09fe9 100644 --- a/openapi-specs/compute/30-03/desc/statuses/registry_get.md +++ b/openapi-specs/compute/30-03/desc/statuses/registry_get.md @@ -13,7 +13,7 @@ To view the more details about the progress of a regular or on-demand registry s Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/statuses/secrets_get.md b/openapi-specs/compute/30-03/desc/statuses/secrets_get.md index 510f15161..e77c5ed70 100644 --- a/openapi-specs/compute/30-03/desc/statuses/secrets_get.md +++ b/openapi-specs/compute/30-03/desc/statuses/secrets_get.md @@ -3,7 +3,7 @@ Returns the connection status of any secret stores you have configured, as well The following is an example curl using basic auth to find the secret store status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/statuses/serverless-radar_get.md b/openapi-specs/compute/30-03/desc/statuses/serverless-radar_get.md index 3bfdbb5bf..4ab5d0c1d 100644 --- a/openapi-specs/compute/30-03/desc/statuses/serverless-radar_get.md +++ b/openapi-specs/compute/30-03/desc/statuses/serverless-radar_get.md @@ -1,7 +1,7 @@ Returns the status of the serverless scans. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/tags/get.md b/openapi-specs/compute/30-03/desc/tags/get.md index 6da7ad135..604eee98e 100644 --- a/openapi-specs/compute/30-03/desc/tags/get.md +++ b/openapi-specs/compute/30-03/desc/tags/get.md @@ -5,7 +5,7 @@ Retrieves a list of tags. Refer to the following example cURL command that retrieves a list of tags: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/tags/name_delete.md b/openapi-specs/compute/30-03/desc/tags/name_delete.md index 2ed010e57..6dedfce8f 100644 --- a/openapi-specs/compute/30-03/desc/tags/name_delete.md +++ b/openapi-specs/compute/30-03/desc/tags/name_delete.md @@ -5,7 +5,7 @@ Deletes a tag from the system. Refer to the following example cURL command that deletes a tag named *my tag*: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/30-03/desc/tags/name_put.md b/openapi-specs/compute/30-03/desc/tags/name_put.md index cbaea40d3..a5923b8ef 100644 --- a/openapi-specs/compute/30-03/desc/tags/name_put.md +++ b/openapi-specs/compute/30-03/desc/tags/name_put.md @@ -9,7 +9,7 @@ You must define all parameters in your PUT request. Refer to the following example cURL command that updates the parameters in a tag named `my_tag`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/30-03/desc/tags/post.md b/openapi-specs/compute/30-03/desc/tags/post.md index d55ae8b96..8e1a493d6 100644 --- a/openapi-specs/compute/30-03/desc/tags/post.md +++ b/openapi-specs/compute/30-03/desc/tags/post.md @@ -8,7 +8,7 @@ You can use tags as policy exceptions or assign them to vulnerabilities for acti Refer to the following example cURL command that creates a tag named "my-tag": ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/tags/tag_cve_delete.md b/openapi-specs/compute/30-03/desc/tags/tag_cve_delete.md index 8caed79cf..3031029b9 100644 --- a/openapi-specs/compute/30-03/desc/tags/tag_cve_delete.md +++ b/openapi-specs/compute/30-03/desc/tags/tag_cve_delete.md @@ -6,7 +6,7 @@ When you delete a tag, the tag is deleted from a wider scope. All the packages a Refer to the following example cURL command that removes the tag named `ignored` from the CVE `CVE-2017-15088`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/30-03/desc/tags/tag_cve_post.md b/openapi-specs/compute/30-03/desc/tags/tag_cve_post.md index 966a80bd8..1b4ead89b 100644 --- a/openapi-specs/compute/30-03/desc/tags/tag_cve_post.md +++ b/openapi-specs/compute/30-03/desc/tags/tag_cve_post.md @@ -45,7 +45,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the source package `perl`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -72,7 +72,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2021-20305` on the binary package `gnutls`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -98,7 +98,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -120,7 +120,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `image` and to all the packages and resources. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -140,7 +140,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `host`, resource `servo-vmware71`, and to all the packages. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/tas-droplets/download_get.md b/openapi-specs/compute/30-03/desc/tas-droplets/download_get.md index 6372f0b35..f9d82820d 100644 --- a/openapi-specs/compute/30-03/desc/tas-droplets/download_get.md +++ b/openapi-specs/compute/30-03/desc/tas-droplets/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > VMware The following cURL command downloads all TAS droplets to a CSV file called `tas_droplets.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/tas-droplets/get.md b/openapi-specs/compute/30-03/desc/tas-droplets/get.md index dd2b44993..a0a97e8ca 100644 --- a/openapi-specs/compute/30-03/desc/tas-droplets/get.md +++ b/openapi-specs/compute/30-03/desc/tas-droplets/get.md @@ -10,7 +10,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > VMware Tanzu bl The following cURL command retrieves all TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/tas-droplets/get_tas_addresses.md b/openapi-specs/compute/30-03/desc/tas-droplets/get_tas_addresses.md index 91ebb2e50..04c6dccb0 100644 --- a/openapi-specs/compute/30-03/desc/tas-droplets/get_tas_addresses.md +++ b/openapi-specs/compute/30-03/desc/tas-droplets/get_tas_addresses.md @@ -9,7 +9,7 @@ You get an HTTP error response 429 if the limit exceeds. The following cURL command retrieves the Cloud Controller Addresses of scanned TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/tas-droplets/progress_get.md b/openapi-specs/compute/30-03/desc/tas-droplets/progress_get.md index 504a21e84..507d001bf 100644 --- a/openapi-specs/compute/30-03/desc/tas-droplets/progress_get.md +++ b/openapi-specs/compute/30-03/desc/tas-droplets/progress_get.md @@ -5,7 +5,7 @@ Returns the details of the TAS Droplets ongoing scan. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/tas-droplets/scan_post.md b/openapi-specs/compute/30-03/desc/tas-droplets/scan_post.md index aad2174af..13c4eeeb9 100644 --- a/openapi-specs/compute/30-03/desc/tas-droplets/scan_post.md +++ b/openapi-specs/compute/30-03/desc/tas-droplets/scan_post.md @@ -5,7 +5,7 @@ Scans the TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/tas-droplets/stop_post.md b/openapi-specs/compute/30-03/desc/tas-droplets/stop_post.md index 5f5a019b1..53d709ec7 100644 --- a/openapi-specs/compute/30-03/desc/tas-droplets/stop_post.md +++ b/openapi-specs/compute/30-03/desc/tas-droplets/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing scan of TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/trust/data_get.md b/openapi-specs/compute/30-03/desc/trust/data_get.md index dd55d47a3..88983f139 100644 --- a/openapi-specs/compute/30-03/desc/trust/data_get.md +++ b/openapi-specs/compute/30-03/desc/trust/data_get.md @@ -5,7 +5,7 @@ Returns the trusted registries, repositories, and images. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/trust/data_put.md b/openapi-specs/compute/30-03/desc/trust/data_put.md index 0e6a0ba49..733514505 100644 --- a/openapi-specs/compute/30-03/desc/trust/data_put.md +++ b/openapi-specs/compute/30-03/desc/trust/data_put.md @@ -6,7 +6,7 @@ Specify trusted images using either the image name or layers properties. Refer to the following example cURL command that uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -19,7 +19,7 @@ To edit a trust group based on image base layers, use PUT to specify a list of S Refer to the following example that specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/30-03/desc/trust/get.md b/openapi-specs/compute/30-03/desc/trust/get.md index 1226cd0a3..57ff5bdb5 100644 --- a/openapi-specs/compute/30-03/desc/trust/get.md +++ b/openapi-specs/compute/30-03/desc/trust/get.md @@ -3,7 +3,7 @@ Retrieves a list of all trusted images. The following example curl command uses basic auth to retrieve all trusted images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/trust/id_delete.md b/openapi-specs/compute/30-03/desc/trust/id_delete.md index b3114775f..d63cdf71a 100644 --- a/openapi-specs/compute/30-03/desc/trust/id_delete.md +++ b/openapi-specs/compute/30-03/desc/trust/id_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to specify a image trust grou ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/30-03/desc/trust/id_put.md b/openapi-specs/compute/30-03/desc/trust/id_put.md index 44d2c8b8b..c98617bcd 100644 --- a/openapi-specs/compute/30-03/desc/trust/id_put.md +++ b/openapi-specs/compute/30-03/desc/trust/id_put.md @@ -9,7 +9,7 @@ For more information about handles, see the `_id` in the response body for the G The following example curl command uses basic auth to modify the image property for an existing trusted image entry, where the handle for the entry is `docker-ubuntu-group`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/30-03/desc/trust/learn_get.md b/openapi-specs/compute/30-03/desc/trust/learn_get.md index d8a3414d0..004b16b02 100644 --- a/openapi-specs/compute/30-03/desc/trust/learn_get.md +++ b/openapi-specs/compute/30-03/desc/trust/learn_get.md @@ -1,7 +1,7 @@ Returns the state of the trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/trust/learn_post.md b/openapi-specs/compute/30-03/desc/trust/learn_post.md index 094817738..008657fa2 100644 --- a/openapi-specs/compute/30-03/desc/trust/learn_post.md +++ b/openapi-specs/compute/30-03/desc/trust/learn_post.md @@ -1,7 +1,7 @@ Sets the state of trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/trust/post.md b/openapi-specs/compute/30-03/desc/trust/post.md index 1072275a1..23a324c6c 100644 --- a/openapi-specs/compute/30-03/desc/trust/post.md +++ b/openapi-specs/compute/30-03/desc/trust/post.md @@ -7,7 +7,7 @@ For more information about handles, see the `_id` key in the response body for t The following example curl command uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ To create a trust group based on image base layers, POST a list of SHA256 hashes The following example specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/users/get.md b/openapi-specs/compute/30-03/desc/users/get.md index e4e6966ec..cd5a661ba 100644 --- a/openapi-specs/compute/30-03/desc/users/get.md +++ b/openapi-specs/compute/30-03/desc/users/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Manage > Authentication > Users** in the Console UI. The following cURL command retrieves all users. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/users/id_delete.md b/openapi-specs/compute/30-03/desc/users/id_delete.md index 1cfa5642d..66a1102f9 100644 --- a/openapi-specs/compute/30-03/desc/users/id_delete.md +++ b/openapi-specs/compute/30-03/desc/users/id_delete.md @@ -17,7 +17,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes user `ID` from the system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/30-03/desc/util/osx_twistcli_arm64_get.md b/openapi-specs/compute/30-03/desc/util/osx_twistcli_arm64_get.md index b385d0d3b..a30686374 100644 --- a/openapi-specs/compute/30-03/desc/util/osx_twistcli_arm64_get.md +++ b/openapi-specs/compute/30-03/desc/util/osx_twistcli_arm64_get.md @@ -7,7 +7,7 @@ Downloads the twistcli binary executable for MacOS platforms based on ARM64 arch Refer to the following example cURL command that downloads and saves the “twistcli” binary executable for ARM64 bit MacOS platforms to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/compute/30-03/desc/util/osx_twistcli_get.md b/openapi-specs/compute/30-03/desc/util/osx_twistcli_get.md index c49f96c41..2353ea338 100644 --- a/openapi-specs/compute/30-03/desc/util/osx_twistcli_get.md +++ b/openapi-specs/compute/30-03/desc/util/osx_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **MacOS platform** hyperlink in **Manage > System > Ut The following cURL command downloads the twistcli binary executable for MacOS platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli \ diff --git a/openapi-specs/compute/30-03/desc/util/twistcli_arm64_get.md b/openapi-specs/compute/30-03/desc/util/twistcli_arm64_get.md index 7ec36d3f5..a3d7318ab 100644 --- a/openapi-specs/compute/30-03/desc/util/twistcli_arm64_get.md +++ b/openapi-specs/compute/30-03/desc/util/twistcli_arm64_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/compute/30-03/desc/util/twistcli_get.md b/openapi-specs/compute/30-03/desc/util/twistcli_get.md index f9d2d295c..08a3ae8aa 100644 --- a/openapi-specs/compute/30-03/desc/util/twistcli_get.md +++ b/openapi-specs/compute/30-03/desc/util/twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -X GET -o \ 'https:///api/v/util/twistcli' diff --git a/openapi-specs/compute/30-03/desc/util/twistlock_jenkins_plugin_get.md b/openapi-specs/compute/30-03/desc/util/twistlock_jenkins_plugin_get.md index 9fb8d4a02..c9f180e5e 100644 --- a/openapi-specs/compute/30-03/desc/util/twistlock_jenkins_plugin_get.md +++ b/openapi-specs/compute/30-03/desc/util/twistlock_jenkins_plugin_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-jenkins-plugin.hpi \ diff --git a/openapi-specs/compute/30-03/desc/util/twistlock_tas_tile_get.md b/openapi-specs/compute/30-03/desc/util/twistlock_tas_tile_get.md index fea28aaad..3fd114e2d 100644 --- a/openapi-specs/compute/30-03/desc/util/twistlock_tas_tile_get.md +++ b/openapi-specs/compute/30-03/desc/util/twistlock_tas_tile_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-tile.pivotal \ diff --git a/openapi-specs/compute/30-03/desc/util/windows_twistcli_get.md b/openapi-specs/compute/30-03/desc/util/windows_twistcli_get.md index 1c545dbbb..38c609b08 100644 --- a/openapi-specs/compute/30-03/desc/util/windows_twistcli_get.md +++ b/openapi-specs/compute/30-03/desc/util/windows_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Windows platform** hyperlink in **Manage > System > The following cURL command downloads the twistcli binary executable for Windows platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli.exe \ diff --git a/openapi-specs/compute/30-03/desc/version/get.md b/openapi-specs/compute/30-03/desc/version/get.md index 28be315e0..5787e90fd 100644 --- a/openapi-specs/compute/30-03/desc/version/get.md +++ b/openapi-specs/compute/30-03/desc/version/get.md @@ -5,7 +5,7 @@ Retrieves the version number for Console. The following cURL command retrieves the version number for Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/vms/download_get.md b/openapi-specs/compute/30-03/desc/vms/download_get.md index e65e4efc9..3cc813bc5 100644 --- a/openapi-specs/compute/30-03/desc/vms/download_get.md +++ b/openapi-specs/compute/30-03/desc/vms/download_get.md @@ -7,7 +7,7 @@ Returns all VM image scan reports in CSV format. Refer to the following example cURL command that retrieves all VM image scan reports and saves the results in a CSV file called `vm_images_scan.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/vms/get.md b/openapi-specs/compute/30-03/desc/vms/get.md index d44d9d801..ad9938124 100644 --- a/openapi-specs/compute/30-03/desc/vms/get.md +++ b/openapi-specs/compute/30-03/desc/vms/get.md @@ -10,7 +10,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > Hosts > VM imag Refer to the following example cURL command that retrieves all VM image scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/vms/labels_get.md b/openapi-specs/compute/30-03/desc/vms/labels_get.md index ad678b30d..eb2674bf6 100644 --- a/openapi-specs/compute/30-03/desc/vms/labels_get.md +++ b/openapi-specs/compute/30-03/desc/vms/labels_get.md @@ -5,7 +5,7 @@ Returns an array of strings containing all AWS tags of the scanned VM images. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/30-03/desc/vms/names_get.md b/openapi-specs/compute/30-03/desc/vms/names_get.md index 0283ed28e..0b905c37b 100644 --- a/openapi-specs/compute/30-03/desc/vms/names_get.md +++ b/openapi-specs/compute/30-03/desc/vms/names_get.md @@ -6,7 +6,7 @@ Returns an array of strings containing VM image names. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/30-03/desc/vms/scan_post.md b/openapi-specs/compute/30-03/desc/vms/scan_post.md index 1caa2dcaf..4d4de3ab1 100644 --- a/openapi-specs/compute/30-03/desc/vms/scan_post.md +++ b/openapi-specs/compute/30-03/desc/vms/scan_post.md @@ -5,7 +5,7 @@ Re-scans all VM images immediately. This endpoint returns the time that the scan Refer to the following example cURL command that forces Prisma Cloud to re-scan all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/30-03/desc/vms/stop_post.md b/openapi-specs/compute/30-03/desc/vms/stop_post.md index 4a74743eb..49b2b26f9 100644 --- a/openapi-specs/compute/30-03/desc/vms/stop_post.md +++ b/openapi-specs/compute/30-03/desc/vms/stop_post.md @@ -7,7 +7,7 @@ Note: It might take a few minutes for the scan to stop completely. Refer to the following example cURL command that forces Prisma Cloud to stop scanning all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/SCAP/get.md b/openapi-specs/compute/31-02/desc/SCAP/get.md index a25abe94e..f5870d822 100644 --- a/openapi-specs/compute/31-02/desc/SCAP/get.md +++ b/openapi-specs/compute/31-02/desc/SCAP/get.md @@ -3,7 +3,7 @@ This endpoint will return any SCAP datastreams uploaded to the console. This end The following is an example curl command that uses basic auth to retrieve any uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/SCAP/id_delete.md b/openapi-specs/compute/31-02/desc/SCAP/id_delete.md index 39f1b0132..52923f20a 100644 --- a/openapi-specs/compute/31-02/desc/SCAP/id_delete.md +++ b/openapi-specs/compute/31-02/desc/SCAP/id_delete.md @@ -3,7 +3,7 @@ This endpoint will delete any SCAP datastreams uploaded to the console. You can The following is an example curl command that uses basic auth to delete an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/31-02/desc/SCAP/post.md b/openapi-specs/compute/31-02/desc/SCAP/post.md index d459a0e97..c45fd6b4e 100644 --- a/openapi-specs/compute/31-02/desc/SCAP/post.md +++ b/openapi-specs/compute/31-02/desc/SCAP/post.md @@ -3,7 +3,7 @@ This endpoint will allow you to add a SCAP datastream to the console. The following is an example curl command that uses basic auth to add an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/_ping/get.md b/openapi-specs/compute/31-02/desc/_ping/get.md index 8e143ef67..b7ffdc653 100644 --- a/openapi-specs/compute/31-02/desc/_ping/get.md +++ b/openapi-specs/compute/31-02/desc/_ping/get.md @@ -5,7 +5,7 @@ Checks if Console is reachable from your network host. Refer to the following cURL example command that pings Console and prints the HTTP response code: ```bash -$ curl -k \ +$ curl \ -s \ -o /dev/null \ -w "%{http_code}\n" \ diff --git a/openapi-specs/compute/31-02/desc/agentless/get_agentless_progress.md b/openapi-specs/compute/31-02/desc/agentless/get_agentless_progress.md index b98ed9da5..78396eec6 100644 --- a/openapi-specs/compute/31-02/desc/agentless/get_agentless_progress.md +++ b/openapi-specs/compute/31-02/desc/agentless/get_agentless_progress.md @@ -5,7 +5,7 @@ Shows the progress of an ongoing scan on hosts or containers for vulnerabilities Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/agentless/post_agentless_scan.md b/openapi-specs/compute/31-02/desc/agentless/post_agentless_scan.md index f1295cdc4..e2f8a4e11 100644 --- a/openapi-specs/compute/31-02/desc/agentless/post_agentless_scan.md +++ b/openapi-specs/compute/31-02/desc/agentless/post_agentless_scan.md @@ -9,7 +9,7 @@ Make sure that you download (use the agentless/templates API) and apply the perm Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/agentless/post_agentless_stop.md b/openapi-specs/compute/31-02/desc/agentless/post_agentless_stop.md index ab83960cc..ddee6ec7a 100644 --- a/openapi-specs/compute/31-02/desc/agentless/post_agentless_stop.md +++ b/openapi-specs/compute/31-02/desc/agentless/post_agentless_stop.md @@ -5,7 +5,7 @@ Stops an ongoing scan on hosts or containers for vulnerabilities and compliance. Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/agentless/post_agentless_templates.md b/openapi-specs/compute/31-02/desc/agentless/post_agentless_templates.md index 96be32555..5159c439a 100644 --- a/openapi-specs/compute/31-02/desc/agentless/post_agentless_templates.md +++ b/openapi-specs/compute/31-02/desc/agentless/post_agentless_templates.md @@ -31,7 +31,7 @@ Add the supported cloud accounts (AWS, Azure, GCP, and OCI) in Prisma Cloud Comp Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/alert-profiles/get.md b/openapi-specs/compute/31-02/desc/alert-profiles/get.md index 82647e248..f17191ac4 100644 --- a/openapi-specs/compute/31-02/desc/alert-profiles/get.md +++ b/openapi-specs/compute/31-02/desc/alert-profiles/get.md @@ -3,7 +3,7 @@ Retrieve a list of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/alert-profiles/id_delete.md b/openapi-specs/compute/31-02/desc/alert-profiles/id_delete.md index 1a67fe20e..2cf21b57e 100644 --- a/openapi-specs/compute/31-02/desc/alert-profiles/id_delete.md +++ b/openapi-specs/compute/31-02/desc/alert-profiles/id_delete.md @@ -5,7 +5,7 @@ This method has no response data. The following example curl command deletes an existing alert profile named `PROFILE-NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/31-02/desc/alert-profiles/names_get.md b/openapi-specs/compute/31-02/desc/alert-profiles/names_get.md index cac14437b..38a1f78ca 100644 --- a/openapi-specs/compute/31-02/desc/alert-profiles/names_get.md +++ b/openapi-specs/compute/31-02/desc/alert-profiles/names_get.md @@ -3,7 +3,7 @@ Retrieve a list of only the names of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles' names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/alert-profiles/post.md b/openapi-specs/compute/31-02/desc/alert-profiles/post.md index 9fa643429..19db863d5 100644 --- a/openapi-specs/compute/31-02/desc/alert-profiles/post.md +++ b/openapi-specs/compute/31-02/desc/alert-profiles/post.md @@ -3,7 +3,7 @@ Update an existing alert profile created in the system. The following example curl command uses basic auth to add a Jira Alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/alert-profiles/test_post.md b/openapi-specs/compute/31-02/desc/alert-profiles/test_post.md index 1fc745efa..2205a6e73 100644 --- a/openapi-specs/compute/31-02/desc/alert-profiles/test_post.md +++ b/openapi-specs/compute/31-02/desc/alert-profiles/test_post.md @@ -3,7 +3,7 @@ Sends a test alert to verify successful configuration of the alert profile setti The following example curl command uses basic auth to send test alert for an email alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/audits/access_delete.md b/openapi-specs/compute/31-02/desc/audits/access_delete.md index 37f33ca64..0450b534c 100644 --- a/openapi-specs/compute/31-02/desc/audits/access_delete.md +++ b/openapi-specs/compute/31-02/desc/audits/access_delete.md @@ -2,7 +2,7 @@ Deletes **all** access audits. This deletion cannot be undone. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/31-02/desc/audits/access_download_get.md b/openapi-specs/compute/31-02/desc/audits/access_download_get.md index 1700deb8d..8d8fee259 100644 --- a/openapi-specs/compute/31-02/desc/audits/access_download_get.md +++ b/openapi-specs/compute/31-02/desc/audits/access_download_get.md @@ -3,7 +3,7 @@ Returns the docker access audit events data in CSV format that are logged and ag **Note**: You can download the access events from Console under **Monitor > Events > Docker audits > Download CSV**. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/access_filters_get.md b/openapi-specs/compute/31-02/desc/audits/access_filters_get.md index 00ac061c1..4b8e9cd9b 100644 --- a/openapi-specs/compute/31-02/desc/audits/access_filters_get.md +++ b/openapi-specs/compute/31-02/desc/audits/access_filters_get.md @@ -5,7 +5,7 @@ The following example uses basic auth to list history of commands that are run o ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ The following command gives list of sudo events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -27,7 +27,7 @@ $ curl -k \ The following command gives list of SSHD events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/access_get.md b/openapi-specs/compute/31-02/desc/audits/access_get.md index 2401391c7..56e53fe12 100644 --- a/openapi-specs/compute/31-02/desc/audits/access_get.md +++ b/openapi-specs/compute/31-02/desc/audits/access_get.md @@ -8,7 +8,7 @@ You can configure Prisma Cloud Compute to log and aggregate events such as sudo Refer to the following example cURL command that gives a list of all access audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/admission_download_get.md b/openapi-specs/compute/31-02/desc/audits/admission_download_get.md index 9571c483f..d45f47c4e 100644 --- a/openapi-specs/compute/31-02/desc/audits/admission_download_get.md +++ b/openapi-specs/compute/31-02/desc/audits/admission_download_get.md @@ -4,7 +4,7 @@ Returns the access admission events data in CSV format that were alerted or bloc Refer to the following example cURL command that downloads the admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/admission_get.md b/openapi-specs/compute/31-02/desc/audits/admission_get.md index 84414496c..3640c737c 100644 --- a/openapi-specs/compute/31-02/desc/audits/admission_get.md +++ b/openapi-specs/compute/31-02/desc/audits/admission_get.md @@ -4,7 +4,7 @@ Returns all activities that were alerted or blocked by Defender functioning as O Refer to the following example cURL command that gives a list of all admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/firewall_network_container_download_get.md b/openapi-specs/compute/31-02/desc/audits/firewall_network_container_download_get.md index 29029ac6d..434e09acd 100644 --- a/openapi-specs/compute/31-02/desc/audits/firewall_network_container_download_get.md +++ b/openapi-specs/compute/31-02/desc/audits/firewall_network_container_download_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/firewall_network_container_get.md b/openapi-specs/compute/31-02/desc/audits/firewall_network_container_get.md index 454558a44..be03b2c45 100644 --- a/openapi-specs/compute/31-02/desc/audits/firewall_network_container_get.md +++ b/openapi-specs/compute/31-02/desc/audits/firewall_network_container_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/firewall_network_host_download_get.md b/openapi-specs/compute/31-02/desc/audits/firewall_network_host_download_get.md index 768dd00d7..e83e8e1c3 100644 --- a/openapi-specs/compute/31-02/desc/audits/firewall_network_host_download_get.md +++ b/openapi-specs/compute/31-02/desc/audits/firewall_network_host_download_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/firewall_network_host_get.md b/openapi-specs/compute/31-02/desc/audits/firewall_network_host_get.md index e5dc4c399..6cbda0d4b 100644 --- a/openapi-specs/compute/31-02/desc/audits/firewall_network_host_get.md +++ b/openapi-specs/compute/31-02/desc/audits/firewall_network_host_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/incidents_archive_patch.md b/openapi-specs/compute/31-02/desc/audits/incidents_archive_patch.md index a1127a001..d1f42eedd 100644 --- a/openapi-specs/compute/31-02/desc/audits/incidents_archive_patch.md +++ b/openapi-specs/compute/31-02/desc/audits/incidents_archive_patch.md @@ -7,7 +7,7 @@ You can get an incident ID from the list of incidents using the endpoint GET /ap Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/compute/31-02/desc/audits/incidents_download_get.md b/openapi-specs/compute/31-02/desc/audits/incidents_download_get.md index 2266c3471..5958756bf 100644 --- a/openapi-specs/compute/31-02/desc/audits/incidents_download_get.md +++ b/openapi-specs/compute/31-02/desc/audits/incidents_download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the **CSV** hyperlink in **Monitor > Runtime > Incident ex The following cURL command downloads all incidents and saves the result in a CSV file called `incidents.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/incidents_filters_get.md b/openapi-specs/compute/31-02/desc/audits/incidents_filters_get.md index 7d1c6f303..856881c90 100644 --- a/openapi-specs/compute/31-02/desc/audits/incidents_filters_get.md +++ b/openapi-specs/compute/31-02/desc/audits/incidents_filters_get.md @@ -3,7 +3,7 @@ This endpoint lists the incident categories found in your environment. The following example lists incident filters. ```bash -$ curl -k \ +$ curl \ -u \ https://console:8083/api/v1/audits/incidents/filters ``` diff --git a/openapi-specs/compute/31-02/desc/audits/incidents_get.md b/openapi-specs/compute/31-02/desc/audits/incidents_get.md index 7724a08c1..9b9451821 100644 --- a/openapi-specs/compute/31-02/desc/audits/incidents_get.md +++ b/openapi-specs/compute/31-02/desc/audits/incidents_get.md @@ -9,7 +9,7 @@ This endpoint maps to the table in **Monitor > Runtime > Incident explorer** in Refer to the following example cURL command that retrieves a list of unacknowledged incidents (not in the archived state): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/kubernetes_download_get.md b/openapi-specs/compute/31-02/desc/audits/kubernetes_download_get.md index 6008bd92a..62992095c 100644 --- a/openapi-specs/compute/31-02/desc/audits/kubernetes_download_get.md +++ b/openapi-specs/compute/31-02/desc/audits/kubernetes_download_get.md @@ -7,7 +7,7 @@ Returns the audit events data that occur in an integrated Kubernetes cluster tha Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/kubernetes_get.md b/openapi-specs/compute/31-02/desc/audits/kubernetes_get.md index e1ecb8a88..2e3f51b71 100644 --- a/openapi-specs/compute/31-02/desc/audits/kubernetes_get.md +++ b/openapi-specs/compute/31-02/desc/audits/kubernetes_get.md @@ -7,7 +7,7 @@ Retrieves events that occur in an integrated Kubernetes cluster that you configu Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/mgmt_download_get.md b/openapi-specs/compute/31-02/desc/audits/mgmt_download_get.md index ae3ef45b6..bcee17342 100644 --- a/openapi-specs/compute/31-02/desc/audits/mgmt_download_get.md +++ b/openapi-specs/compute/31-02/desc/audits/mgmt_download_get.md @@ -10,7 +10,7 @@ Management audits are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/mgmt_filters_get.md b/openapi-specs/compute/31-02/desc/audits/mgmt_filters_get.md index 854977b99..f910a4c2a 100644 --- a/openapi-specs/compute/31-02/desc/audits/mgmt_filters_get.md +++ b/openapi-specs/compute/31-02/desc/audits/mgmt_filters_get.md @@ -6,7 +6,7 @@ Use these filters to query management audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/mgmt_get.md b/openapi-specs/compute/31-02/desc/audits/mgmt_get.md index 5b586cb5e..abe802348 100644 --- a/openapi-specs/compute/31-02/desc/audits/mgmt_get.md +++ b/openapi-specs/compute/31-02/desc/audits/mgmt_get.md @@ -10,7 +10,7 @@ Management audit events are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/runtime_app_embedded_download_get.md b/openapi-specs/compute/31-02/desc/audits/runtime_app_embedded_download_get.md index f3d844ead..ec5ae0f2a 100644 --- a/openapi-specs/compute/31-02/desc/audits/runtime_app_embedded_download_get.md +++ b/openapi-specs/compute/31-02/desc/audits/runtime_app_embedded_download_get.md @@ -5,7 +5,7 @@ Returns the app-embedded runtime audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/runtime_app_embedded_get.md b/openapi-specs/compute/31-02/desc/audits/runtime_app_embedded_get.md index c1d72acfa..51a43b7f5 100644 --- a/openapi-specs/compute/31-02/desc/audits/runtime_app_embedded_get.md +++ b/openapi-specs/compute/31-02/desc/audits/runtime_app_embedded_get.md @@ -5,7 +5,7 @@ Retrieves all app-embedded runtime audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/runtime_container_delete.md b/openapi-specs/compute/31-02/desc/audits/runtime_container_delete.md index ddc8e82d6..62050c71f 100644 --- a/openapi-specs/compute/31-02/desc/audits/runtime_container_delete.md +++ b/openapi-specs/compute/31-02/desc/audits/runtime_container_delete.md @@ -3,7 +3,7 @@ Deletes all container runtime audits. The following example curl command uses basic auth to delete all the audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/31-02/desc/audits/runtime_container_download_get.md b/openapi-specs/compute/31-02/desc/audits/runtime_container_download_get.md index 20e673b5e..81286d929 100644 --- a/openapi-specs/compute/31-02/desc/audits/runtime_container_download_get.md +++ b/openapi-specs/compute/31-02/desc/audits/runtime_container_download_get.md @@ -6,7 +6,7 @@ Returns the container audit events data in CSV format when a runtime sensor such Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o \ diff --git a/openapi-specs/compute/31-02/desc/audits/runtime_container_get.md b/openapi-specs/compute/31-02/desc/audits/runtime_container_get.md index 11beffb24..a6b6ba484 100644 --- a/openapi-specs/compute/31-02/desc/audits/runtime_container_get.md +++ b/openapi-specs/compute/31-02/desc/audits/runtime_container_get.md @@ -7,7 +7,7 @@ Retrieves all container audit events when a runtime sensor such as process, netw Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/runtime_container_timeslice_get.md b/openapi-specs/compute/31-02/desc/audits/runtime_container_timeslice_get.md index f65d477af..01df48f28 100644 --- a/openapi-specs/compute/31-02/desc/audits/runtime_container_timeslice_get.md +++ b/openapi-specs/compute/31-02/desc/audits/runtime_container_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/runtime_file-integrity_download_get.md b/openapi-specs/compute/31-02/desc/audits/runtime_file-integrity_download_get.md index 99ec70c52..234c3ce32 100644 --- a/openapi-specs/compute/31-02/desc/audits/runtime_file-integrity_download_get.md +++ b/openapi-specs/compute/31-02/desc/audits/runtime_file-integrity_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for file-integrity checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/runtime_file-integrity_get.md b/openapi-specs/compute/31-02/desc/audits/runtime_file-integrity_get.md index 53fec9f9f..c31904422 100644 --- a/openapi-specs/compute/31-02/desc/audits/runtime_file-integrity_get.md +++ b/openapi-specs/compute/31-02/desc/audits/runtime_file-integrity_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for file-integrity checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/runtime_host_delete.md b/openapi-specs/compute/31-02/desc/audits/runtime_host_delete.md index 0ab1c877e..2ada9b15a 100644 --- a/openapi-specs/compute/31-02/desc/audits/runtime_host_delete.md +++ b/openapi-specs/compute/31-02/desc/audits/runtime_host_delete.md @@ -3,7 +3,7 @@ Deletes all host audits from the database. The following example curl command uses basic auth to delete all host audits: ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/audits/runtime/host diff --git a/openapi-specs/compute/31-02/desc/audits/runtime_host_download_get.md b/openapi-specs/compute/31-02/desc/audits/runtime_host_download_get.md index 4d0454f56..d85cc39d0 100644 --- a/openapi-specs/compute/31-02/desc/audits/runtime_host_download_get.md +++ b/openapi-specs/compute/31-02/desc/audits/runtime_host_download_get.md @@ -5,7 +5,7 @@ Returns the runtime host audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/runtime_host_get.md b/openapi-specs/compute/31-02/desc/audits/runtime_host_get.md index 044b8b42d..e063550d6 100644 --- a/openapi-specs/compute/31-02/desc/audits/runtime_host_get.md +++ b/openapi-specs/compute/31-02/desc/audits/runtime_host_get.md @@ -5,7 +5,7 @@ Retrieves the runtime host audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/runtime_host_timeslice_get.md b/openapi-specs/compute/31-02/desc/audits/runtime_host_timeslice_get.md index 8933efa74..aafd869b8 100644 --- a/openapi-specs/compute/31-02/desc/audits/runtime_host_timeslice_get.md +++ b/openapi-specs/compute/31-02/desc/audits/runtime_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/runtime_log-inspection_download_get.md b/openapi-specs/compute/31-02/desc/audits/runtime_log-inspection_download_get.md index f047ed96f..0aa1a5710 100644 --- a/openapi-specs/compute/31-02/desc/audits/runtime_log-inspection_download_get.md +++ b/openapi-specs/compute/31-02/desc/audits/runtime_log-inspection_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for log inspection checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/runtime_log-inspection_get.md b/openapi-specs/compute/31-02/desc/audits/runtime_log-inspection_get.md index 49f0d7be4..8292b623e 100644 --- a/openapi-specs/compute/31-02/desc/audits/runtime_log-inspection_get.md +++ b/openapi-specs/compute/31-02/desc/audits/runtime_log-inspection_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for log inspection checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/runtime_rasp_delete.md b/openapi-specs/compute/31-02/desc/audits/runtime_rasp_delete.md index 688e04038..14315c55b 100644 --- a/openapi-specs/compute/31-02/desc/audits/runtime_rasp_delete.md +++ b/openapi-specs/compute/31-02/desc/audits/runtime_rasp_delete.md @@ -1,7 +1,7 @@ Deletes all RASP Defender runtime audits. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/31-02/desc/audits/runtime_rasp_download_get.md b/openapi-specs/compute/31-02/desc/audits/runtime_rasp_download_get.md index 303c75858..11a85100d 100644 --- a/openapi-specs/compute/31-02/desc/audits/runtime_rasp_download_get.md +++ b/openapi-specs/compute/31-02/desc/audits/runtime_rasp_download_get.md @@ -1,7 +1,7 @@ Returns CSV data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/runtime_rasp_get.md b/openapi-specs/compute/31-02/desc/audits/runtime_rasp_get.md index 229d908b1..0475cb149 100644 --- a/openapi-specs/compute/31-02/desc/audits/runtime_rasp_get.md +++ b/openapi-specs/compute/31-02/desc/audits/runtime_rasp_get.md @@ -1,7 +1,7 @@ Returns JSON data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/runtime_serverless_delete.md b/openapi-specs/compute/31-02/desc/audits/runtime_serverless_delete.md index 99ada0515..e27ebe858 100644 --- a/openapi-specs/compute/31-02/desc/audits/runtime_serverless_delete.md +++ b/openapi-specs/compute/31-02/desc/audits/runtime_serverless_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to delete the current audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/31-02/desc/audits/runtime_serverless_download_get.md b/openapi-specs/compute/31-02/desc/audits/runtime_serverless_download_get.md index f829d2342..91693c145 100644 --- a/openapi-specs/compute/31-02/desc/audits/runtime_serverless_download_get.md +++ b/openapi-specs/compute/31-02/desc/audits/runtime_serverless_download_get.md @@ -5,7 +5,7 @@ Returns the scan audit events data in CSV format for any configured serverless f Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/runtime_serverless_filters_get.md b/openapi-specs/compute/31-02/desc/audits/runtime_serverless_filters_get.md index b9bf38610..babda78dd 100644 --- a/openapi-specs/compute/31-02/desc/audits/runtime_serverless_filters_get.md +++ b/openapi-specs/compute/31-02/desc/audits/runtime_serverless_filters_get.md @@ -2,7 +2,7 @@ Returns all serverless filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/runtime_serverless_get.md b/openapi-specs/compute/31-02/desc/audits/runtime_serverless_get.md index 045946886..f6aeb748e 100644 --- a/openapi-specs/compute/31-02/desc/audits/runtime_serverless_get.md +++ b/openapi-specs/compute/31-02/desc/audits/runtime_serverless_get.md @@ -5,7 +5,7 @@ Retrieves all scan events for any configured serverless functions in Prisma Clou Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/runtime_serverless_timeslice_get.md b/openapi-specs/compute/31-02/desc/audits/runtime_serverless_timeslice_get.md index 863890174..a2456cec0 100644 --- a/openapi-specs/compute/31-02/desc/audits/runtime_serverless_timeslice_get.md +++ b/openapi-specs/compute/31-02/desc/audits/runtime_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/trust_delete.md b/openapi-specs/compute/31-02/desc/audits/trust_delete.md index 0bfb2bd81..4aaeef3fe 100644 --- a/openapi-specs/compute/31-02/desc/audits/trust_delete.md +++ b/openapi-specs/compute/31-02/desc/audits/trust_delete.md @@ -1,7 +1,7 @@ Deletes all the trust audits from the events page in Console. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/31-02/desc/audits/trust_download_get.md b/openapi-specs/compute/31-02/desc/audits/trust_download_get.md index 21c0e55a2..234089449 100644 --- a/openapi-specs/compute/31-02/desc/audits/trust_download_get.md +++ b/openapi-specs/compute/31-02/desc/audits/trust_download_get.md @@ -5,7 +5,7 @@ Returns the trust audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/trust_get.md b/openapi-specs/compute/31-02/desc/audits/trust_get.md index 8fb3a341d..de7d47e96 100644 --- a/openapi-specs/compute/31-02/desc/audits/trust_get.md +++ b/openapi-specs/compute/31-02/desc/audits/trust_get.md @@ -4,7 +4,7 @@ Retrieves all the trust audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/waas_agentless_download_get.md b/openapi-specs/compute/31-02/desc/audits/waas_agentless_download_get.md index bbfcd12f5..f930ef6b3 100644 --- a/openapi-specs/compute/31-02/desc/audits/waas_agentless_download_get.md +++ b/openapi-specs/compute/31-02/desc/audits/waas_agentless_download_get.md @@ -7,7 +7,7 @@ Returns the agentless Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/waas_agentless_get.md b/openapi-specs/compute/31-02/desc/audits/waas_agentless_get.md index ad40ae497..b257b0385 100644 --- a/openapi-specs/compute/31-02/desc/audits/waas_agentless_get.md +++ b/openapi-specs/compute/31-02/desc/audits/waas_agentless_get.md @@ -7,7 +7,7 @@ Retrieves all agentless Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/waas_agentless_timeslice_get.md b/openapi-specs/compute/31-02/desc/audits/waas_agentless_timeslice_get.md index 007c6dba3..3eaf34b25 100644 --- a/openapi-specs/compute/31-02/desc/audits/waas_agentless_timeslice_get.md +++ b/openapi-specs/compute/31-02/desc/audits/waas_agentless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/waas_app_embedded_download_get.md b/openapi-specs/compute/31-02/desc/audits/waas_app_embedded_download_get.md index 149c10376..c94aa87b0 100644 --- a/openapi-specs/compute/31-02/desc/audits/waas_app_embedded_download_get.md +++ b/openapi-specs/compute/31-02/desc/audits/waas_app_embedded_download_get.md @@ -6,7 +6,7 @@ Returns the app-embedded WAAS audit events data in CSV format for the specified Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/waas_app_embedded_get.md b/openapi-specs/compute/31-02/desc/audits/waas_app_embedded_get.md index 400fa447d..6318fb299 100644 --- a/openapi-specs/compute/31-02/desc/audits/waas_app_embedded_get.md +++ b/openapi-specs/compute/31-02/desc/audits/waas_app_embedded_get.md @@ -6,7 +6,7 @@ Returns all app-embedded WAAS audit events for the specified query parameters. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/waas_app_embedded_timeslice_get.md b/openapi-specs/compute/31-02/desc/audits/waas_app_embedded_timeslice_get.md index 79a60038e..42a76d08c 100644 --- a/openapi-specs/compute/31-02/desc/audits/waas_app_embedded_timeslice_get.md +++ b/openapi-specs/compute/31-02/desc/audits/waas_app_embedded_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the app-embedded WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/waas_container_download_get.md b/openapi-specs/compute/31-02/desc/audits/waas_container_download_get.md index 9a5e04fad..7d26c34f4 100644 --- a/openapi-specs/compute/31-02/desc/audits/waas_container_download_get.md +++ b/openapi-specs/compute/31-02/desc/audits/waas_container_download_get.md @@ -6,7 +6,7 @@ Returns the container Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that downloads the WAAS container audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/waas_container_get.md b/openapi-specs/compute/31-02/desc/audits/waas_container_get.md index ac0df80fd..c1ad08f3c 100644 --- a/openapi-specs/compute/31-02/desc/audits/waas_container_get.md +++ b/openapi-specs/compute/31-02/desc/audits/waas_container_get.md @@ -6,7 +6,7 @@ Retrieves all container Web-Application and API Security (WAAS) audits. Refer to the following example cURL command that retrieves all container WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/waas_container_timeslice_get.md b/openapi-specs/compute/31-02/desc/audits/waas_container_timeslice_get.md index a56b4c48f..be56260d6 100644 --- a/openapi-specs/compute/31-02/desc/audits/waas_container_timeslice_get.md +++ b/openapi-specs/compute/31-02/desc/audits/waas_container_timeslice_get.md @@ -11,7 +11,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the container WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s):: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/waas_host_download_get.md b/openapi-specs/compute/31-02/desc/audits/waas_host_download_get.md index 4bc66202b..71692e682 100644 --- a/openapi-specs/compute/31-02/desc/audits/waas_host_download_get.md +++ b/openapi-specs/compute/31-02/desc/audits/waas_host_download_get.md @@ -7,7 +7,7 @@ Returns the host Web-Application and API Security (WAAS) audit events data in CS Refer to the following example cURL command that downloads the host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/waas_host_get.md b/openapi-specs/compute/31-02/desc/audits/waas_host_get.md index 14c967594..f6e3df050 100644 --- a/openapi-specs/compute/31-02/desc/audits/waas_host_get.md +++ b/openapi-specs/compute/31-02/desc/audits/waas_host_get.md @@ -7,7 +7,7 @@ Retrieves all host Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/waas_host_timeslice_get.md b/openapi-specs/compute/31-02/desc/audits/waas_host_timeslice_get.md index e28ed7b7a..67b3a54c3 100644 --- a/openapi-specs/compute/31-02/desc/audits/waas_host_timeslice_get.md +++ b/openapi-specs/compute/31-02/desc/audits/waas_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves host WAAS audit events for a specific time frame: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/waas_serverless_download_get.md b/openapi-specs/compute/31-02/desc/audits/waas_serverless_download_get.md index da05504df..0c0dbe698 100644 --- a/openapi-specs/compute/31-02/desc/audits/waas_serverless_download_get.md +++ b/openapi-specs/compute/31-02/desc/audits/waas_serverless_download_get.md @@ -7,7 +7,7 @@ Returns the serverless function Web-Application and API Security (WAAS) audit ev Refer to the following example cURL command that downloads the serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/waas_serverless_get.md b/openapi-specs/compute/31-02/desc/audits/waas_serverless_get.md index fe482a3f3..82488f7ee 100644 --- a/openapi-specs/compute/31-02/desc/audits/waas_serverless_get.md +++ b/openapi-specs/compute/31-02/desc/audits/waas_serverless_get.md @@ -7,7 +7,7 @@ Retrieves all serverless function Web-Application and API Security (WAAS) audit Refer to the following example cURL command that retrieves all serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/audits/waas_serverless_timeslice_get.md b/openapi-specs/compute/31-02/desc/audits/waas_serverless_timeslice_get.md index ec9ff3df1..a0a9a1368 100644 --- a/openapi-specs/compute/31-02/desc/audits/waas_serverless_timeslice_get.md +++ b/openapi-specs/compute/31-02/desc/audits/waas_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the serverless WAAS audit events for a : ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/authenticate-client/post.md b/openapi-specs/compute/31-02/desc/authenticate-client/post.md index bc493d04e..ce6f00afe 100644 --- a/openapi-specs/compute/31-02/desc/authenticate-client/post.md +++ b/openapi-specs/compute/31-02/desc/authenticate-client/post.md @@ -8,7 +8,7 @@ This endpoint checks the supplied client certificate and authorizes the user bas Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X POST \ --cert \ https:///api/v/authenticate-client diff --git a/openapi-specs/compute/31-02/desc/authenticate/post.md b/openapi-specs/compute/31-02/desc/authenticate/post.md index cb018de64..4f85c5d34 100644 --- a/openapi-specs/compute/31-02/desc/authenticate/post.md +++ b/openapi-specs/compute/31-02/desc/authenticate/post.md @@ -9,7 +9,7 @@ You can set the validity period in Console under **Manage > Authentication > Log Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H "Content-Type: application/json" \ -X POST \ -d \ diff --git a/openapi-specs/compute/31-02/desc/authenticate/renew_get.md b/openapi-specs/compute/31-02/desc/authenticate/renew_get.md index 6040d58e1..3458b500a 100644 --- a/openapi-specs/compute/31-02/desc/authenticate/renew_get.md +++ b/openapi-specs/compute/31-02/desc/authenticate/renew_get.md @@ -5,7 +5,7 @@ Renews an old (unexpired) access token and returns a new token. The following cURL command retrieves a new access token using an old access token. ```bash -$ curl -k \ +$ curl \ -H "Authorization: Bearer " \ https:///api/v1/authenticate/renew ``` diff --git a/openapi-specs/compute/31-02/desc/certs/capem_get.md b/openapi-specs/compute/31-02/desc/certs/capem_get.md index f0f0f1bf3..945476c9b 100644 --- a/openapi-specs/compute/31-02/desc/certs/capem_get.md +++ b/openapi-specs/compute/31-02/desc/certs/capem_get.md @@ -5,7 +5,7 @@ Retrieves the Base64-encoded SSL root certificate self-signed by primary certifi Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/certs/client-certs_get.md b/openapi-specs/compute/31-02/desc/certs/client-certs_get.md index d099b3e3d..279d196b1 100644 --- a/openapi-specs/compute/31-02/desc/certs/client-certs_get.md +++ b/openapi-specs/compute/31-02/desc/certs/client-certs_get.md @@ -3,7 +3,7 @@ Downloads a script that installs a client certificate, client private key, and c The following example curl command uses basic auth to download and run the install script for your client certs: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/certs/client-certs.sh | sh diff --git a/openapi-specs/compute/31-02/desc/certs/server-certs_get.md b/openapi-specs/compute/31-02/desc/certs/server-certs_get.md index 0bb13f51d..118a4d9b0 100644 --- a/openapi-specs/compute/31-02/desc/certs/server-certs_get.md +++ b/openapi-specs/compute/31-02/desc/certs/server-certs_get.md @@ -12,7 +12,7 @@ Retrieves the server certificate bundle from Prisma Cloud Compute that contains Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -u \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/cloud/compliance_download_get.md b/openapi-specs/compute/31-02/desc/cloud/compliance_download_get.md index 7b1ec9fea..14f2725b1 100644 --- a/openapi-specs/compute/31-02/desc/cloud/compliance_download_get.md +++ b/openapi-specs/compute/31-02/desc/cloud/compliance_download_get.md @@ -2,7 +2,7 @@ Download all cloud scan data in CSV format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/cloud/compliance_get.md b/openapi-specs/compute/31-02/desc/cloud/compliance_get.md index 48c2fe5bb..ad47e0998 100644 --- a/openapi-specs/compute/31-02/desc/cloud/compliance_get.md +++ b/openapi-specs/compute/31-02/desc/cloud/compliance_get.md @@ -2,7 +2,7 @@ Returns a list of all cloud compliance scan results. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/cloud/compliance_scan_post.md b/openapi-specs/compute/31-02/desc/cloud/compliance_scan_post.md index 7f87bf1f4..7321c3b9d 100644 --- a/openapi-specs/compute/31-02/desc/cloud/compliance_scan_post.md +++ b/openapi-specs/compute/31-02/desc/cloud/compliance_scan_post.md @@ -2,7 +2,7 @@ Initiates a new cloud compliance scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/cloud/compliance_stop_post.md b/openapi-specs/compute/31-02/desc/cloud/compliance_stop_post.md index df0febb56..60c31dc51 100644 --- a/openapi-specs/compute/31-02/desc/cloud/compliance_stop_post.md +++ b/openapi-specs/compute/31-02/desc/cloud/compliance_stop_post.md @@ -2,7 +2,7 @@ Terminates a cloud compliance scan that's in progress.. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/cloud/discovery_download_get.md b/openapi-specs/compute/31-02/desc/cloud/discovery_download_get.md index 44d60a113..a667c8471 100644 --- a/openapi-specs/compute/31-02/desc/cloud/discovery_download_get.md +++ b/openapi-specs/compute/31-02/desc/cloud/discovery_download_get.md @@ -5,7 +5,7 @@ Downloads all cloud scan data in a CSV file. Refer to the following cURL example command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/cloud/discovery_entities_get.md b/openapi-specs/compute/31-02/desc/cloud/discovery_entities_get.md index a7abbdfb6..85f1be971 100644 --- a/openapi-specs/compute/31-02/desc/cloud/discovery_entities_get.md +++ b/openapi-specs/compute/31-02/desc/cloud/discovery_entities_get.md @@ -7,7 +7,7 @@ Use this API endpoint along with the `GET, api/vVERSION/cloud/discovery` to get Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/cloud/discovery_get.md b/openapi-specs/compute/31-02/desc/cloud/discovery_get.md index 28025f140..c2b4c6e3c 100644 --- a/openapi-specs/compute/31-02/desc/cloud/discovery_get.md +++ b/openapi-specs/compute/31-02/desc/cloud/discovery_get.md @@ -8,7 +8,7 @@ Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/cloud/discovery_scan_post.md b/openapi-specs/compute/31-02/desc/cloud/discovery_scan_post.md index 51799ebdb..0717096f8 100644 --- a/openapi-specs/compute/31-02/desc/cloud/discovery_scan_post.md +++ b/openapi-specs/compute/31-02/desc/cloud/discovery_scan_post.md @@ -5,7 +5,7 @@ Initiates a new cloud discovery scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/cloud/discovery_stop_post.md b/openapi-specs/compute/31-02/desc/cloud/discovery_stop_post.md index 6a6c7a5a5..73dbf46e7 100644 --- a/openapi-specs/compute/31-02/desc/cloud/discovery_stop_post.md +++ b/openapi-specs/compute/31-02/desc/cloud/discovery_stop_post.md @@ -5,7 +5,7 @@ Terminates a cloud discovery scan that's in progress. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/cloud/discovery_vms_get.md b/openapi-specs/compute/31-02/desc/cloud/discovery_vms_get.md index 6766f4e5a..2264a27fe 100644 --- a/openapi-specs/compute/31-02/desc/cloud/discovery_vms_get.md +++ b/openapi-specs/compute/31-02/desc/cloud/discovery_vms_get.md @@ -5,7 +5,7 @@ Returns the discovered cloud VM instances. Refer to the following example cURL command that retrieves all the discovered cloud VM instances: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/coderepos/download_get.md b/openapi-specs/compute/31-02/desc/coderepos/download_get.md index 4ec0197bb..b06dd9f17 100644 --- a/openapi-specs/compute/31-02/desc/coderepos/download_get.md +++ b/openapi-specs/compute/31-02/desc/coderepos/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Code re The following cURL command generates a CSV file containing the reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/coderepos/get.md b/openapi-specs/compute/31-02/desc/coderepos/get.md index 54c4e99bf..42dc16fb6 100644 --- a/openapi-specs/compute/31-02/desc/coderepos/get.md +++ b/openapi-specs/compute/31-02/desc/coderepos/get.md @@ -10,7 +10,7 @@ This endpoint maps to the **Code repositories** table in **Monitor > Vulnerabili The following cURL command retrieves all code repository scan reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/collections/get.md b/openapi-specs/compute/31-02/desc/collections/get.md index 99120d17d..5a9e8a50c 100755 --- a/openapi-specs/compute/31-02/desc/collections/get.md +++ b/openapi-specs/compute/31-02/desc/collections/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table in **Manage > Collections and Tags > Collections Refer to the following example cURL command that returns a list of collections: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/collections/name_delete.md b/openapi-specs/compute/31-02/desc/collections/name_delete.md index 3e2debd01..033358000 100755 --- a/openapi-specs/compute/31-02/desc/collections/name_delete.md +++ b/openapi-specs/compute/31-02/desc/collections/name_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that deletes a collection with the name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/31-02/desc/collections/name_usages_get.md b/openapi-specs/compute/31-02/desc/collections/name_usages_get.md index 5c9c40424..89e383cce 100755 --- a/openapi-specs/compute/31-02/desc/collections/name_usages_get.md +++ b/openapi-specs/compute/31-02/desc/collections/name_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that retrieves all policies with name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/containers/count_get.md b/openapi-specs/compute/31-02/desc/containers/count_get.md index 4c6ecdcb4..aca59a913 100644 --- a/openapi-specs/compute/31-02/desc/containers/count_get.md +++ b/openapi-specs/compute/31-02/desc/containers/count_get.md @@ -5,7 +5,7 @@ Returns an integer representing the number of containers in your environment. Refer to the following example cURL command that returns the number of containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/containers/download_get.md b/openapi-specs/compute/31-02/desc/containers/download_get.md index 8f581aabe..d76a8de25 100644 --- a/openapi-specs/compute/31-02/desc/containers/download_get.md +++ b/openapi-specs/compute/31-02/desc/containers/download_get.md @@ -9,7 +9,7 @@ You can download the container scan reports in CSV format in Console under **Mon Refer to the following example cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/containers/filters_get.md b/openapi-specs/compute/31-02/desc/containers/filters_get.md index c8a1dfca4..6c2777819 100644 --- a/openapi-specs/compute/31-02/desc/containers/filters_get.md +++ b/openapi-specs/compute/31-02/desc/containers/filters_get.md @@ -1,7 +1,7 @@ Returns all container filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/containers/get.md b/openapi-specs/compute/31-02/desc/containers/get.md index 4cacdde60..3de9dd4af 100644 --- a/openapi-specs/compute/31-02/desc/containers/get.md +++ b/openapi-specs/compute/31-02/desc/containers/get.md @@ -16,7 +16,7 @@ Refer to the following available options for the `fields` query parameters: Refer to the following example cURL command that retrieves a scan report for all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -26,7 +26,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a scan report for a container with the collection ``: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/containers/labels_get.md b/openapi-specs/compute/31-02/desc/containers/labels_get.md index eb40a748d..7a63ab6fb 100644 --- a/openapi-specs/compute/31-02/desc/containers/labels_get.md +++ b/openapi-specs/compute/31-02/desc/containers/labels_get.md @@ -1,7 +1,7 @@ Returns an array of strings containing all of the labels. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/containers/names_get.md b/openapi-specs/compute/31-02/desc/containers/names_get.md index 8b32465d5..9025e2e10 100644 --- a/openapi-specs/compute/31-02/desc/containers/names_get.md +++ b/openapi-specs/compute/31-02/desc/containers/names_get.md @@ -5,7 +5,7 @@ Returns an array of strings containing all container names. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/containers/scan_post.md b/openapi-specs/compute/31-02/desc/containers/scan_post.md index 6b2bdaaba..56137cf64 100644 --- a/openapi-specs/compute/31-02/desc/containers/scan_post.md +++ b/openapi-specs/compute/31-02/desc/containers/scan_post.md @@ -4,7 +4,7 @@ This endpoint returns the time that the scans were initiated. The following example command uses curl and basic auth to force Prisma Cloud Compute to re-scan all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/credentials/get.md b/openapi-specs/compute/31-02/desc/credentials/get.md index ee4309dee..b807ce8f3 100644 --- a/openapi-specs/compute/31-02/desc/credentials/get.md +++ b/openapi-specs/compute/31-02/desc/credentials/get.md @@ -6,7 +6,7 @@ This endpoint maps to **Manage > Authentication > Credentials store** in the Con Refer to the following example cURL command that retrieves all credentials: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/credentials/id_delete.md b/openapi-specs/compute/31-02/desc/credentials/id_delete.md index e5c70259e..27f090158 100644 --- a/openapi-specs/compute/31-02/desc/credentials/id_delete.md +++ b/openapi-specs/compute/31-02/desc/credentials/id_delete.md @@ -14,7 +14,7 @@ To invoke this endpoint in the Prisma Cloud Compute user interface: Refer to the following example cURL command that deletes an existing credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/31-02/desc/credentials/id_usages_get.md b/openapi-specs/compute/31-02/desc/credentials/id_usages_get.md index 76c1099aa..ca2ce6216 100644 --- a/openapi-specs/compute/31-02/desc/credentials/id_usages_get.md +++ b/openapi-specs/compute/31-02/desc/credentials/id_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following cURL command that retrieves all usages for a credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/curl_examples.md b/openapi-specs/compute/31-02/desc/curl_examples.md index 3d4fcd468..745d21db3 100644 --- a/openapi-specs/compute/31-02/desc/curl_examples.md +++ b/openapi-specs/compute/31-02/desc/curl_examples.md @@ -6,7 +6,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -17,7 +17,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -29,7 +29,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/compute/31-02/desc/custom-compliance/get.md b/openapi-specs/compute/31-02/desc/custom-compliance/get.md index 9022a87b7..9dddcff4e 100644 --- a/openapi-specs/compute/31-02/desc/custom-compliance/get.md +++ b/openapi-specs/compute/31-02/desc/custom-compliance/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example curl command that gets the list of custom compliance checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/custom-compliance/id_delete.md b/openapi-specs/compute/31-02/desc/custom-compliance/id_delete.md index 72c7183ee..f6536e51d 100644 --- a/openapi-specs/compute/31-02/desc/custom-compliance/id_delete.md +++ b/openapi-specs/compute/31-02/desc/custom-compliance/id_delete.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example cURL command that uses basic auth to delete the compliance check with id 9000: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/31-02/desc/custom-compliance/put.md b/openapi-specs/compute/31-02/desc/custom-compliance/put.md index 480e41b54..b8760a11f 100644 --- a/openapi-specs/compute/31-02/desc/custom-compliance/put.md +++ b/openapi-specs/compute/31-02/desc/custom-compliance/put.md @@ -21,7 +21,7 @@ Create `custom_check.json` file (example): Refer to the following example curl command that uses basic auth to update the checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/31-02/desc/custom-rules/get.md b/openapi-specs/compute/31-02/desc/custom-rules/get.md index f0385f81a..f77924be8 100644 --- a/openapi-specs/compute/31-02/desc/custom-rules/get.md +++ b/openapi-specs/compute/31-02/desc/custom-rules/get.md @@ -7,7 +7,7 @@ This endpoint maps to the policy table in **Defend > Custom rules** in the Conso Refer to the following example cURL command that retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/custom-rules/id_delete.md b/openapi-specs/compute/31-02/desc/custom-rules/id_delete.md index c0d6dc8b0..01412abf3 100644 --- a/openapi-specs/compute/31-02/desc/custom-rules/id_delete.md +++ b/openapi-specs/compute/31-02/desc/custom-rules/id_delete.md @@ -5,7 +5,7 @@ Deletes a custom rule. Refer to the following example cURL command that deletes a custom rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/31-02/desc/cves/distribution_get.md b/openapi-specs/compute/31-02/desc/cves/distribution_get.md index aecddce23..7365e1a5e 100644 --- a/openapi-specs/compute/31-02/desc/cves/distribution_get.md +++ b/openapi-specs/compute/31-02/desc/cves/distribution_get.md @@ -3,7 +3,7 @@ Retrieves CVEs from the vulnerability database grouped into distribution where y The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/cves/get.md b/openapi-specs/compute/31-02/desc/cves/get.md index 469ea4b28..f81223298 100644 --- a/openapi-specs/compute/31-02/desc/cves/get.md +++ b/openapi-specs/compute/31-02/desc/cves/get.md @@ -6,7 +6,7 @@ A null response indicates that the CVE is not in our database. The following example curl command queries the Prisma Cloud Compute database for `CVE-2018-1102`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/defenders/app_embedded_post.md b/openapi-specs/compute/31-02/desc/defenders/app_embedded_post.md index 9167469d0..7999cbadb 100644 --- a/openapi-specs/compute/31-02/desc/defenders/app_embedded_post.md +++ b/openapi-specs/compute/31-02/desc/defenders/app_embedded_post.md @@ -5,7 +5,7 @@ Creates an augmented Dockerfile with Defender and dependencies included as a ZIP Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/defenders/daemonset_yaml_get.md b/openapi-specs/compute/31-02/desc/defenders/daemonset_yaml_get.md index 678901a8a..b68869081 100644 --- a/openapi-specs/compute/31-02/desc/defenders/daemonset_yaml_get.md +++ b/openapi-specs/compute/31-02/desc/defenders/daemonset_yaml_get.md @@ -10,7 +10,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https://:8083/api/v1/defenders/daemonset.yaml?consoleaddr=&listener=none&namespace=twistlock&orchestration=kubernetes' diff --git a/openapi-specs/compute/31-02/desc/defenders/daemonset_yaml_post.md b/openapi-specs/compute/31-02/desc/defenders/daemonset_yaml_post.md index 8dcf30639..91abe241f 100644 --- a/openapi-specs/compute/31-02/desc/defenders/daemonset_yaml_post.md +++ b/openapi-specs/compute/31-02/desc/defenders/daemonset_yaml_post.md @@ -5,7 +5,7 @@ Creates a DaemonSet deployment file in YAML format that you can use to deploy De Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/defenders/download_get.md b/openapi-specs/compute/31-02/desc/defenders/download_get.md index 2d9435506..67f08c0e5 100644 --- a/openapi-specs/compute/31-02/desc/defenders/download_get.md +++ b/openapi-specs/compute/31-02/desc/defenders/download_get.md @@ -8,7 +8,7 @@ Use the query parameters to filter what data is returned. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o \ diff --git a/openapi-specs/compute/31-02/desc/defenders/fargate_json_post.md b/openapi-specs/compute/31-02/desc/defenders/fargate_json_post.md index 5128e90a1..e2e4e85ab 100644 --- a/openapi-specs/compute/31-02/desc/defenders/fargate_json_post.md +++ b/openapi-specs/compute/31-02/desc/defenders/fargate_json_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command: Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -23,7 +23,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/defenders/fargate_yaml_post.md b/openapi-specs/compute/31-02/desc/defenders/fargate_yaml_post.md index 9a8306a1b..95560526a 100644 --- a/openapi-specs/compute/31-02/desc/defenders/fargate_yaml_post.md +++ b/openapi-specs/compute/31-02/desc/defenders/fargate_yaml_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.yaml` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/yaml' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/defenders/get.md b/openapi-specs/compute/31-02/desc/defenders/get.md index 471e7ef9d..8d2f5cd4c 100644 --- a/openapi-specs/compute/31-02/desc/defenders/get.md +++ b/openapi-specs/compute/31-02/desc/defenders/get.md @@ -7,7 +7,7 @@ This endpoint maps to the UI Console page in **Manage > Defenders > Defenders**. Refer to the following example cURL command that retrieves all deployed Defenders. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/defenders/helm_get.md b/openapi-specs/compute/31-02/desc/defenders/helm_get.md index b11f9c4b9..487c8b7e8 100644 --- a/openapi-specs/compute/31-02/desc/defenders/helm_get.md +++ b/openapi-specs/compute/31-02/desc/defenders/helm_get.md @@ -13,7 +13,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o twistlock-defender-helm.tar.gz \ diff --git a/openapi-specs/compute/31-02/desc/defenders/helm_post.md b/openapi-specs/compute/31-02/desc/defenders/helm_post.md index 2046e63eb..fb76807ae 100644 --- a/openapi-specs/compute/31-02/desc/defenders/helm_post.md +++ b/openapi-specs/compute/31-02/desc/defenders/helm_post.md @@ -5,7 +5,7 @@ Creates a Helm deployment file that you can use to deploy Defenders to your clus Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/defenders/id_delete.md b/openapi-specs/compute/31-02/desc/defenders/id_delete.md index f637ef850..e3ac52daf 100644 --- a/openapi-specs/compute/31-02/desc/defenders/id_delete.md +++ b/openapi-specs/compute/31-02/desc/defenders/id_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes an existing Defender on a host. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/31-02/desc/defenders/id_features_post.md b/openapi-specs/compute/31-02/desc/defenders/id_features_post.md index ec8e4c5f3..9b42f5fa0 100644 --- a/openapi-specs/compute/31-02/desc/defenders/id_features_post.md +++ b/openapi-specs/compute/31-02/desc/defenders/id_features_post.md @@ -3,7 +3,7 @@ Updates a deployed Defender's configuration. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/defenders/id_restart_post.md b/openapi-specs/compute/31-02/desc/defenders/id_restart_post.md index da0cc7811..7296a186b 100644 --- a/openapi-specs/compute/31-02/desc/defenders/id_restart_post.md +++ b/openapi-specs/compute/31-02/desc/defenders/id_restart_post.md @@ -3,7 +3,7 @@ Restarts Defender on a given host. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/defenders/id_upgrade_post.md b/openapi-specs/compute/31-02/desc/defenders/id_upgrade_post.md index f0d30d1e9..3e63c6414 100644 --- a/openapi-specs/compute/31-02/desc/defenders/id_upgrade_post.md +++ b/openapi-specs/compute/31-02/desc/defenders/id_upgrade_post.md @@ -7,7 +7,7 @@ Upgrades Defender on ``. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/defenders/image-name_get.md b/openapi-specs/compute/31-02/desc/defenders/image-name_get.md index e81ba3e19..19f360c07 100644 --- a/openapi-specs/compute/31-02/desc/defenders/image-name_get.md +++ b/openapi-specs/compute/31-02/desc/defenders/image-name_get.md @@ -5,7 +5,7 @@ Returns the full Docker image name for Defender. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/defenders/install-bundle_get.md b/openapi-specs/compute/31-02/desc/defenders/install-bundle_get.md index 882d0cd53..9b09e733f 100644 --- a/openapi-specs/compute/31-02/desc/defenders/install-bundle_get.md +++ b/openapi-specs/compute/31-02/desc/defenders/install-bundle_get.md @@ -5,7 +5,7 @@ Returns the certificate bundle that Defender needs to securely connect to Consol Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/defenders/names_get.md b/openapi-specs/compute/31-02/desc/defenders/names_get.md index 728eb6364..6339c1483 100644 --- a/openapi-specs/compute/31-02/desc/defenders/names_get.md +++ b/openapi-specs/compute/31-02/desc/defenders/names_get.md @@ -5,7 +5,7 @@ Retrieves a list of Defender hostnames that can be used as the `{id}` query para Refer to the following example cURL command that retrieves a list of all Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -15,7 +15,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of connected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -25,7 +25,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of disconnected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -37,7 +37,7 @@ The endpoint enlists all the connected and disconnected Defenders if do not spec Refer to the following example cURL command that retrieves a list of Defenders by type: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/defenders/rasp_post.md b/openapi-specs/compute/31-02/desc/defenders/rasp_post.md index 526a9e112..e110044dd 100644 --- a/openapi-specs/compute/31-02/desc/defenders/rasp_post.md +++ b/openapi-specs/compute/31-02/desc/defenders/rasp_post.md @@ -7,7 +7,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o rasp-defender.zip diff --git a/openapi-specs/compute/31-02/desc/defenders/serverless-bundle_post.md b/openapi-specs/compute/31-02/desc/defenders/serverless-bundle_post.md index df4f13e6a..7533e436b 100644 --- a/openapi-specs/compute/31-02/desc/defenders/serverless-bundle_post.md +++ b/openapi-specs/compute/31-02/desc/defenders/serverless-bundle_post.md @@ -5,7 +5,7 @@ Downloads a ZIP file with serverless Defender bundle. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/octet-stream' \ -o serverless_bundle.zip \ diff --git a/openapi-specs/compute/31-02/desc/defenders/summary_get.md b/openapi-specs/compute/31-02/desc/defenders/summary_get.md index 08be4ebc4..e308ef64b 100644 --- a/openapi-specs/compute/31-02/desc/defenders/summary_get.md +++ b/openapi-specs/compute/31-02/desc/defenders/summary_get.md @@ -6,7 +6,7 @@ Lists the number of Defenders in each defender category. Refer to the following example cURL command that retrieves a summary of Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/defenders/upgrade_post.md b/openapi-specs/compute/31-02/desc/defenders/upgrade_post.md index 2f0b4d39e..eacd6b779 100644 --- a/openapi-specs/compute/31-02/desc/defenders/upgrade_post.md +++ b/openapi-specs/compute/31-02/desc/defenders/upgrade_post.md @@ -9,7 +9,7 @@ To upgrade Serverless and Fargate Defenders, re-embed them. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/deployment/daemonsets_deploy_post.md b/openapi-specs/compute/31-02/desc/deployment/daemonsets_deploy_post.md index 94ec9386b..b60f28346 100644 --- a/openapi-specs/compute/31-02/desc/deployment/daemonsets_deploy_post.md +++ b/openapi-specs/compute/31-02/desc/deployment/daemonsets_deploy_post.md @@ -5,7 +5,7 @@ It identifies the cluster's API server, user, and credentials. Use the various request parameters to control the properties of the deployed DaemonSet. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/deployment/daemonsets_get.md b/openapi-specs/compute/31-02/desc/deployment/daemonsets_get.md index a0b7f3798..0385acf75 100644 --- a/openapi-specs/compute/31-02/desc/deployment/daemonsets_get.md +++ b/openapi-specs/compute/31-02/desc/deployment/daemonsets_get.md @@ -3,7 +3,7 @@ You must specify a `credentialID`, of type `kubeconfig`, which identifies your c Credentials are managed in Console's credentials store (`/api/v1/credentials`). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/feeds/custom_vuln_get.md b/openapi-specs/compute/31-02/desc/feeds/custom_vuln_get.md index 71834f19d..d661acf55 100644 --- a/openapi-specs/compute/31-02/desc/feeds/custom_vuln_get.md +++ b/openapi-specs/compute/31-02/desc/feeds/custom_vuln_get.md @@ -11,7 +11,7 @@ Vulnerability rules can be created using the Prisma Cloud Compute. Refer to the following cURL command that retrieves a list of all the custom vulnerabilities and associated rules. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/feeds/custom_vuln_put.md b/openapi-specs/compute/31-02/desc/feeds/custom_vuln_put.md index 4fe1c1898..149ada978 100644 --- a/openapi-specs/compute/31-02/desc/feeds/custom_vuln_put.md +++ b/openapi-specs/compute/31-02/desc/feeds/custom_vuln_put.md @@ -5,7 +5,7 @@ Updates all the custom vulnerabilities and associated rules simultaneously for h Refer to the following cURL command that updates a vulnerability for a library named `internal-lib`, and specifies that its versions `1.1` to `1.8` are known to be vulnerable. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -37,7 +37,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: **Note:** You will need `jq` to execute this command. ``` - $ curl -k \ + $ curl \ -u \ https:///api/v/feeds/custom/custom-vulnerabilities \ | jq '.' > custom_vulnerability_rules.json @@ -66,7 +66,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 3. Update the rules by pushing the new JSON payload. **Note:** Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -77,7 +77,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 4. Run the cURL command for the `GET /api/vVERSION/feeds/custom/custom-vulnerabilities` endpoint and you can see that the previously installed rules are now overwritten with your new rules. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/feeds/custom_vulnerabilities_digest_get.md b/openapi-specs/compute/31-02/desc/feeds/custom_vulnerabilities_digest_get.md index 0eb501d9b..02af9a3ab 100644 --- a/openapi-specs/compute/31-02/desc/feeds/custom_vulnerabilities_digest_get.md +++ b/openapi-specs/compute/31-02/desc/feeds/custom_vulnerabilities_digest_get.md @@ -5,7 +5,7 @@ Returns the unique digest for the custom vulnerabilities and associated rules fo The following cURL command retrieves the digest for the configured custom vulnerabilities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/feeds/cve_allow_list_digest_get.md b/openapi-specs/compute/31-02/desc/feeds/cve_allow_list_digest_get.md index e27f21251..911a07fd9 100644 --- a/openapi-specs/compute/31-02/desc/feeds/cve_allow_list_digest_get.md +++ b/openapi-specs/compute/31-02/desc/feeds/cve_allow_list_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the Common Vulnerabilities and Exposures (CVE) a The following cURL command retrieves the digest for the configured CVE allow list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/feeds/cve_allow_list_get.md b/openapi-specs/compute/31-02/desc/feeds/cve_allow_list_get.md index 34fb2c7f8..d73ce17c2 100644 --- a/openapi-specs/compute/31-02/desc/feeds/cve_allow_list_get.md +++ b/openapi-specs/compute/31-02/desc/feeds/cve_allow_list_get.md @@ -5,7 +5,7 @@ Retrieves the globally allow-listed Common Vulnerabilities and Exposures (CVE). The following cURL command retrieves the globally allow-listed CVEs. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/feeds/cve_allow_list_put.md b/openapi-specs/compute/31-02/desc/feeds/cve_allow_list_put.md index 850016965..c4e2ce0af 100644 --- a/openapi-specs/compute/31-02/desc/feeds/cve_allow_list_put.md +++ b/openapi-specs/compute/31-02/desc/feeds/cve_allow_list_put.md @@ -7,7 +7,7 @@ Globally allow-lists a set of Common Vulnerabilities and Exposures (CVE). The following cURL command installs a global CVE allow-list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/31-02/desc/feeds/ips_digest_get.md b/openapi-specs/compute/31-02/desc/feeds/ips_digest_get.md index d059271ea..ae2a09915 100644 --- a/openapi-specs/compute/31-02/desc/feeds/ips_digest_get.md +++ b/openapi-specs/compute/31-02/desc/feeds/ips_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the list of suspicious or high risk IP endpoints The following cURL command retrieves the digest for the banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/feeds/ips_get.md b/openapi-specs/compute/31-02/desc/feeds/ips_get.md index 381257d47..f51c577a7 100644 --- a/openapi-specs/compute/31-02/desc/feeds/ips_get.md +++ b/openapi-specs/compute/31-02/desc/feeds/ips_get.md @@ -5,7 +5,7 @@ Retrieves the customized list of block-listed suspicious or high-risk IP address The following cURL command retrieves the list of globally block-listed suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/feeds/ips_put.md b/openapi-specs/compute/31-02/desc/feeds/ips_put.md index 6f8fc2419..5bf791044 100644 --- a/openapi-specs/compute/31-02/desc/feeds/ips_put.md +++ b/openapi-specs/compute/31-02/desc/feeds/ips_put.md @@ -7,7 +7,7 @@ Bans a custom list of suspicious or high-risk IP addresses. The following cURL command installs a custom list of banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/31-02/desc/feeds/malware_digest_get.md b/openapi-specs/compute/31-02/desc/feeds/malware_digest_get.md index 005c476a2..522a59aef 100644 --- a/openapi-specs/compute/31-02/desc/feeds/malware_digest_get.md +++ b/openapi-specs/compute/31-02/desc/feeds/malware_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for all the MD5 signatures of malicious executables The following cURL command retrieves the digest for the configured list for the MD5 signatures of malicious executables. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/feeds/malware_get.md b/openapi-specs/compute/31-02/desc/feeds/malware_get.md index 2a7aa128b..72bee6594 100644 --- a/openapi-specs/compute/31-02/desc/feeds/malware_get.md +++ b/openapi-specs/compute/31-02/desc/feeds/malware_get.md @@ -5,7 +5,7 @@ Returns the customized list of MD5 signatures of malicious executables. Refer to the following cURL command that retrieves the list of MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/feeds/malware_put.md b/openapi-specs/compute/31-02/desc/feeds/malware_put.md index 7e6ec5da0..176304cb9 100644 --- a/openapi-specs/compute/31-02/desc/feeds/malware_put.md +++ b/openapi-specs/compute/31-02/desc/feeds/malware_put.md @@ -7,7 +7,7 @@ Creates a custom list of malware MD5 signatures of malicious executables. Refer to the following cURL command that installs a custom list of malware MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/31-02/desc/feeds/refresh_post.md b/openapi-specs/compute/31-02/desc/feeds/refresh_post.md index a83c40d10..1c756edae 100644 --- a/openapi-specs/compute/31-02/desc/feeds/refresh_post.md +++ b/openapi-specs/compute/31-02/desc/feeds/refresh_post.md @@ -1,7 +1,7 @@ Triggers Console to refresh its data from the **Intelligence Stream** ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/forensic/activities_download_get.md b/openapi-specs/compute/31-02/desc/forensic/activities_download_get.md index 8a2dbd926..1918e3790 100644 --- a/openapi-specs/compute/31-02/desc/forensic/activities_download_get.md +++ b/openapi-specs/compute/31-02/desc/forensic/activities_download_get.md @@ -3,7 +3,7 @@ Downloads all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/forensic/activities_get.md b/openapi-specs/compute/31-02/desc/forensic/activities_get.md index c8fb1d0cd..c0761aa60 100644 --- a/openapi-specs/compute/31-02/desc/forensic/activities_get.md +++ b/openapi-specs/compute/31-02/desc/forensic/activities_get.md @@ -3,7 +3,7 @@ Retrieves all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/groups/get.md b/openapi-specs/compute/31-02/desc/groups/get.md index 6a0daa2eb..34a2711e0 100644 --- a/openapi-specs/compute/31-02/desc/groups/get.md +++ b/openapi-specs/compute/31-02/desc/groups/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups. ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/31-02/desc/groups/id_delete.md b/openapi-specs/compute/31-02/desc/groups/id_delete.md index 5962a1135..0c3cfa1cd 100644 --- a/openapi-specs/compute/31-02/desc/groups/id_delete.md +++ b/openapi-specs/compute/31-02/desc/groups/id_delete.md @@ -13,7 +13,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes a collection with the name `{id}`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/31-02/desc/groups/names.md b/openapi-specs/compute/31-02/desc/groups/names.md index 80f34f536..9c2dd1089 100644 --- a/openapi-specs/compute/31-02/desc/groups/names.md +++ b/openapi-specs/compute/31-02/desc/groups/names.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/31-02/desc/groups/post.md b/openapi-specs/compute/31-02/desc/groups/post.md index d0fc23a6d..ebad011f4 100644 --- a/openapi-specs/compute/31-02/desc/groups/post.md +++ b/openapi-specs/compute/31-02/desc/groups/post.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that creates a new group named `my-group`: ```bash -$ curl -k \ +$ curl \ -X POST \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/31-02/desc/high-availability/get.md b/openapi-specs/compute/31-02/desc/high-availability/get.md index a988d47ef..83d5d9b46 100644 --- a/openapi-specs/compute/31-02/desc/high-availability/get.md +++ b/openapi-specs/compute/31-02/desc/high-availability/get.md @@ -3,7 +3,7 @@ Returns the status of high high availability. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/31-02/desc/hosts/download_get.md b/openapi-specs/compute/31-02/desc/hosts/download_get.md index ab691fb49..34e546573 100644 --- a/openapi-specs/compute/31-02/desc/hosts/download_get.md +++ b/openapi-specs/compute/31-02/desc/hosts/download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Hosts > Refer to the following example cURL command that downloads all host scan reports to a CSV file called `hosts_report.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o hosts_report.csv \ diff --git a/openapi-specs/compute/31-02/desc/hosts/filters_get.md b/openapi-specs/compute/31-02/desc/hosts/filters_get.md index 4bf6df5e6..a39ec8a97 100644 --- a/openapi-specs/compute/31-02/desc/hosts/filters_get.md +++ b/openapi-specs/compute/31-02/desc/hosts/filters_get.md @@ -3,7 +3,7 @@ Returns host filters such as distribution and host name. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/hosts/get.md b/openapi-specs/compute/31-02/desc/hosts/get.md index d125c9d7b..26df89cef 100644 --- a/openapi-specs/compute/31-02/desc/hosts/get.md +++ b/openapi-specs/compute/31-02/desc/hosts/get.md @@ -35,7 +35,7 @@ Refer to the following available options for the `fields` query parameters: Refer to the following cURL command that retrieves all host scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/hosts/info_get.md b/openapi-specs/compute/31-02/desc/hosts/info_get.md index be456b46b..b71c6be2f 100644 --- a/openapi-specs/compute/31-02/desc/hosts/info_get.md +++ b/openapi-specs/compute/31-02/desc/hosts/info_get.md @@ -3,7 +3,7 @@ Returns minimal information that includes hostname, distro, distro-release, coll A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/hosts/scan_post.md b/openapi-specs/compute/31-02/desc/hosts/scan_post.md index 6b72cbfa3..0e0e7b074 100644 --- a/openapi-specs/compute/31-02/desc/hosts/scan_post.md +++ b/openapi-specs/compute/31-02/desc/hosts/scan_post.md @@ -3,7 +3,7 @@ Re-scan all hosts immediately. Refer to the following example command that forces Prisma Cloud Compute to re-scan all hosts: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/hosts/scan diff --git a/openapi-specs/compute/31-02/desc/images/defender_layer_get.md b/openapi-specs/compute/31-02/desc/images/defender_layer_get.md index 1dfe3633d..4bb88d62c 100644 --- a/openapi-specs/compute/31-02/desc/images/defender_layer_get.md +++ b/openapi-specs/compute/31-02/desc/images/defender_layer_get.md @@ -5,7 +5,7 @@ Returns the the Prisma Cloud Compute Defender in as a layer that can be used in Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/compute/31-02/desc/images/defender_rasp_get.md b/openapi-specs/compute/31-02/desc/images/defender_rasp_get.md index a8e145ff7..260e271a1 100644 --- a/openapi-specs/compute/31-02/desc/images/defender_rasp_get.md +++ b/openapi-specs/compute/31-02/desc/images/defender_rasp_get.md @@ -3,7 +3,7 @@ Returns the the Prisma Cloud Compute Defender as the RASP Defender A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/compute/31-02/desc/images/download_get.md b/openapi-specs/compute/31-02/desc/images/download_get.md index 713114955..fcae06e3d 100644 --- a/openapi-specs/compute/31-02/desc/images/download_get.md +++ b/openapi-specs/compute/31-02/desc/images/download_get.md @@ -15,7 +15,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -26,7 +26,7 @@ $ curl -k \ Refer to the following example cURL command that might be useful for developers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/images/get.md b/openapi-specs/compute/31-02/desc/images/get.md index 6c82341b6..bb636e101 100644 --- a/openapi-specs/compute/31-02/desc/images/get.md +++ b/openapi-specs/compute/31-02/desc/images/get.md @@ -19,7 +19,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that retrieves a compact scan report for all images: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -29,7 +29,7 @@ $ curl -k \ Refer to the following cURL command that retrieves a compact scan report for an Ubuntu image: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -40,7 +40,7 @@ The name query is synonymous with the filter images text field in the Console UI Refer to the following cURL command that retrieves the scan report for an image with the matching SHA-256 hash: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/images/names_get.md b/openapi-specs/compute/31-02/desc/images/names_get.md index 3db6f5429..ad5fd25dc 100644 --- a/openapi-specs/compute/31-02/desc/images/names_get.md +++ b/openapi-specs/compute/31-02/desc/images/names_get.md @@ -5,7 +5,7 @@ Returns an array of strings containing image names. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/31-02/desc/images/scan_post.md b/openapi-specs/compute/31-02/desc/images/scan_post.md index 8d802727a..36278249b 100644 --- a/openapi-specs/compute/31-02/desc/images/scan_post.md +++ b/openapi-specs/compute/31-02/desc/images/scan_post.md @@ -5,7 +5,7 @@ Re-scan all images immediately. This endpoint returns the time that the scans we Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all images: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/images/scan diff --git a/openapi-specs/compute/31-02/desc/images/twistlock_defender_tar_gz_get.md b/openapi-specs/compute/31-02/desc/images/twistlock_defender_tar_gz_get.md index 7852e12ba..36fb66ae8 100644 --- a/openapi-specs/compute/31-02/desc/images/twistlock_defender_tar_gz_get.md +++ b/openapi-specs/compute/31-02/desc/images/twistlock_defender_tar_gz_get.md @@ -1,7 +1,7 @@ Download the Container Defender image for Linux platforms. ```bash -$ curl -k \ +$ curl \ -u \ -H "Content-Type: application/octet-stream" \ -o twistlock_defender.tar.gz \ diff --git a/openapi-specs/compute/31-02/desc/intro.md b/openapi-specs/compute/31-02/desc/intro.md index 9038a3734..5b4ed5864 100644 --- a/openapi-specs/compute/31-02/desc/intro.md +++ b/openapi-specs/compute/31-02/desc/intro.md @@ -47,7 +47,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -58,7 +58,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -70,7 +70,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/compute/31-02/desc/kubernetes/scan_post.md b/openapi-specs/compute/31-02/desc/kubernetes/scan_post.md index 15d614c1a..ab74d5d96 100644 --- a/openapi-specs/compute/31-02/desc/kubernetes/scan_post.md +++ b/openapi-specs/compute/31-02/desc/kubernetes/scan_post.md @@ -3,7 +3,7 @@ This endpoint will trigger a Kubernetes scan. The following example curl command uses basic auth to initiate this scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/logs/console_get.md b/openapi-specs/compute/31-02/desc/logs/console_get.md index 80ece6611..113543540 100644 --- a/openapi-specs/compute/31-02/desc/logs/console_get.md +++ b/openapi-specs/compute/31-02/desc/logs/console_get.md @@ -3,7 +3,7 @@ Retrieves the latest Console log messages. The following example curl command retrieves the 10 latest Console log messages: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/logs/defender_download_get.md b/openapi-specs/compute/31-02/desc/logs/defender_download_get.md index 5d6718db0..05bbc6a75 100644 --- a/openapi-specs/compute/31-02/desc/logs/defender_download_get.md +++ b/openapi-specs/compute/31-02/desc/logs/defender_download_get.md @@ -5,7 +5,7 @@ The hostname can be returned from the endpoint `/defenders/names` The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/logs/defender_get.md b/openapi-specs/compute/31-02/desc/logs/defender_get.md index 1e733a746..f2e3b25df 100644 --- a/openapi-specs/compute/31-02/desc/logs/defender_get.md +++ b/openapi-specs/compute/31-02/desc/logs/defender_get.md @@ -7,7 +7,7 @@ Note that you must quote the URL when running the following command. Otherwise the shell misinterprets the ampersand (`&`) as the end of the command, and puts the curl command in the background. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/logs/system_download_get.md b/openapi-specs/compute/31-02/desc/logs/system_download_get.md index 1e5b5b873..43bb0abce 100644 --- a/openapi-specs/compute/31-02/desc/logs/system_download_get.md +++ b/openapi-specs/compute/31-02/desc/logs/system_download_get.md @@ -4,7 +4,7 @@ This endpoint will return the system debug logs with `tar.gz` file extension. The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/pcf-droplets/addresses_get.md b/openapi-specs/compute/31-02/desc/pcf-droplets/addresses_get.md index 257a47455..bb3365015 100644 --- a/openapi-specs/compute/31-02/desc/pcf-droplets/addresses_get.md +++ b/openapi-specs/compute/31-02/desc/pcf-droplets/addresses_get.md @@ -5,7 +5,7 @@ You can also add optional query parameters to this API call, in this example `cl The following example curl command retrieves the list of addresses: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/pcf-droplets/download_get.md b/openapi-specs/compute/31-02/desc/pcf-droplets/download_get.md index ad761e744..ac8546a25 100644 --- a/openapi-specs/compute/31-02/desc/pcf-droplets/download_get.md +++ b/openapi-specs/compute/31-02/desc/pcf-droplets/download_get.md @@ -3,7 +3,7 @@ This endpoint will download the list of configured cloud controller addresses co The following example curl command retrieves the list of addresses and outputs it to a file call `PCF_blobstores.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/pcf-droplets/get.md b/openapi-specs/compute/31-02/desc/pcf-droplets/get.md index 930d16948..aad607cba 100644 --- a/openapi-specs/compute/31-02/desc/pcf-droplets/get.md +++ b/openapi-specs/compute/31-02/desc/pcf-droplets/get.md @@ -3,7 +3,7 @@ This endpoint will return the full metadata of PCF blobstore from page **Monitor The following example curl command will retrieve this: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/pcf-droplets/scan_post.md b/openapi-specs/compute/31-02/desc/pcf-droplets/scan_post.md index 34e75b26c..d9c9df4dd 100644 --- a/openapi-specs/compute/31-02/desc/pcf-droplets/scan_post.md +++ b/openapi-specs/compute/31-02/desc/pcf-droplets/scan_post.md @@ -3,7 +3,7 @@ This endpoint will kick off a scan of the any PCF Blobstores you have configured Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/pcf-droplets/stop_post.md b/openapi-specs/compute/31-02/desc/pcf-droplets/stop_post.md index 94c376972..2c4d5264a 100644 --- a/openapi-specs/compute/31-02/desc/pcf-droplets/stop_post.md +++ b/openapi-specs/compute/31-02/desc/pcf-droplets/stop_post.md @@ -3,7 +3,7 @@ This endpoint will instruct the PFC Defenders to stop scanning. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/policies/compliance_ci_images_get.md b/openapi-specs/compute/31-02/desc/policies/compliance_ci_images_get.md index f97130a97..9a2b2abf5 100644 --- a/openapi-specs/compute/31-02/desc/policies/compliance_ci_images_get.md +++ b/openapi-specs/compute/31-02/desc/policies/compliance_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > CI** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/policies/compliance_ci_serverless_get.md b/openapi-specs/compute/31-02/desc/policies/compliance_ci_serverless_get.md index 59195f070..2f30e2d74 100644 --- a/openapi-specs/compute/31-02/desc/policies/compliance_ci_serverless_get.md +++ b/openapi-specs/compute/31-02/desc/policies/compliance_ci_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Functions > CI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/policies/compliance_container_get.md b/openapi-specs/compute/31-02/desc/policies/compliance_container_get.md index 7f10245ea..657d4f2dd 100644 --- a/openapi-specs/compute/31-02/desc/policies/compliance_container_get.md +++ b/openapi-specs/compute/31-02/desc/policies/compliance_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > Deployed** Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/policies/compliance_container_impacted_get.md b/openapi-specs/compute/31-02/desc/policies/compliance_container_impacted_get.md index 607bfa3c8..de9e0ee77 100644 --- a/openapi-specs/compute/31-02/desc/policies/compliance_container_impacted_get.md +++ b/openapi-specs/compute/31-02/desc/policies/compliance_container_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of containers captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/compliance/container/impacted?ruleName=' diff --git a/openapi-specs/compute/31-02/desc/policies/compliance_host_get.md b/openapi-specs/compute/31-02/desc/policies/compliance_host_get.md index c029ecf7f..a5e429af5 100755 --- a/openapi-specs/compute/31-02/desc/policies/compliance_host_get.md +++ b/openapi-specs/compute/31-02/desc/policies/compliance_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Hosts > Running hosts** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/policies/compliance_serverless_get.md b/openapi-specs/compute/31-02/desc/policies/compliance_serverless_get.md index c7de886c1..f559179f6 100755 --- a/openapi-specs/compute/31-02/desc/policies/compliance_serverless_get.md +++ b/openapi-specs/compute/31-02/desc/policies/compliance_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Functions > Functions** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/policies/compliance_vms_get.md b/openapi-specs/compute/31-02/desc/policies/compliance_vms_get.md index f7d7e1a49..b61d20d9d 100755 --- a/openapi-specs/compute/31-02/desc/policies/compliance_vms_get.md +++ b/openapi-specs/compute/31-02/desc/policies/compliance_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Hosts > VM ima The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/policies/compliance_vms_impacted_get.md b/openapi-specs/compute/31-02/desc/policies/compliance_vms_impacted_get.md index 9cf5b9d03..4ac3f2832 100644 --- a/openapi-specs/compute/31-02/desc/policies/compliance_vms_impacted_get.md +++ b/openapi-specs/compute/31-02/desc/policies/compliance_vms_impacted_get.md @@ -8,7 +8,7 @@ Use query parameters to retrieve the list of impacted resources by *account ID*, Refer to the following example cURL command, which retrieves a list of impacted resources: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/policies/docker_get.md b/openapi-specs/compute/31-02/desc/policies/docker_get.md index f56872c67..e8ab3d5bb 100644 --- a/openapi-specs/compute/31-02/desc/policies/docker_get.md +++ b/openapi-specs/compute/31-02/desc/policies/docker_get.md @@ -3,7 +3,7 @@ Retrieves a list of all access control rules for Docker Engine commands. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/policies/docker_put.md b/openapi-specs/compute/31-02/desc/policies/docker_put.md index 860e2bb1e..a5d0c0230 100644 --- a/openapi-specs/compute/31-02/desc/policies/docker_put.md +++ b/openapi-specs/compute/31-02/desc/policies/docker_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove Docker access control rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/docker \ | jq '.' > docker_access_control_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove Docker access control rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/31-02/desc/policies/firewall_app-embedded_get.md b/openapi-specs/compute/31-02/desc/policies/firewall_app-embedded_get.md index 3da2a7cd6..4e59c4c21 100644 --- a/openapi-specs/compute/31-02/desc/policies/firewall_app-embedded_get.md +++ b/openapi-specs/compute/31-02/desc/policies/firewall_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > App-Embedded** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/policies/firewall_app_container_get.md b/openapi-specs/compute/31-02/desc/policies/firewall_app_container_get.md index 3b8c157fa..f0486aa4c 100644 --- a/openapi-specs/compute/31-02/desc/policies/firewall_app_container_get.md +++ b/openapi-specs/compute/31-02/desc/policies/firewall_app_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Container** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/container' diff --git a/openapi-specs/compute/31-02/desc/policies/firewall_app_host_get.md b/openapi-specs/compute/31-02/desc/policies/firewall_app_host_get.md index adb90128a..75c22add4 100644 --- a/openapi-specs/compute/31-02/desc/policies/firewall_app_host_get.md +++ b/openapi-specs/compute/31-02/desc/policies/firewall_app_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Host** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/policies/firewall_app_network_list_get.md b/openapi-specs/compute/31-02/desc/policies/firewall_app_network_list_get.md index 13f7fb450..5a1f87d85 100644 --- a/openapi-specs/compute/31-02/desc/policies/firewall_app_network_list_get.md +++ b/openapi-specs/compute/31-02/desc/policies/firewall_app_network_list_get.md @@ -11,7 +11,7 @@ This endpoint maps to **Defend > WAAS > Network lists** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/network-list' diff --git a/openapi-specs/compute/31-02/desc/policies/firewall_app_out-of-band_get.md b/openapi-specs/compute/31-02/desc/policies/firewall_app_out-of-band_get.md index d4f72d041..9ae662687 100644 --- a/openapi-specs/compute/31-02/desc/policies/firewall_app_out-of-band_get.md +++ b/openapi-specs/compute/31-02/desc/policies/firewall_app_out-of-band_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/policies/firewall_app_out-of-band_impacted_get.md b/openapi-specs/compute/31-02/desc/policies/firewall_app_out-of-band_impacted_get.md index 25d2c6691..96a427f94 100644 --- a/openapi-specs/compute/31-02/desc/policies/firewall_app_out-of-band_impacted_get.md +++ b/openapi-specs/compute/31-02/desc/policies/firewall_app_out-of-band_impacted_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/policies/firewall_app_rasp_get.md b/openapi-specs/compute/31-02/desc/policies/firewall_app_rasp_get.md index 15d481cf3..a201d3beb 100644 --- a/openapi-specs/compute/31-02/desc/policies/firewall_app_rasp_get.md +++ b/openapi-specs/compute/31-02/desc/policies/firewall_app_rasp_get.md @@ -1,7 +1,7 @@ Retrieves a list of all application firewall (CNAF) rules for RASP. ``` -$ curl -k \ +$ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp ``` diff --git a/openapi-specs/compute/31-02/desc/policies/firewall_app_rasp_put.md b/openapi-specs/compute/31-02/desc/policies/firewall_app_rasp_put.md index 04ba86483..1101c7690 100644 --- a/openapi-specs/compute/31-02/desc/policies/firewall_app_rasp_put.md +++ b/openapi-specs/compute/31-02/desc/policies/firewall_app_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp \ | jq '.' > app_firewall_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/31-02/desc/policies/firewall_app_serverless_get.md b/openapi-specs/compute/31-02/desc/policies/firewall_app_serverless_get.md index d19e909f3..90cac0015 100644 --- a/openapi-specs/compute/31-02/desc/policies/firewall_app_serverless_get.md +++ b/openapi-specs/compute/31-02/desc/policies/firewall_app_serverless_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Serverless** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/serverless' diff --git a/openapi-specs/compute/31-02/desc/policies/firewall_network_container_get.md b/openapi-specs/compute/31-02/desc/policies/firewall_network_container_get.md index 3f1343b53..82e656818 100644 --- a/openapi-specs/compute/31-02/desc/policies/firewall_network_container_get.md +++ b/openapi-specs/compute/31-02/desc/policies/firewall_network_container_get.md @@ -4,7 +4,7 @@ Retrieves a list of all CNNS container and host rules. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/policies/firewall_network_container_put.md b/openapi-specs/compute/31-02/desc/policies/firewall_network_container_put.md index fd9263430..cffb3f1c4 100644 --- a/openapi-specs/compute/31-02/desc/policies/firewall_network_container_put.md +++ b/openapi-specs/compute/31-02/desc/policies/firewall_network_container_put.md @@ -9,7 +9,7 @@ The procedure to add, edit, or remove rules is: Refer to the following example cURL command that retrieves a list of all rules, pretty-print the JSON response, and save the results to a file: ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -26,7 +26,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/31-02/desc/policies/firewall_network_entities_get.md b/openapi-specs/compute/31-02/desc/policies/firewall_network_entities_get.md index 757121f70..28ed8dbcb 100644 --- a/openapi-specs/compute/31-02/desc/policies/firewall_network_entities_get.md +++ b/openapi-specs/compute/31-02/desc/policies/firewall_network_entities_get.md @@ -1,7 +1,7 @@ Retrieves a list of all CNNF network objects. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/policies/firewall_network_entities_put.md b/openapi-specs/compute/31-02/desc/policies/firewall_network_entities_put.md index 83c023286..39044ee10 100644 --- a/openapi-specs/compute/31-02/desc/policies/firewall_network_entities_put.md +++ b/openapi-specs/compute/31-02/desc/policies/firewall_network_entities_put.md @@ -3,7 +3,7 @@ Updates the list of CNNF network objects. The following example curl command updates the network objects. There is an example of all three types (images,subnets, and applications ): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/31-02/desc/policies/policies.md b/openapi-specs/compute/31-02/desc/policies/policies.md index 69768c03d..97be7b616 100644 --- a/openapi-specs/compute/31-02/desc/policies/policies.md +++ b/openapi-specs/compute/31-02/desc/policies/policies.md @@ -21,7 +21,7 @@ To add, edit, or remove vulnerability rules from a policy: For example, the following cURL command uses basic auth to retrieve a list of all image vulnerability rules, pretty-prints the JSON response, and saves the results to a `vulnerability_rules.json` file. ```bash - $ curl -k \ + $ curl \ -u \ https:///api/v1/policies/runtime/host \ | jq '.' > vulnerability_rules.json @@ -36,7 +36,7 @@ To add, edit, or remove vulnerability rules from a policy: **Note:** Remember to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -107,7 +107,7 @@ Use the `PUT` method to delete all rules by submitting an empty JSON object. For example, to delete all host runtime rules: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/31-02/desc/policies/runtime_app-embedded_get.md b/openapi-specs/compute/31-02/desc/policies/runtime_app-embedded_get.md index fcf0ba8b9..517b741bb 100755 --- a/openapi-specs/compute/31-02/desc/policies/runtime_app-embedded_get.md +++ b/openapi-specs/compute/31-02/desc/policies/runtime_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > App-Embedded policy** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/policies/runtime_container_get.md b/openapi-specs/compute/31-02/desc/policies/runtime_container_get.md index f1b50b727..65cd10660 100644 --- a/openapi-specs/compute/31-02/desc/policies/runtime_container_get.md +++ b/openapi-specs/compute/31-02/desc/policies/runtime_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Container policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/policies/runtime_container_impacted_get.md b/openapi-specs/compute/31-02/desc/policies/runtime_container_impacted_get.md index 195f75547..e026d33b9 100644 --- a/openapi-specs/compute/31-02/desc/policies/runtime_container_impacted_get.md +++ b/openapi-specs/compute/31-02/desc/policies/runtime_container_impacted_get.md @@ -6,7 +6,7 @@ In the Console UI, you can see how it works by going to the **Defend > Runtime > Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ $ curl -k \ For additional help with your `ruleName`: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/policies/runtime_host_get.md b/openapi-specs/compute/31-02/desc/policies/runtime_host_get.md index 38800596c..559ef690a 100644 --- a/openapi-specs/compute/31-02/desc/policies/runtime_host_get.md +++ b/openapi-specs/compute/31-02/desc/policies/runtime_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Host policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/policies/runtime_rasp_get.md b/openapi-specs/compute/31-02/desc/policies/runtime_rasp_get.md index 5b7a76457..55a6ff05b 100644 --- a/openapi-specs/compute/31-02/desc/policies/runtime_rasp_get.md +++ b/openapi-specs/compute/31-02/desc/policies/runtime_rasp_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your RASP runtime policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/policies/runtime_rasp_put.md b/openapi-specs/compute/31-02/desc/policies/runtime_rasp_put.md index bba60ba81..f71fb4b93 100644 --- a/openapi-specs/compute/31-02/desc/policies/runtime_rasp_put.md +++ b/openapi-specs/compute/31-02/desc/policies/runtime_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve the rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET @@ -24,7 +24,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -H "Content-Type:application/json" \ -X PUT \ diff --git a/openapi-specs/compute/31-02/desc/policies/runtime_serverless_get.md b/openapi-specs/compute/31-02/desc/policies/runtime_serverless_get.md index 44326bbf6..c98489e16 100644 --- a/openapi-specs/compute/31-02/desc/policies/runtime_serverless_get.md +++ b/openapi-specs/compute/31-02/desc/policies/runtime_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Serverless policy** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/policies/secrets_get.md b/openapi-specs/compute/31-02/desc/policies/secrets_get.md index 89e6b9c0e..cb4ecb37c 100644 --- a/openapi-specs/compute/31-02/desc/policies/secrets_get.md +++ b/openapi-specs/compute/31-02/desc/policies/secrets_get.md @@ -3,7 +3,7 @@ Retrieves a list of all secrets rules. The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/policies/secrets diff --git a/openapi-specs/compute/31-02/desc/policies/secrets_put.md b/openapi-specs/compute/31-02/desc/policies/secrets_put.md index 1e8877ca1..04fd41f24 100644 --- a/openapi-specs/compute/31-02/desc/policies/secrets_put.md +++ b/openapi-specs/compute/31-02/desc/policies/secrets_put.md @@ -10,7 +10,7 @@ The procedure to add, edit, or remove secrets rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/secrets \ | jq '.' > secrets_rules.json @@ -24,7 +24,7 @@ The procedure to add, edit, or remove secrets rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/31-02/desc/policies/trust_get.md b/openapi-specs/compute/31-02/desc/policies/trust_get.md index 8de1ba409..0805d6777 100644 --- a/openapi-specs/compute/31-02/desc/policies/trust_get.md +++ b/openapi-specs/compute/31-02/desc/policies/trust_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/policies/trust_put.md b/openapi-specs/compute/31-02/desc/policies/trust_put.md index fccd4b91e..7fec72031 100644 --- a/openapi-specs/compute/31-02/desc/policies/trust_put.md +++ b/openapi-specs/compute/31-02/desc/policies/trust_put.md @@ -1,7 +1,7 @@ Updates the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/31-02/desc/policies/vulnerability_ci_images_get.md b/openapi-specs/compute/31-02/desc/policies/vulnerability_ci_images_get.md index abc3da8fa..ce0d50a29 100644 --- a/openapi-specs/compute/31-02/desc/policies/vulnerability_ci_images_get.md +++ b/openapi-specs/compute/31-02/desc/policies/vulnerability_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/policies/vulnerability_ci_serverless_get.md b/openapi-specs/compute/31-02/desc/policies/vulnerability_ci_serverless_get.md index 958c86495..6fb5f93ce 100644 --- a/openapi-specs/compute/31-02/desc/policies/vulnerability_ci_serverless_get.md +++ b/openapi-specs/compute/31-02/desc/policies/vulnerability_ci_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/policies/vulnerability_coderepos_get.md b/openapi-specs/compute/31-02/desc/policies/vulnerability_coderepos_get.md index 08dfed8e1..a4ac62f33 100644 --- a/openapi-specs/compute/31-02/desc/policies/vulnerability_coderepos_get.md +++ b/openapi-specs/compute/31-02/desc/policies/vulnerability_coderepos_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Code repositories** in the Co Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/vulnerability/coderepos' diff --git a/openapi-specs/compute/31-02/desc/policies/vulnerability_coderepos_impacted_get.md b/openapi-specs/compute/31-02/desc/policies/vulnerability_coderepos_impacted_get.md index a401a12c4..e64ef768e 100644 --- a/openapi-specs/compute/31-02/desc/policies/vulnerability_coderepos_impacted_get.md +++ b/openapi-specs/compute/31-02/desc/policies/vulnerability_coderepos_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/coderepos/impacted?project=&ruleName=' ``` diff --git a/openapi-specs/compute/31-02/desc/policies/vulnerability_coderepos_put.md b/openapi-specs/compute/31-02/desc/policies/vulnerability_coderepos_put.md index 514eec136..a002415b9 100644 --- a/openapi-specs/compute/31-02/desc/policies/vulnerability_coderepos_put.md +++ b/openapi-specs/compute/31-02/desc/policies/vulnerability_coderepos_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Code repo Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT 'https:///api/v/policies/vulnerability/coderepos' \ diff --git a/openapi-specs/compute/31-02/desc/policies/vulnerability_host_get.md b/openapi-specs/compute/31-02/desc/policies/vulnerability_host_get.md index 3b9b14b9c..260da7675 100644 --- a/openapi-specs/compute/31-02/desc/policies/vulnerability_host_get.md +++ b/openapi-specs/compute/31-02/desc/policies/vulnerability_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Hosts > Running hosts** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/policies/vulnerability_host_impacted_get.md b/openapi-specs/compute/31-02/desc/policies/vulnerability_host_impacted_get.md index 346368518..f44592830 100644 --- a/openapi-specs/compute/31-02/desc/policies/vulnerability_host_impacted_get.md +++ b/openapi-specs/compute/31-02/desc/policies/vulnerability_host_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by `RULE_NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/host/impacted?project={PROJECT_NAME}&ruleName={RULE_NAME}' ``` diff --git a/openapi-specs/compute/31-02/desc/policies/vulnerability_images_get.md b/openapi-specs/compute/31-02/desc/policies/vulnerability_images_get.md index 33581be37..57359bb8f 100644 --- a/openapi-specs/compute/31-02/desc/policies/vulnerability_images_get.md +++ b/openapi-specs/compute/31-02/desc/policies/vulnerability_images_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images?project=" diff --git a/openapi-specs/compute/31-02/desc/policies/vulnerability_images_impacted_get.md b/openapi-specs/compute/31-02/desc/policies/vulnerability_images_impacted_get.md index ae1d5e396..e2a4efa23 100644 --- a/openapi-specs/compute/31-02/desc/policies/vulnerability_images_impacted_get.md +++ b/openapi-specs/compute/31-02/desc/policies/vulnerability_images_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of images caught by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images/impacted?project=&ruleName=" diff --git a/openapi-specs/compute/31-02/desc/policies/vulnerability_images_put.md b/openapi-specs/compute/31-02/desc/policies/vulnerability_images_put.md index b3330dab7..8c3cc8af2 100644 --- a/openapi-specs/compute/31-02/desc/policies/vulnerability_images_put.md +++ b/openapi-specs/compute/31-02/desc/policies/vulnerability_images_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -X PUT 'https:///api/v/policies/vulnerability/images' \ --data '{ diff --git a/openapi-specs/compute/31-02/desc/policies/vulnerability_serverless_get.md b/openapi-specs/compute/31-02/desc/policies/vulnerability_serverless_get.md index c7a8e2ef5..41c7e75d8 100644 --- a/openapi-specs/compute/31-02/desc/policies/vulnerability_serverless_get.md +++ b/openapi-specs/compute/31-02/desc/policies/vulnerability_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Functions** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/policies/vulnerability_serverless_put.md b/openapi-specs/compute/31-02/desc/policies/vulnerability_serverless_put.md index 2b567b5b1..5199f0997 100644 --- a/openapi-specs/compute/31-02/desc/policies/vulnerability_serverless_put.md +++ b/openapi-specs/compute/31-02/desc/policies/vulnerability_serverless_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k 'https:///api/v/policies/vulnerability/serverless' \ +$ curl 'https:///api/v/policies/vulnerability/serverless' \ -X PUT \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/31-02/desc/policies/vulnerability_vms_get.md b/openapi-specs/compute/31-02/desc/policies/vulnerability_vms_get.md index 117d2cc4a..e37c1520f 100644 --- a/openapi-specs/compute/31-02/desc/policies/vulnerability_vms_get.md +++ b/openapi-specs/compute/31-02/desc/policies/vulnerability_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Hosts > V The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/policies/vulnerability_vms_impacted_get.md b/openapi-specs/compute/31-02/desc/policies/vulnerability_vms_impacted_get.md index 29d9621ea..f1a7f7ef5 100644 --- a/openapi-specs/compute/31-02/desc/policies/vulnerability_vms_impacted_get.md +++ b/openapi-specs/compute/31-02/desc/policies/vulnerability_vms_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/vms?project=&ruleName=' ``` diff --git a/openapi-specs/compute/31-02/desc/profiles/app-embedded_download_get.md b/openapi-specs/compute/31-02/desc/profiles/app-embedded_download_get.md index 4b3f7ff8a..2e8cac56d 100644 --- a/openapi-specs/compute/31-02/desc/profiles/app-embedded_download_get.md +++ b/openapi-specs/compute/31-02/desc/profiles/app-embedded_download_get.md @@ -5,7 +5,7 @@ Downloads the app-embedded observations in a CSV format. Refer to the following example cURL command that downloads all the app-embedded runtime profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/profiles/app-embedded_get.md b/openapi-specs/compute/31-02/desc/profiles/app-embedded_get.md index f3ddb3125..c332061e5 100644 --- a/openapi-specs/compute/31-02/desc/profiles/app-embedded_get.md +++ b/openapi-specs/compute/31-02/desc/profiles/app-embedded_get.md @@ -5,7 +5,7 @@ Retrieves the app-embedded observations. Refer to the following example cURL command that lists all the app-embedded runtime: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/profiles/container_download_get.md b/openapi-specs/compute/31-02/desc/profiles/container_download_get.md index ad7a86101..ee9d5e9e4 100644 --- a/openapi-specs/compute/31-02/desc/profiles/container_download_get.md +++ b/openapi-specs/compute/31-02/desc/profiles/container_download_get.md @@ -6,7 +6,7 @@ Retrieves the details and state of all runtime models in CSV format. Refer to the following example cURL command that downloads a complete list in CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/profiles/container_filters_get.md b/openapi-specs/compute/31-02/desc/profiles/container_filters_get.md index 8b6122b80..13535b520 100644 --- a/openapi-specs/compute/31-02/desc/profiles/container_filters_get.md +++ b/openapi-specs/compute/31-02/desc/profiles/container_filters_get.md @@ -4,7 +4,7 @@ Returns a list of os and images from page monitor/runtime/container-models in Co Example curl command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/profiles/container_get.md b/openapi-specs/compute/31-02/desc/profiles/container_get.md index cdbc24c3e..59a3764fb 100644 --- a/openapi-specs/compute/31-02/desc/profiles/container_get.md +++ b/openapi-specs/compute/31-02/desc/profiles/container_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of all runtime models. Refer to the following example cURL command that lists all runtime models in a system: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/profiles/container_learn_post.md b/openapi-specs/compute/31-02/desc/profiles/container_learn_post.md index 5fef2e31e..2c1d08af1 100644 --- a/openapi-specs/compute/31-02/desc/profiles/container_learn_post.md +++ b/openapi-specs/compute/31-02/desc/profiles/container_learn_post.md @@ -7,7 +7,7 @@ For more information, refer to [Learning mode](https://docs.prismacloud.io/en/cl Refer to the following example cURL command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/profiles/host_download_get.md b/openapi-specs/compute/31-02/desc/profiles/host_download_get.md index ace270a32..2dfb51ec0 100644 --- a/openapi-specs/compute/31-02/desc/profiles/host_download_get.md +++ b/openapi-specs/compute/31-02/desc/profiles/host_download_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of each host service runtime model in CSV format Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/profiles/host_get.md b/openapi-specs/compute/31-02/desc/profiles/host_get.md index 208a24de3..55d8bf8ff 100644 --- a/openapi-specs/compute/31-02/desc/profiles/host_get.md +++ b/openapi-specs/compute/31-02/desc/profiles/host_get.md @@ -15,7 +15,7 @@ The returned JSON object has the following structure: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/profiles/host_id_rule_get.md b/openapi-specs/compute/31-02/desc/profiles/host_id_rule_get.md index 672cb4c62..8be668fca 100644 --- a/openapi-specs/compute/31-02/desc/profiles/host_id_rule_get.md +++ b/openapi-specs/compute/31-02/desc/profiles/host_id_rule_get.md @@ -10,7 +10,7 @@ This is the `PROFILE_ID`. The following example command uses curl and basic auth to specify the learning mode for a profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/profiles/service_download_get.md b/openapi-specs/compute/31-02/desc/profiles/service_download_get.md index 63dff3354..4c1c431c1 100644 --- a/openapi-specs/compute/31-02/desc/profiles/service_download_get.md +++ b/openapi-specs/compute/31-02/desc/profiles/service_download_get.md @@ -1,7 +1,7 @@ Retrieves the details and state of all host service runtime models in CSV format ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/profiles/service_get.md b/openapi-specs/compute/31-02/desc/profiles/service_get.md index a4f8c348d..5d786d919 100644 --- a/openapi-specs/compute/31-02/desc/profiles/service_get.md +++ b/openapi-specs/compute/31-02/desc/profiles/service_get.md @@ -10,7 +10,7 @@ The returned JSON object has the following structure: Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/profiles/service_id_learn_post.md b/openapi-specs/compute/31-02/desc/profiles/service_id_learn_post.md index fb338b80d..fa85fc3a2 100644 --- a/openapi-specs/compute/31-02/desc/profiles/service_id_learn_post.md +++ b/openapi-specs/compute/31-02/desc/profiles/service_id_learn_post.md @@ -11,7 +11,7 @@ The `PROFILE_ID` is typically the service's name, such as `sshd` or `ntpd`. The following example command uses curl and basic auth to specify the learning mode for a host service profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/profiles/service_learn_post.md b/openapi-specs/compute/31-02/desc/profiles/service_learn_post.md index 02a1f299e..ceff8e5a5 100644 --- a/openapi-specs/compute/31-02/desc/profiles/service_learn_post.md +++ b/openapi-specs/compute/31-02/desc/profiles/service_learn_post.md @@ -3,7 +3,7 @@ Specify the learning mode for all host service profiles. The following example command uses curl and basic auth to specify the learning mode for all host service profiles. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/profiles/service_names_get.md b/openapi-specs/compute/31-02/desc/profiles/service_names_get.md index 7da863545..afae56f0d 100644 --- a/openapi-specs/compute/31-02/desc/profiles/service_names_get.md +++ b/openapi-specs/compute/31-02/desc/profiles/service_names_get.md @@ -3,7 +3,7 @@ Retrieves the name of all host service runtime models from within the app at **M The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/projects/get.md b/openapi-specs/compute/31-02/desc/projects/get.md index 05485c24c..1ac04d2c0 100644 --- a/openapi-specs/compute/31-02/desc/projects/get.md +++ b/openapi-specs/compute/31-02/desc/projects/get.md @@ -3,7 +3,7 @@ Lists all projects visible to the given user. Assuming the given user is an admin, the following example curl command would list all projects: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/projects/name_delete.md b/openapi-specs/compute/31-02/desc/projects/name_delete.md index fba889f7e..0a34e72a2 100644 --- a/openapi-specs/compute/31-02/desc/projects/name_delete.md +++ b/openapi-specs/compute/31-02/desc/projects/name_delete.md @@ -6,7 +6,7 @@ The value for `` can be retrieved from the `_id` field in the resp The DELETE method returns the decommissioned supervisor's admin username and password. ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/compute/31-02/desc/projects/name_put.md b/openapi-specs/compute/31-02/desc/projects/name_put.md index b5a83a67d..1bde9b0c7 100644 --- a/openapi-specs/compute/31-02/desc/projects/name_put.md +++ b/openapi-specs/compute/31-02/desc/projects/name_put.md @@ -4,7 +4,7 @@ The following example curl command updates a project named ``. The value for `` can be retrieved from the `_id` field in the response object from `GET /api/v1/projects`. ```bash -$ curl -k \ +$ curl \ -u \ -X PUT \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/compute/31-02/desc/projects/post.md b/openapi-specs/compute/31-02/desc/projects/post.md index 8862c0fd4..38c574173 100644 --- a/openapi-specs/compute/31-02/desc/projects/post.md +++ b/openapi-specs/compute/31-02/desc/projects/post.md @@ -3,7 +3,7 @@ Provisions a new project. The following example curl command provisions a new project named `my-project`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ $ curl -k \ If you have installed a new instance of Console, and you have already created an initial admin user for it, then you can specify the admin username name and password when you provision the project. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/projects/projects.md b/openapi-specs/compute/31-02/desc/projects/projects.md index 7e7dcff66..19c904e9e 100644 --- a/openapi-specs/compute/31-02/desc/projects/projects.md +++ b/openapi-specs/compute/31-02/desc/projects/projects.md @@ -20,7 +20,7 @@ If `project` is not specified, it is set to `Central+Console`. For example, to retrieve the compliance policies for a tenant project named `mobile_payments_division`, use the following curl command: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/radar/container_clean_post.md b/openapi-specs/compute/31-02/desc/radar/container_clean_post.md index 662b6d53f..d4f87e91e 100644 --- a/openapi-specs/compute/31-02/desc/radar/container_clean_post.md +++ b/openapi-specs/compute/31-02/desc/radar/container_clean_post.md @@ -1,7 +1,7 @@ Cleans the container runtime profiles and Radar entities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/radar/container_delete.md b/openapi-specs/compute/31-02/desc/radar/container_delete.md index 4eabe337f..b6cc69cf2 100644 --- a/openapi-specs/compute/31-02/desc/radar/container_delete.md +++ b/openapi-specs/compute/31-02/desc/radar/container_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/31-02/desc/radar/container_export_get.md b/openapi-specs/compute/31-02/desc/radar/container_export_get.md index 7f577568f..f776c7e6c 100644 --- a/openapi-specs/compute/31-02/desc/radar/container_export_get.md +++ b/openapi-specs/compute/31-02/desc/radar/container_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for containers) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/radar/container_filters_get.md b/openapi-specs/compute/31-02/desc/radar/container_filters_get.md index f66463da1..8d7cd6df3 100644 --- a/openapi-specs/compute/31-02/desc/radar/container_filters_get.md +++ b/openapi-specs/compute/31-02/desc/radar/container_filters_get.md @@ -1,7 +1,7 @@ Returns the namespaces from the container view on the Radar page. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/radar/container_get.md b/openapi-specs/compute/31-02/desc/radar/container_get.md index 280d683d9..404629a25 100644 --- a/openapi-specs/compute/31-02/desc/radar/container_get.md +++ b/openapi-specs/compute/31-02/desc/radar/container_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (container view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/radar/host_delete.md b/openapi-specs/compute/31-02/desc/radar/host_delete.md index 738fa7a7c..b4910a8b7 100644 --- a/openapi-specs/compute/31-02/desc/radar/host_delete.md +++ b/openapi-specs/compute/31-02/desc/radar/host_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two apps in CNNF for hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/31-02/desc/radar/host_export_get.md b/openapi-specs/compute/31-02/desc/radar/host_export_get.md index dd91b5335..851d6f40f 100644 --- a/openapi-specs/compute/31-02/desc/radar/host_export_get.md +++ b/openapi-specs/compute/31-02/desc/radar/host_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for hosts) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/radar/host_get.md b/openapi-specs/compute/31-02/desc/radar/host_get.md index a12025856..222d075aa 100644 --- a/openapi-specs/compute/31-02/desc/radar/host_get.md +++ b/openapi-specs/compute/31-02/desc/radar/host_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (host view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/radar/serverless_get.md b/openapi-specs/compute/31-02/desc/radar/serverless_get.md index b2f329149..170cfb48d 100644 --- a/openapi-specs/compute/31-02/desc/radar/serverless_get.md +++ b/openapi-specs/compute/31-02/desc/radar/serverless_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/radar/serverless_progress_get.md b/openapi-specs/compute/31-02/desc/radar/serverless_progress_get.md index a11c1ae20..0808dfbf4 100644 --- a/openapi-specs/compute/31-02/desc/radar/serverless_progress_get.md +++ b/openapi-specs/compute/31-02/desc/radar/serverless_progress_get.md @@ -1,7 +1,7 @@ Returns the scan progress from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/radar/serverless_scan_post.md b/openapi-specs/compute/31-02/desc/radar/serverless_scan_post.md index 0d519ba88..2d444ac88 100644 --- a/openapi-specs/compute/31-02/desc/radar/serverless_scan_post.md +++ b/openapi-specs/compute/31-02/desc/radar/serverless_scan_post.md @@ -1,7 +1,7 @@ Initiates a serverless scan of your environments. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/radar/serverless_stop_post.md b/openapi-specs/compute/31-02/desc/radar/serverless_stop_post.md index 5c0bdf186..f15bef34d 100644 --- a/openapi-specs/compute/31-02/desc/radar/serverless_stop_post.md +++ b/openapi-specs/compute/31-02/desc/radar/serverless_stop_post.md @@ -1,7 +1,7 @@ Stops an in-progress serverless scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/rbac/role_delete.md b/openapi-specs/compute/31-02/desc/rbac/role_delete.md index 87015b6e8..46efcf9c9 100644 --- a/openapi-specs/compute/31-02/desc/rbac/role_delete.md +++ b/openapi-specs/compute/31-02/desc/rbac/role_delete.md @@ -4,7 +4,7 @@ System roles and roles assigned to users/groups cannot be deleted. The following example curl command uses basic auth to delete role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/31-02/desc/rbac/roles_get.md b/openapi-specs/compute/31-02/desc/rbac/roles_get.md index 4cd1d9bc7..112026937 100644 --- a/openapi-specs/compute/31-02/desc/rbac/roles_get.md +++ b/openapi-specs/compute/31-02/desc/rbac/roles_get.md @@ -3,7 +3,7 @@ This endpoint will return a list in JSON format of the roles can be found under The following example curl command uses basic auth to return: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/rbac/roles_post.md b/openapi-specs/compute/31-02/desc/rbac/roles_post.md index 1f20772ce..6988766e8 100644 --- a/openapi-specs/compute/31-02/desc/rbac/roles_post.md +++ b/openapi-specs/compute/31-02/desc/rbac/roles_post.md @@ -37,7 +37,7 @@ The added role must contain the "user" permission with read-write access. This p The following example curl command uses basic auth to create the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/rbac/roles_put.md b/openapi-specs/compute/31-02/desc/rbac/roles_put.md index 34d7b41a7..f62e34ccb 100644 --- a/openapi-specs/compute/31-02/desc/rbac/roles_put.md +++ b/openapi-specs/compute/31-02/desc/rbac/roles_put.md @@ -38,7 +38,7 @@ The updated role must contain the "user" permission with read-write access. This The following example curl command uses basic auth to update the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/31-02/desc/recovery/backup_get.md b/openapi-specs/compute/31-02/desc/recovery/backup_get.md index 4da46f356..bf735905a 100644 --- a/openapi-specs/compute/31-02/desc/recovery/backup_get.md +++ b/openapi-specs/compute/31-02/desc/recovery/backup_get.md @@ -3,7 +3,7 @@ Returns a list of available backups. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/recovery/backup_id_delete.md b/openapi-specs/compute/31-02/desc/recovery/backup_id_delete.md index ae9c33e90..80cd4c3f6 100644 --- a/openapi-specs/compute/31-02/desc/recovery/backup_id_delete.md +++ b/openapi-specs/compute/31-02/desc/recovery/backup_id_delete.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/31-02/desc/recovery/backup_id_patch.md b/openapi-specs/compute/31-02/desc/recovery/backup_id_patch.md index 4a78cd67d..b3699972f 100644 --- a/openapi-specs/compute/31-02/desc/recovery/backup_id_patch.md +++ b/openapi-specs/compute/31-02/desc/recovery/backup_id_patch.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/compute/31-02/desc/recovery/backup_post.md b/openapi-specs/compute/31-02/desc/recovery/backup_post.md index f45161712..41436fe5f 100644 --- a/openapi-specs/compute/31-02/desc/recovery/backup_post.md +++ b/openapi-specs/compute/31-02/desc/recovery/backup_post.md @@ -3,7 +3,7 @@ Creates a backup named `backup_name` by invoking the MongoDB dump process. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/recovery/restore_id_post.md b/openapi-specs/compute/31-02/desc/recovery/restore_id_post.md index 850fceeaa..e424641cc 100644 --- a/openapi-specs/compute/31-02/desc/recovery/restore_id_post.md +++ b/openapi-specs/compute/31-02/desc/recovery/restore_id_post.md @@ -5,7 +5,7 @@ Restores Prisma Cloud Compute from the given backup. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/registry/download_get.md b/openapi-specs/compute/31-02/desc/registry/download_get.md index 5a3eb0141..3eef8d50e 100644 --- a/openapi-specs/compute/31-02/desc/registry/download_get.md +++ b/openapi-specs/compute/31-02/desc/registry/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Compliance > Images > Reg Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/registry/get.md b/openapi-specs/compute/31-02/desc/registry/get.md index 96b46382e..7474b119a 100644 --- a/openapi-specs/compute/31-02/desc/registry/get.md +++ b/openapi-specs/compute/31-02/desc/registry/get.md @@ -20,7 +20,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that retrieves a scan report for all images in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -32,7 +32,7 @@ The compact query can be used to get a general overview of the number of Vulnera Refer to the following cURL command that retrieves a compact scan report for the Ubuntu image in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -43,7 +43,7 @@ The name query is synonymous with the filter registry text field in the Console Refer to the following cURL that retrieves the scan report for the image in the registry with the matching **sha256** hash: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -53,7 +53,7 @@ $ curl -k \ Refer to the following cURL command that retrieves the images in the first 10 registries: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/registry/get_registry_progress.md b/openapi-specs/compute/31-02/desc/registry/get_registry_progress.md index 03c5d0896..c08331d5b 100644 --- a/openapi-specs/compute/31-02/desc/registry/get_registry_progress.md +++ b/openapi-specs/compute/31-02/desc/registry/get_registry_progress.md @@ -9,7 +9,7 @@ For a regular scan, use the API path only without any query parameters. Refer to the following example cURL request that retrieves the ongoing scan details for a regular registry scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -63,7 +63,7 @@ For an on-demand scan that is started using the `/registry/scan` endpoint with t Refer to the following example cURL request that retrieves the ongoing scan details for an on-demand registry scan that is started using the `/registry/scan` endpoint for the repository `alpine` with tag `3.16`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/registry/names_get.md b/openapi-specs/compute/31-02/desc/registry/names_get.md index 1e5bed727..f3b8676a8 100644 --- a/openapi-specs/compute/31-02/desc/registry/names_get.md +++ b/openapi-specs/compute/31-02/desc/registry/names_get.md @@ -5,7 +5,7 @@ Retrieves a list of image names from current scanned registry images. The base ` Refer to the following example cURL command that retrieves a list of image names from your scanned registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/registry/scan_post.md b/openapi-specs/compute/31-02/desc/registry/scan_post.md index ce7e19533..96bfd5f16 100644 --- a/openapi-specs/compute/31-02/desc/registry/scan_post.md +++ b/openapi-specs/compute/31-02/desc/registry/scan_post.md @@ -17,7 +17,7 @@ For information on scan result, see [Get Registry Scan Report](https://prisma.pa Refer to the following example cURL command that forces Prisma Cloud Compute to rescan all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -27,7 +27,7 @@ $ curl -k \ Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan a specific image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -52,7 +52,7 @@ For information on scan result, see [Get Registry Scan Report](https://pan.dev/p Refer to the following example cURL command to trigger an on-demand scan for an image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/registry/stop_post.md b/openapi-specs/compute/31-02/desc/registry/stop_post.md index 29e103ac1..05ac2f436 100644 --- a/openapi-specs/compute/31-02/desc/registry/stop_post.md +++ b/openapi-specs/compute/31-02/desc/registry/stop_post.md @@ -5,7 +5,7 @@ Stops current registry scan immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to stop scanning all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/scans/download_get.md b/openapi-specs/compute/31-02/desc/scans/download_get.md index 61a0ccc2d..3785bf562 100644 --- a/openapi-specs/compute/31-02/desc/scans/download_get.md +++ b/openapi-specs/compute/31-02/desc/scans/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Images The following cURL command retrieves and saves your Jenkins and twistcli scan reports to a CSV file called `scans_report.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/scans/filter_get.md b/openapi-specs/compute/31-02/desc/scans/filter_get.md index 58550ad35..df3e9cdb0 100644 --- a/openapi-specs/compute/31-02/desc/scans/filter_get.md +++ b/openapi-specs/compute/31-02/desc/scans/filter_get.md @@ -3,7 +3,7 @@ Retrieves the list of Jenkins projects that have been scanned by the Jenkins plu The following example curl command uses basic auth to retrieve the list of Jenkins project names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/scans/get.md b/openapi-specs/compute/31-02/desc/scans/get.md index 9bc06317f..775d9934f 100644 --- a/openapi-specs/compute/31-02/desc/scans/get.md +++ b/openapi-specs/compute/31-02/desc/scans/get.md @@ -10,7 +10,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command that retrieves the scan reports for all images scanned using the Jenkins CI plugin or the twistcli tool: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -22,7 +22,7 @@ To get the report of a specific scan, add query parameters to narrow the scope o The following cURL command retrieves the scan report for an image with a SHA256 ID of `sha256:f756e84300d8e53006090573dd33abe5b8cfac3e42d104fc4be37f435fe512f3`. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/scans/id_get.md b/openapi-specs/compute/31-02/desc/scans/id_get.md index 7a342ef60..1557b1905 100644 --- a/openapi-specs/compute/31-02/desc/scans/id_get.md +++ b/openapi-specs/compute/31-02/desc/scans/id_get.md @@ -3,7 +3,7 @@ Retrieves all scan reports for images scanned by the Jenkins plugin or twistcli The following example curl command uses basic auth to retrieve the scan report for just an image with a SHA256 ID of `5c3385fd2e76c5c16124c077`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/scripts/console_sh_get.md b/openapi-specs/compute/31-02/desc/scripts/console_sh_get.md index d8f02038f..1622321ca 100644 --- a/openapi-specs/compute/31-02/desc/scripts/console_sh_get.md +++ b/openapi-specs/compute/31-02/desc/scripts/console_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/scripts/defender_ps1_get.md b/openapi-specs/compute/31-02/desc/scripts/defender_ps1_get.md index a47616983..45e4a6133 100644 --- a/openapi-specs/compute/31-02/desc/scripts/defender_ps1_get.md +++ b/openapi-specs/compute/31-02/desc/scripts/defender_ps1_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/scripts/defender_sh_get.md b/openapi-specs/compute/31-02/desc/scripts/defender_sh_get.md index 98ad6cf62..a8a302426 100644 --- a/openapi-specs/compute/31-02/desc/scripts/defender_sh_get.md +++ b/openapi-specs/compute/31-02/desc/scripts/defender_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/serverless/download_get.md b/openapi-specs/compute/31-02/desc/serverless/download_get.md index a8e49ff25..4d7d3adc1 100644 --- a/openapi-specs/compute/31-02/desc/serverless/download_get.md +++ b/openapi-specs/compute/31-02/desc/serverless/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Functio The following cURL command retrieves a list of all serverless resources monitored by Prisma Cloud Compute and saves the results in a CSV file called `serverless.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/serverless/download' \ diff --git a/openapi-specs/compute/31-02/desc/serverless/embed_post.md b/openapi-specs/compute/31-02/desc/serverless/embed_post.md index 6cce784b8..353b5721c 100644 --- a/openapi-specs/compute/31-02/desc/serverless/embed_post.md +++ b/openapi-specs/compute/31-02/desc/serverless/embed_post.md @@ -1,7 +1,7 @@ The following curl command uses basic auth to retrieve a list of all Serverless resources that monitored by Prisma Cloud Compute, and save the results to a CSV file: ```bash -$ curl -k \ +$ curl \ -X POST \ -H "Content-Type: application/octet-stream" \ -u \ diff --git a/openapi-specs/compute/31-02/desc/serverless/get.md b/openapi-specs/compute/31-02/desc/serverless/get.md index 77a0d8a4e..c6c75c480 100644 --- a/openapi-specs/compute/31-02/desc/serverless/get.md +++ b/openapi-specs/compute/31-02/desc/serverless/get.md @@ -10,7 +10,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Functions > Scanned function Refer to the following example cURL command that retrieves the scan reports for serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/serverless/names_get.md b/openapi-specs/compute/31-02/desc/serverless/names_get.md index 62cbcd53b..ab229e0f8 100644 --- a/openapi-specs/compute/31-02/desc/serverless/names_get.md +++ b/openapi-specs/compute/31-02/desc/serverless/names_get.md @@ -1,7 +1,7 @@ The following curl command uses basic auth to retrieve a list of names of all Serverless resources monitored by Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -X GET \ -H "Content-Type: application/json" \ -u \ diff --git a/openapi-specs/compute/31-02/desc/serverless/scan_post.md b/openapi-specs/compute/31-02/desc/serverless/scan_post.md index 159285349..70a3a3b4e 100644 --- a/openapi-specs/compute/31-02/desc/serverless/scan_post.md +++ b/openapi-specs/compute/31-02/desc/serverless/scan_post.md @@ -5,7 +5,7 @@ Re-scan all serverless functions immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/scan diff --git a/openapi-specs/compute/31-02/desc/serverless/stop_post.md b/openapi-specs/compute/31-02/desc/serverless/stop_post.md index 763710842..67c0d2239 100644 --- a/openapi-specs/compute/31-02/desc/serverless/stop_post.md +++ b/openapi-specs/compute/31-02/desc/serverless/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing serverless scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/stop diff --git a/openapi-specs/compute/31-02/desc/settings/alerts_get.md b/openapi-specs/compute/31-02/desc/settings/alerts_get.md index 060114c39..2b25dc6c9 100644 --- a/openapi-specs/compute/31-02/desc/settings/alerts_get.md +++ b/openapi-specs/compute/31-02/desc/settings/alerts_get.md @@ -1,7 +1,7 @@ Retrieves a list of your alert settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/settings/alerts_options_get.md b/openapi-specs/compute/31-02/desc/settings/alerts_options_get.md index 095c1f1b7..aa7a1d250 100644 --- a/openapi-specs/compute/31-02/desc/settings/alerts_options_get.md +++ b/openapi-specs/compute/31-02/desc/settings/alerts_options_get.md @@ -3,7 +3,7 @@ This endpoint will return the alert profile configuration options that can be fo The following example curl command uses basic auth to retrieve all alert profile configuration options: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/settings/alerts_post.md b/openapi-specs/compute/31-02/desc/settings/alerts_post.md index 3acb8d543..cd303f880 100644 --- a/openapi-specs/compute/31-02/desc/settings/alerts_post.md +++ b/openapi-specs/compute/31-02/desc/settings/alerts_post.md @@ -3,7 +3,7 @@ Configure alerts. The following example curl command sets the aggregation period for alerts to one hour. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/settings/certificates_post.md b/openapi-specs/compute/31-02/desc/settings/certificates_post.md index fbdc8a5a9..bd30ea399 100644 --- a/openapi-specs/compute/31-02/desc/settings/certificates_post.md +++ b/openapi-specs/compute/31-02/desc/settings/certificates_post.md @@ -9,7 +9,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to set the validity period for client certificates to seven days: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/31-02/desc/settings/certs_get.md b/openapi-specs/compute/31-02/desc/settings/certs_get.md index ba6674a3c..dbf1d3790 100644 --- a/openapi-specs/compute/31-02/desc/settings/certs_get.md +++ b/openapi-specs/compute/31-02/desc/settings/certs_get.md @@ -6,7 +6,7 @@ Defenders use these names to connect to Console. Refer to the following example cURL request that uses basic auth to retrieve the SANs in Console's cert: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/settings/certs_post.md b/openapi-specs/compute/31-02/desc/settings/certs_post.md index a6e429006..fb2cedee5 100644 --- a/openapi-specs/compute/31-02/desc/settings/certs_post.md +++ b/openapi-specs/compute/31-02/desc/settings/certs_post.md @@ -12,7 +12,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to add `node-01.example.com` to the `subjectAltName` field in the certificate: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/31-02/desc/settings/coderepos_get.md b/openapi-specs/compute/31-02/desc/settings/coderepos_get.md index 6cbfb78cb..286a8d905 100644 --- a/openapi-specs/compute/31-02/desc/settings/coderepos_get.md +++ b/openapi-specs/compute/31-02/desc/settings/coderepos_get.md @@ -20,7 +20,7 @@ Construct the full webhook using Console's publicly accessible DNS name or IP ad Refer to the following example cURL command that retrieves all code repositories to scan, as well as the webhook URL suffix: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/settings/console-certificate_post.md b/openapi-specs/compute/31-02/desc/settings/console-certificate_post.md index 5673af840..392061c8f 100644 --- a/openapi-specs/compute/31-02/desc/settings/console-certificate_post.md +++ b/openapi-specs/compute/31-02/desc/settings/console-certificate_post.md @@ -9,7 +9,7 @@ For the custom TLS certificate for securing browser access, this file must be in Refer to the following example cURL request that uses basic auth and configures the custom certificate to use for securing browser access to the console: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/settings/custom-labels_get.md b/openapi-specs/compute/31-02/desc/settings/custom-labels_get.md index a849dd8a8..19c1cadde 100644 --- a/openapi-specs/compute/31-02/desc/settings/custom-labels_get.md +++ b/openapi-specs/compute/31-02/desc/settings/custom-labels_get.md @@ -5,7 +5,7 @@ Returns the list of alert labels configured in Prisma Cloud Compute. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/settings/custom-labels_post.md b/openapi-specs/compute/31-02/desc/settings/custom-labels_post.md index 6bb66e706..9b0702fe8 100644 --- a/openapi-specs/compute/31-02/desc/settings/custom-labels_post.md +++ b/openapi-specs/compute/31-02/desc/settings/custom-labels_post.md @@ -5,7 +5,7 @@ Creates a custom alert label to augment audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/settings/defender_get.md b/openapi-specs/compute/31-02/desc/settings/defender_get.md index ecb8b6989..cf43bb304 100644 --- a/openapi-specs/compute/31-02/desc/settings/defender_get.md +++ b/openapi-specs/compute/31-02/desc/settings/defender_get.md @@ -5,7 +5,7 @@ Returns the advanced settings for Defenders. Refer to the following example cURL command that gets all advanced settings for Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/settings/forensic_get.md b/openapi-specs/compute/31-02/desc/settings/forensic_get.md index 9c16b70b9..3486b2bf9 100644 --- a/openapi-specs/compute/31-02/desc/settings/forensic_get.md +++ b/openapi-specs/compute/31-02/desc/settings/forensic_get.md @@ -1,7 +1,7 @@ Retrieves the settings for the forensics system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/settings/forensic_post.md b/openapi-specs/compute/31-02/desc/settings/forensic_post.md index 31f809d39..8943842fb 100644 --- a/openapi-specs/compute/31-02/desc/settings/forensic_post.md +++ b/openapi-specs/compute/31-02/desc/settings/forensic_post.md @@ -3,7 +3,7 @@ Configures the forensics system. The following example curl command allocates 100 MB of local disk space for container forensic data and 10 MB for host forensics data. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/settings/initialized_get.md b/openapi-specs/compute/31-02/desc/settings/initialized_get.md index 3134912d1..2af8462f1 100644 --- a/openapi-specs/compute/31-02/desc/settings/initialized_get.md +++ b/openapi-specs/compute/31-02/desc/settings/initialized_get.md @@ -4,7 +4,7 @@ After first installing Console, the first thing you must do is create an admin a Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/settings/intelligence-windows_post.md b/openapi-specs/compute/31-02/desc/settings/intelligence-windows_post.md index c39e256d2..0721dab3b 100644 --- a/openapi-specs/compute/31-02/desc/settings/intelligence-windows_post.md +++ b/openapi-specs/compute/31-02/desc/settings/intelligence-windows_post.md @@ -3,7 +3,7 @@ This endpoint will enable or disable the Windows Intelligence Service from **Man The following example curl command uses basic auth to enable online updates of Windows vulnerabilities from the intelligence stream: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/settings/intelligence_get.md b/openapi-specs/compute/31-02/desc/settings/intelligence_get.md index 26c694246..15e9f24ae 100644 --- a/openapi-specs/compute/31-02/desc/settings/intelligence_get.md +++ b/openapi-specs/compute/31-02/desc/settings/intelligence_get.md @@ -5,7 +5,7 @@ Returns the details about the Intelligence Stream configuration. Refer to the following example cURL command that uses basic auth to retrieve your Intelligence Stream configuration settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/settings/intelligence_post.md b/openapi-specs/compute/31-02/desc/settings/intelligence_post.md index 74b06a3a0..2dbbd0168 100644 --- a/openapi-specs/compute/31-02/desc/settings/intelligence_post.md +++ b/openapi-specs/compute/31-02/desc/settings/intelligence_post.md @@ -7,7 +7,7 @@ For more information, see [Intelligence Stream](https://docs.paloaltonetworks.co Refer to the following example cURL command that uses basic auth to configure settings of your Intelligence Stream. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/settings/latest-version_get.md b/openapi-specs/compute/31-02/desc/settings/latest-version_get.md index c443fa7b5..16601fb5b 100644 --- a/openapi-specs/compute/31-02/desc/settings/latest-version_get.md +++ b/openapi-specs/compute/31-02/desc/settings/latest-version_get.md @@ -3,7 +3,7 @@ Retrieves the version number of the latest available Prisma Cloud Compute releas Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/settings/latest_version_get.md b/openapi-specs/compute/31-02/desc/settings/latest_version_get.md index 18e436668..5c64edff1 100644 --- a/openapi-specs/compute/31-02/desc/settings/latest_version_get.md +++ b/openapi-specs/compute/31-02/desc/settings/latest_version_get.md @@ -1,7 +1,7 @@ This endpoint will return the latest version of the product. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/settings/ldap_get.md b/openapi-specs/compute/31-02/desc/settings/ldap_get.md index 4ad0ad0c9..7d803ba1c 100644 --- a/openapi-specs/compute/31-02/desc/settings/ldap_get.md +++ b/openapi-specs/compute/31-02/desc/settings/ldap_get.md @@ -5,7 +5,7 @@ Returns the LDAP integration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/settings/ldap_post.md b/openapi-specs/compute/31-02/desc/settings/ldap_post.md index c152c7dc5..34bc06ef4 100644 --- a/openapi-specs/compute/31-02/desc/settings/ldap_post.md +++ b/openapi-specs/compute/31-02/desc/settings/ldap_post.md @@ -7,7 +7,7 @@ For more information, see [Active Directory](https://docs.paloaltonetworks.com/p Refer to the following example cURL command that enables the LDAP integration and specifies the parameters required to integrate with an Active Directory service. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/settings/license_get.md b/openapi-specs/compute/31-02/desc/settings/license_get.md index 5c792cae8..2b4b548e3 100644 --- a/openapi-specs/compute/31-02/desc/settings/license_get.md +++ b/openapi-specs/compute/31-02/desc/settings/license_get.md @@ -5,7 +5,7 @@ Returns the details about the installed license. Refer to the following example cURL request that retrieves the license details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/settings/license_post.md b/openapi-specs/compute/31-02/desc/settings/license_post.md index b77800a5f..ce74b0d0f 100644 --- a/openapi-specs/compute/31-02/desc/settings/license_post.md +++ b/openapi-specs/compute/31-02/desc/settings/license_post.md @@ -8,7 +8,7 @@ For more information, see [Licensing](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to set your license: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/settings/logging_get.md b/openapi-specs/compute/31-02/desc/settings/logging_get.md index 6eda3e484..012be5def 100644 --- a/openapi-specs/compute/31-02/desc/settings/logging_get.md +++ b/openapi-specs/compute/31-02/desc/settings/logging_get.md @@ -5,7 +5,7 @@ Returns the logging settings. Refer to the following example cURL request that uses basic auth to retrieve your logging details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/settings/logging_post.md b/openapi-specs/compute/31-02/desc/settings/logging_post.md index 3619d9c0f..8d27ee1b3 100644 --- a/openapi-specs/compute/31-02/desc/settings/logging_post.md +++ b/openapi-specs/compute/31-02/desc/settings/logging_post.md @@ -8,7 +8,7 @@ For more information, see [Logging](https://docs.paloaltonetworks.com/prisma/pri Refer to the following example cURL request that enables verbose scan output for syslog and stdout: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/settings/logon_get.md b/openapi-specs/compute/31-02/desc/settings/logon_get.md index 1559f2405..b1e9164f2 100644 --- a/openapi-specs/compute/31-02/desc/settings/logon_get.md +++ b/openapi-specs/compute/31-02/desc/settings/logon_get.md @@ -5,7 +5,7 @@ Configures the logon settings. Refer to the following example cURL request that uses basic auth to retrieve all current logon settings. ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/settings/logon_post.md b/openapi-specs/compute/31-02/desc/settings/logon_post.md index 5c2b60c9f..691e082fe 100644 --- a/openapi-specs/compute/31-02/desc/settings/logon_post.md +++ b/openapi-specs/compute/31-02/desc/settings/logon_post.md @@ -7,7 +7,7 @@ For more information, see [Logon Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that uses basic auth to set the timeout to 900 seconds (15 minutes): ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/31-02/desc/settings/oauth_get.md b/openapi-specs/compute/31-02/desc/settings/oauth_get.md index 6dcf70fb5..5d997f016 100644 --- a/openapi-specs/compute/31-02/desc/settings/oauth_get.md +++ b/openapi-specs/compute/31-02/desc/settings/oauth_get.md @@ -5,7 +5,7 @@ Returns the OAuth configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/settings/oauth_post.md b/openapi-specs/compute/31-02/desc/settings/oauth_post.md index c593b9237..da3c83d2f 100644 --- a/openapi-specs/compute/31-02/desc/settings/oauth_post.md +++ b/openapi-specs/compute/31-02/desc/settings/oauth_post.md @@ -7,7 +7,7 @@ For more information, see [GitHub OAuth](https://docs.paloaltonetworks.com/prism Refer to the following example cURL response: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/settings/oidc_get.md b/openapi-specs/compute/31-02/desc/settings/oidc_get.md index ee439622b..1f27f93ba 100644 --- a/openapi-specs/compute/31-02/desc/settings/oidc_get.md +++ b/openapi-specs/compute/31-02/desc/settings/oidc_get.md @@ -5,7 +5,7 @@ Returns the OpenID Connect configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/settings/oidc_post.md b/openapi-specs/compute/31-02/desc/settings/oidc_post.md index e0270247e..5bd3a9192 100644 --- a/openapi-specs/compute/31-02/desc/settings/oidc_post.md +++ b/openapi-specs/compute/31-02/desc/settings/oidc_post.md @@ -7,7 +7,7 @@ For more information, see [OIDC](https://docs.paloaltonetworks.com/prisma/prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/settings/pcf_get.md b/openapi-specs/compute/31-02/desc/settings/pcf_get.md index 5dc21eb17..c5e42a823 100644 --- a/openapi-specs/compute/31-02/desc/settings/pcf_get.md +++ b/openapi-specs/compute/31-02/desc/settings/pcf_get.md @@ -3,7 +3,7 @@ This endpoint will return settings for PCF (Pivotal Cloud Foundry)Blobstore scan The following example curl command uses basic auth to retrieve the current PCF Blobstore scanning settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/settings/pcf_post.md b/openapi-specs/compute/31-02/desc/settings/pcf_post.md index 139e947cb..657e14f27 100644 --- a/openapi-specs/compute/31-02/desc/settings/pcf_post.md +++ b/openapi-specs/compute/31-02/desc/settings/pcf_post.md @@ -3,7 +3,7 @@ This endpoint will allow for updating settings for PCF (Pivotal Cloud Foundry) B The following example curl command uses basic auth to set up a PCF Blobstore scanner that scans the last `5` droplets for every droplet in the PCF Blobstore: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/settings/projects_get.md b/openapi-specs/compute/31-02/desc/settings/projects_get.md index f5dd20395..bc95414a1 100644 --- a/openapi-specs/compute/31-02/desc/settings/projects_get.md +++ b/openapi-specs/compute/31-02/desc/settings/projects_get.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command retrieves the state of the Projects feature from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ All API calls must be proxied through Central Console, where the request is auto To retrieve the Projects settings from a supervisor Console, append the `project` query parameter to your request. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/settings/projects_post.md b/openapi-specs/compute/31-02/desc/settings/projects_post.md index d29f8e9d5..b3472e6b9 100644 --- a/openapi-specs/compute/31-02/desc/settings/projects_post.md +++ b/openapi-specs/compute/31-02/desc/settings/projects_post.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command designates `` as master. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/settings/proxy_get.md b/openapi-specs/compute/31-02/desc/settings/proxy_get.md index 9a4922d59..477563069 100644 --- a/openapi-specs/compute/31-02/desc/settings/proxy_get.md +++ b/openapi-specs/compute/31-02/desc/settings/proxy_get.md @@ -5,7 +5,7 @@ Returns the proxy settings for Prisma Cloud Compute containers to access the Int Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/settings/proxy_post.md b/openapi-specs/compute/31-02/desc/settings/proxy_post.md index a1bdc07ed..df926524e 100644 --- a/openapi-specs/compute/31-02/desc/settings/proxy_post.md +++ b/openapi-specs/compute/31-02/desc/settings/proxy_post.md @@ -7,7 +7,7 @@ For more information, see [Proxy Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that specifies the proxy to use to access the Internet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/settings/registry_get.md b/openapi-specs/compute/31-02/desc/settings/registry_get.md index 12745005d..64e70b698 100644 --- a/openapi-specs/compute/31-02/desc/settings/registry_get.md +++ b/openapi-specs/compute/31-02/desc/settings/registry_get.md @@ -17,7 +17,7 @@ Construct the full webhook using the publicly accessible DNS name or IP address, The following cURL command retrieves all the registries to scan and the URL suffix for the registry's webhook URL suffix. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/settings/registry_post.md b/openapi-specs/compute/31-02/desc/settings/registry_post.md index 0fae2c481..f9ff1b8e6 100644 --- a/openapi-specs/compute/31-02/desc/settings/registry_post.md +++ b/openapi-specs/compute/31-02/desc/settings/registry_post.md @@ -30,7 +30,7 @@ The API response returns an HTTP 400 error, if the number of registry specificat Refer to the following example cURL command that configures Prisma Cloud Compute to scan the Ubuntu 16.04 repository on Docker Hub: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -64,7 +64,7 @@ To add settings for a GitLab Container Registry, you must specify the following Refer to the following example cURL command: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/settings/registry_put.md b/openapi-specs/compute/31-02/desc/settings/registry_put.md index 3768914f6..75d6c79a2 100644 --- a/openapi-specs/compute/31-02/desc/settings/registry_put.md +++ b/openapi-specs/compute/31-02/desc/settings/registry_put.md @@ -127,7 +127,7 @@ To remove a registry from the list: To delete all entries, submit an empty `specifications` array. For example: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/31-02/desc/settings/saml_get.md b/openapi-specs/compute/31-02/desc/settings/saml_get.md index f2228a440..4fb940e80 100644 --- a/openapi-specs/compute/31-02/desc/settings/saml_get.md +++ b/openapi-specs/compute/31-02/desc/settings/saml_get.md @@ -5,7 +5,7 @@ Returns the configured SAML settings that is used to authenticate to the Prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/settings/saml_post.md b/openapi-specs/compute/31-02/desc/settings/saml_post.md index 0bd9c4a25..dfe8d380f 100644 --- a/openapi-specs/compute/31-02/desc/settings/saml_post.md +++ b/openapi-specs/compute/31-02/desc/settings/saml_post.md @@ -7,7 +7,7 @@ For more information, see [Okta via SAML 2.0](https://docs.paloaltonetworks.com/ Refer to the following example cURL request that uses the basic auth to set up and enable the SAML integration with Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/settings/scan_get.md b/openapi-specs/compute/31-02/desc/settings/scan_get.md index 5c1df30a2..543ea7662 100644 --- a/openapi-specs/compute/31-02/desc/settings/scan_get.md +++ b/openapi-specs/compute/31-02/desc/settings/scan_get.md @@ -5,7 +5,7 @@ Returns the global settings for image, host, container, and registry scanning. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/settings/scan_post.md b/openapi-specs/compute/31-02/desc/settings/scan_post.md index f043d1c9f..9ddb521a2 100644 --- a/openapi-specs/compute/31-02/desc/settings/scan_post.md +++ b/openapi-specs/compute/31-02/desc/settings/scan_post.md @@ -9,7 +9,7 @@ Refer to the following example cURL request that configures the following scan i * Scan images, containers, and hosts once per day. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/settings/secrets_get.md b/openapi-specs/compute/31-02/desc/settings/secrets_get.md index 75e2b32c7..339009641 100644 --- a/openapi-specs/compute/31-02/desc/settings/secrets_get.md +++ b/openapi-specs/compute/31-02/desc/settings/secrets_get.md @@ -3,7 +3,7 @@ This endpoint will return configured secret store already configured in the cons The following example curl command retrieves any configured secret stores, as well as the refresh period in hours: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/settings/secrets_post.md b/openapi-specs/compute/31-02/desc/settings/secrets_post.md index d302ecdf8..730d031bf 100644 --- a/openapi-specs/compute/31-02/desc/settings/secrets_post.md +++ b/openapi-specs/compute/31-02/desc/settings/secrets_post.md @@ -5,7 +5,7 @@ Please note the data structure returned from endpoint /settings/secrets GET to s Refer to the following example curl command that adds a CyberArk secret store to the console with the appID set to `Prisma_Cloud_Compute_Console` and set the URL to `https://services-myca.twistlock.com:10882`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/settings/serverless-scan_get.md b/openapi-specs/compute/31-02/desc/settings/serverless-scan_get.md index bb8ce06ba..eb42e4a12 100644 --- a/openapi-specs/compute/31-02/desc/settings/serverless-scan_get.md +++ b/openapi-specs/compute/31-02/desc/settings/serverless-scan_get.md @@ -8,7 +8,7 @@ This endpoint maps to the **Function scope** table data in the **Defend > Vulner Refer to the following example cURL command that retrieves a list of serverless scan scopes: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/settings/serverless_get.md b/openapi-specs/compute/31-02/desc/settings/serverless_get.md index b6122c460..8c654807c 100644 --- a/openapi-specs/compute/31-02/desc/settings/serverless_get.md +++ b/openapi-specs/compute/31-02/desc/settings/serverless_get.md @@ -3,7 +3,7 @@ This endpoint will return any configured serverless function scanners found in * The following example curl command uses basic auth to retrieve serverless settings in an array, sorted by Cloud Provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/settings/serverless_post.md b/openapi-specs/compute/31-02/desc/settings/serverless_post.md index 6e26ea1d3..c0e0f3225 100644 --- a/openapi-specs/compute/31-02/desc/settings/serverless_post.md +++ b/openapi-specs/compute/31-02/desc/settings/serverless_post.md @@ -3,7 +3,7 @@ This endpoint will add serverless function providers to scan for vulnerabilities The following example curl command uses basic auth to add a serverless account to scan for serverless functions. This is assuming that you already have the [credential](https://docs.twistlock.com/docs/latest/configure/credentials_store.html) added to the console that is needed to scan that provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/settings/system_get.md b/openapi-specs/compute/31-02/desc/settings/system_get.md index 6f893abf0..0e8a3cba3 100644 --- a/openapi-specs/compute/31-02/desc/settings/system_get.md +++ b/openapi-specs/compute/31-02/desc/settings/system_get.md @@ -3,7 +3,7 @@ This endpoint will return all system settings in JSON format. The following example curl command does exactly that: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/settings/tas_get.md b/openapi-specs/compute/31-02/desc/settings/tas_get.md index 52f392433..d2d0017f0 100644 --- a/openapi-specs/compute/31-02/desc/settings/tas_get.md +++ b/openapi-specs/compute/31-02/desc/settings/tas_get.md @@ -5,7 +5,7 @@ Retrieves Tanzu Application Service (TAS) settings. Refer to the following example cURL command that retrieves all TAS settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/settings/telemetry_get.md b/openapi-specs/compute/31-02/desc/settings/telemetry_get.md index 6460c3fc3..46a807e77 100644 --- a/openapi-specs/compute/31-02/desc/settings/telemetry_get.md +++ b/openapi-specs/compute/31-02/desc/settings/telemetry_get.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that retrieves the settings if telemetry is enabled or not: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/settings/telemetry_post.md b/openapi-specs/compute/31-02/desc/settings/telemetry_post.md index bc97a6d0f..662846f33 100644 --- a/openapi-specs/compute/31-02/desc/settings/telemetry_post.md +++ b/openapi-specs/compute/31-02/desc/settings/telemetry_post.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to turn off telemetry: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/settings/trusted_certificate_post.md b/openapi-specs/compute/31-02/desc/settings/trusted_certificate_post.md index 5a2a30bda..c54b96fa5 100644 --- a/openapi-specs/compute/31-02/desc/settings/trusted_certificate_post.md +++ b/openapi-specs/compute/31-02/desc/settings/trusted_certificate_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/trusted-certificates` endpoint. Refer to the following example cURL request that uses basic auth to add a certificate to the list: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/31-02/desc/settings/trusted_certificates_post.md b/openapi-specs/compute/31-02/desc/settings/trusted_certificates_post.md index 78c07982b..e9bdc72a1 100644 --- a/openapi-specs/compute/31-02/desc/settings/trusted_certificates_post.md +++ b/openapi-specs/compute/31-02/desc/settings/trusted_certificates_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/certificates` endpoint. Refer to the following example cURL request that uses basic auth to enable this feature: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/31-02/desc/settings/vm_get.md b/openapi-specs/compute/31-02/desc/settings/vm_get.md index 8043742f5..b98b94240 100644 --- a/openapi-specs/compute/31-02/desc/settings/vm_get.md +++ b/openapi-specs/compute/31-02/desc/settings/vm_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **VM images scope** table data in the **Defend > Vulne Refer to the following example cURL command that retrieves all the scopes used for pattern matching on VM functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/signup/post.md b/openapi-specs/compute/31-02/desc/signup/post.md index 1db21df29..67344a0b1 100644 --- a/openapi-specs/compute/31-02/desc/signup/post.md +++ b/openapi-specs/compute/31-02/desc/signup/post.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i The following cURL command creates the initial admin user with the username `admin` and password `password`. ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -X POST \ -d '{"username": "admin", "password": "password"}' \ diff --git a/openapi-specs/compute/31-02/desc/static/capabilities_get.md b/openapi-specs/compute/31-02/desc/static/capabilities_get.md index ea119d2a9..f9b60278c 100644 --- a/openapi-specs/compute/31-02/desc/static/capabilities_get.md +++ b/openapi-specs/compute/31-02/desc/static/capabilities_get.md @@ -1,7 +1,7 @@ Returns a list of capabilities used in host models. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/static/regions_get.md b/openapi-specs/compute/31-02/desc/static/regions_get.md index 4a07097ee..3b1adb5f1 100644 --- a/openapi-specs/compute/31-02/desc/static/regions_get.md +++ b/openapi-specs/compute/31-02/desc/static/regions_get.md @@ -1,7 +1,7 @@ Returns a list of regions used in cloud radar. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/static/syscalls_get.md b/openapi-specs/compute/31-02/desc/static/syscalls_get.md index 9e2ddcde7..09505ba39 100644 --- a/openapi-specs/compute/31-02/desc/static/syscalls_get.md +++ b/openapi-specs/compute/31-02/desc/static/syscalls_get.md @@ -2,7 +2,7 @@ Returns a list of the Linux kernel system calls. Runtime rules for containers can allow-list and deny-list specific system calls. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/static/vulnerabilities_get.md b/openapi-specs/compute/31-02/desc/static/vulnerabilities_get.md index cb6acab28..19809472b 100644 --- a/openapi-specs/compute/31-02/desc/static/vulnerabilities_get.md +++ b/openapi-specs/compute/31-02/desc/static/vulnerabilities_get.md @@ -3,7 +3,7 @@ This data can be used for building out reports with the API. This data can be correlated with the `/api/v1/images` endpoint, specifically the the `complianceVulnerabilities` and `cveVulnerabilities` objects, to generate more thorough reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/stats/compliance.md b/openapi-specs/compute/31-02/desc/stats/compliance.md index 5c5be3991..4f4c90071 100644 --- a/openapi-specs/compute/31-02/desc/stats/compliance.md +++ b/openapi-specs/compute/31-02/desc/stats/compliance.md @@ -5,7 +5,7 @@ For the current day, the response will also include detailed compliance stats fo The following example command that uses curl and basic auth to retrieve compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/stats/compliance_get.md b/openapi-specs/compute/31-02/desc/stats/compliance_get.md index 314f6a179..2ef2f9f75 100644 --- a/openapi-specs/compute/31-02/desc/stats/compliance_get.md +++ b/openapi-specs/compute/31-02/desc/stats/compliance_get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Compliance > Compliance explorer* Refer to the following example cURL command that retrieves compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/stats/compliance_refresh.md b/openapi-specs/compute/31-02/desc/stats/compliance_refresh.md index b75491a69..d8ce211a8 100644 --- a/openapi-specs/compute/31-02/desc/stats/compliance_refresh.md +++ b/openapi-specs/compute/31-02/desc/stats/compliance_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/compliance endpoint return The following example command that uses curl and basic auth to refresh compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/stats/compliance_refresh_post.md b/openapi-specs/compute/31-02/desc/stats/compliance_refresh_post.md index 541a54d16..0f329d1db 100644 --- a/openapi-specs/compute/31-02/desc/stats/compliance_refresh_post.md +++ b/openapi-specs/compute/31-02/desc/stats/compliance_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/compliance`, b Refer to the following example cURL command that refreshes compliance statistics for the current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/stats/daily.md b/openapi-specs/compute/31-02/desc/stats/daily.md index 082f58a27..9fd4c6138 100644 --- a/openapi-specs/compute/31-02/desc/stats/daily.md +++ b/openapi-specs/compute/31-02/desc/stats/daily.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/stats/daily_get.md b/openapi-specs/compute/31-02/desc/stats/daily_get.md index 0db89bdc3..fe852126c 100644 --- a/openapi-specs/compute/31-02/desc/stats/daily_get.md +++ b/openapi-specs/compute/31-02/desc/stats/daily_get.md @@ -3,7 +3,7 @@ Returns a historical list of per-day statistics for the resources protected by P The following example command uses curl and basic auth to retrieve the daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/stats/dashboard.md b/openapi-specs/compute/31-02/desc/stats/dashboard.md index be90a2d32..1e5fabf08 100644 --- a/openapi-specs/compute/31-02/desc/stats/dashboard.md +++ b/openapi-specs/compute/31-02/desc/stats/dashboard.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/stats/dashboard_get.md b/openapi-specs/compute/31-02/desc/stats/dashboard_get.md index 601769645..8f0bc827c 100644 --- a/openapi-specs/compute/31-02/desc/stats/dashboard_get.md +++ b/openapi-specs/compute/31-02/desc/stats/dashboard_get.md @@ -5,7 +5,7 @@ Returns statistics about the resources protected by Prisma Cloud Compute, includ Refer to the following example cURL command that retrieves dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/stats/events_get.md b/openapi-specs/compute/31-02/desc/stats/events_get.md index 3be5eb4e7..e64f98e57 100644 --- a/openapi-specs/compute/31-02/desc/stats/events_get.md +++ b/openapi-specs/compute/31-02/desc/stats/events_get.md @@ -5,7 +5,7 @@ Returns events statistics for your environment. Refer to the following example cURL command retrieves event stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/stats/vulnerabilities.md b/openapi-specs/compute/31-02/desc/stats/vulnerabilities.md index 40c4dd1f1..199cfab62 100644 --- a/openapi-specs/compute/31-02/desc/stats/vulnerabilities.md +++ b/openapi-specs/compute/31-02/desc/stats/vulnerabilities.md @@ -5,7 +5,7 @@ For the current day, the response will also include descriptions of the CVEs cur The following example command that uses curl and basic auth to retrieve vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/stats/vulnerabilities_download_get.md b/openapi-specs/compute/31-02/desc/stats/vulnerabilities_download_get.md index 753af8c7f..9930a636b 100644 --- a/openapi-specs/compute/31-02/desc/stats/vulnerabilities_download_get.md +++ b/openapi-specs/compute/31-02/desc/stats/vulnerabilities_download_get.md @@ -17,7 +17,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a summary count of the CVEs and detailed descriptions for each CVE in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/stats/vulnerabilities_get.md b/openapi-specs/compute/31-02/desc/stats/vulnerabilities_get.md index 1a6f1c152..aaa5a907b 100644 --- a/openapi-specs/compute/31-02/desc/stats/vulnerabilities_get.md +++ b/openapi-specs/compute/31-02/desc/stats/vulnerabilities_get.md @@ -19,7 +19,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a summary count of the CVEs and detailed descriptions for each CVE: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/stats/vulnerabilities_impacted_resources_download_get.md b/openapi-specs/compute/31-02/desc/stats/vulnerabilities_impacted_resources_download_get.md index 0821d6a9f..502c09a6c 100644 --- a/openapi-specs/compute/31-02/desc/stats/vulnerabilities_impacted_resources_download_get.md +++ b/openapi-specs/compute/31-02/desc/stats/vulnerabilities_impacted_resources_download_get.md @@ -15,7 +15,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a list of impacted resources for `CVE-2015-0313` in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/stats/vulnerabilities_impacted_resources_get.md b/openapi-specs/compute/31-02/desc/stats/vulnerabilities_impacted_resources_get.md index c1e6d0ba2..014a5f4a2 100644 --- a/openapi-specs/compute/31-02/desc/stats/vulnerabilities_impacted_resources_get.md +++ b/openapi-specs/compute/31-02/desc/stats/vulnerabilities_impacted_resources_get.md @@ -18,7 +18,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a list of impacted resources for `CVE-2022-28391`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -95,7 +95,7 @@ Refer to the following example JSON response that shows the risk tree for the im Refer to the following example cURL command that retrieves a the impacted registry images `CVE-2015-0313` by using an optional query parameter `resourceType`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -108,7 +108,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a paginated list of impacted resources for `CVE-2015-0313` by using optional query parameters `limit` and `offset`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/stats/vulnerabilities_refresh.md b/openapi-specs/compute/31-02/desc/stats/vulnerabilities_refresh.md index 505a99d98..2aa7da8a1 100644 --- a/openapi-specs/compute/31-02/desc/stats/vulnerabilities_refresh.md +++ b/openapi-specs/compute/31-02/desc/stats/vulnerabilities_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/vulnerabilities endpoint r The following example command that uses curl and basic auth to refresh vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/stats/vulnerabilities_refresh_post.md b/openapi-specs/compute/31-02/desc/stats/vulnerabilities_refresh_post.md index 1e3210e18..85e3ddd7a 100644 --- a/openapi-specs/compute/31-02/desc/stats/vulnerabilities_refresh_post.md +++ b/openapi-specs/compute/31-02/desc/stats/vulnerabilities_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/vulnerabilitie Refer to the following example cURL command that refreshes the vulnerability statistics for current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/stats/workload_get.md b/openapi-specs/compute/31-02/desc/stats/workload_get.md index a25deed5c..940a835ee 100644 --- a/openapi-specs/compute/31-02/desc/stats/workload_get.md +++ b/openapi-specs/compute/31-02/desc/stats/workload_get.md @@ -1,7 +1,7 @@ Returns the workload statistics from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/statuses/intelligence.md b/openapi-specs/compute/31-02/desc/statuses/intelligence.md index 74da8c7ff..ac102e81f 100644 --- a/openapi-specs/compute/31-02/desc/statuses/intelligence.md +++ b/openapi-specs/compute/31-02/desc/statuses/intelligence.md @@ -3,7 +3,7 @@ Returns the connection status of the intelligence stream and the last intelligen The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/statuses/intelligence_get.md b/openapi-specs/compute/31-02/desc/statuses/intelligence_get.md index c18dd9611..b5f620ad9 100644 --- a/openapi-specs/compute/31-02/desc/statuses/intelligence_get.md +++ b/openapi-specs/compute/31-02/desc/statuses/intelligence_get.md @@ -3,7 +3,7 @@ Returns the connection status for the Intelligence Stream, along with the time o The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/statuses/registry_get.md b/openapi-specs/compute/31-02/desc/statuses/registry_get.md index 427c4915c..e4fd09fe9 100644 --- a/openapi-specs/compute/31-02/desc/statuses/registry_get.md +++ b/openapi-specs/compute/31-02/desc/statuses/registry_get.md @@ -13,7 +13,7 @@ To view the more details about the progress of a regular or on-demand registry s Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/statuses/secrets_get.md b/openapi-specs/compute/31-02/desc/statuses/secrets_get.md index 510f15161..e77c5ed70 100644 --- a/openapi-specs/compute/31-02/desc/statuses/secrets_get.md +++ b/openapi-specs/compute/31-02/desc/statuses/secrets_get.md @@ -3,7 +3,7 @@ Returns the connection status of any secret stores you have configured, as well The following is an example curl using basic auth to find the secret store status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/statuses/serverless-radar_get.md b/openapi-specs/compute/31-02/desc/statuses/serverless-radar_get.md index 3bfdbb5bf..4ab5d0c1d 100644 --- a/openapi-specs/compute/31-02/desc/statuses/serverless-radar_get.md +++ b/openapi-specs/compute/31-02/desc/statuses/serverless-radar_get.md @@ -1,7 +1,7 @@ Returns the status of the serverless scans. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/tags/get.md b/openapi-specs/compute/31-02/desc/tags/get.md index 6da7ad135..604eee98e 100644 --- a/openapi-specs/compute/31-02/desc/tags/get.md +++ b/openapi-specs/compute/31-02/desc/tags/get.md @@ -5,7 +5,7 @@ Retrieves a list of tags. Refer to the following example cURL command that retrieves a list of tags: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/tags/name_delete.md b/openapi-specs/compute/31-02/desc/tags/name_delete.md index 2ed010e57..6dedfce8f 100644 --- a/openapi-specs/compute/31-02/desc/tags/name_delete.md +++ b/openapi-specs/compute/31-02/desc/tags/name_delete.md @@ -5,7 +5,7 @@ Deletes a tag from the system. Refer to the following example cURL command that deletes a tag named *my tag*: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/31-02/desc/tags/name_put.md b/openapi-specs/compute/31-02/desc/tags/name_put.md index cbaea40d3..a5923b8ef 100644 --- a/openapi-specs/compute/31-02/desc/tags/name_put.md +++ b/openapi-specs/compute/31-02/desc/tags/name_put.md @@ -9,7 +9,7 @@ You must define all parameters in your PUT request. Refer to the following example cURL command that updates the parameters in a tag named `my_tag`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/31-02/desc/tags/post.md b/openapi-specs/compute/31-02/desc/tags/post.md index d55ae8b96..8e1a493d6 100644 --- a/openapi-specs/compute/31-02/desc/tags/post.md +++ b/openapi-specs/compute/31-02/desc/tags/post.md @@ -8,7 +8,7 @@ You can use tags as policy exceptions or assign them to vulnerabilities for acti Refer to the following example cURL command that creates a tag named "my-tag": ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/tags/tag_cve_delete.md b/openapi-specs/compute/31-02/desc/tags/tag_cve_delete.md index 8caed79cf..3031029b9 100644 --- a/openapi-specs/compute/31-02/desc/tags/tag_cve_delete.md +++ b/openapi-specs/compute/31-02/desc/tags/tag_cve_delete.md @@ -6,7 +6,7 @@ When you delete a tag, the tag is deleted from a wider scope. All the packages a Refer to the following example cURL command that removes the tag named `ignored` from the CVE `CVE-2017-15088`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/31-02/desc/tags/tag_cve_post.md b/openapi-specs/compute/31-02/desc/tags/tag_cve_post.md index 966a80bd8..1b4ead89b 100644 --- a/openapi-specs/compute/31-02/desc/tags/tag_cve_post.md +++ b/openapi-specs/compute/31-02/desc/tags/tag_cve_post.md @@ -45,7 +45,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the source package `perl`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -72,7 +72,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2021-20305` on the binary package `gnutls`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -98,7 +98,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -120,7 +120,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `image` and to all the packages and resources. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -140,7 +140,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `host`, resource `servo-vmware71`, and to all the packages. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/tas-droplets/download_get.md b/openapi-specs/compute/31-02/desc/tas-droplets/download_get.md index 6372f0b35..f9d82820d 100644 --- a/openapi-specs/compute/31-02/desc/tas-droplets/download_get.md +++ b/openapi-specs/compute/31-02/desc/tas-droplets/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > VMware The following cURL command downloads all TAS droplets to a CSV file called `tas_droplets.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/tas-droplets/get.md b/openapi-specs/compute/31-02/desc/tas-droplets/get.md index dd2b44993..a0a97e8ca 100644 --- a/openapi-specs/compute/31-02/desc/tas-droplets/get.md +++ b/openapi-specs/compute/31-02/desc/tas-droplets/get.md @@ -10,7 +10,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > VMware Tanzu bl The following cURL command retrieves all TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/tas-droplets/get_tas_addresses.md b/openapi-specs/compute/31-02/desc/tas-droplets/get_tas_addresses.md index 91ebb2e50..04c6dccb0 100644 --- a/openapi-specs/compute/31-02/desc/tas-droplets/get_tas_addresses.md +++ b/openapi-specs/compute/31-02/desc/tas-droplets/get_tas_addresses.md @@ -9,7 +9,7 @@ You get an HTTP error response 429 if the limit exceeds. The following cURL command retrieves the Cloud Controller Addresses of scanned TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/tas-droplets/progress_get.md b/openapi-specs/compute/31-02/desc/tas-droplets/progress_get.md index 504a21e84..507d001bf 100644 --- a/openapi-specs/compute/31-02/desc/tas-droplets/progress_get.md +++ b/openapi-specs/compute/31-02/desc/tas-droplets/progress_get.md @@ -5,7 +5,7 @@ Returns the details of the TAS Droplets ongoing scan. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/tas-droplets/scan_post.md b/openapi-specs/compute/31-02/desc/tas-droplets/scan_post.md index aad2174af..13c4eeeb9 100644 --- a/openapi-specs/compute/31-02/desc/tas-droplets/scan_post.md +++ b/openapi-specs/compute/31-02/desc/tas-droplets/scan_post.md @@ -5,7 +5,7 @@ Scans the TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/tas-droplets/stop_post.md b/openapi-specs/compute/31-02/desc/tas-droplets/stop_post.md index 5f5a019b1..53d709ec7 100644 --- a/openapi-specs/compute/31-02/desc/tas-droplets/stop_post.md +++ b/openapi-specs/compute/31-02/desc/tas-droplets/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing scan of TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/trust/data_get.md b/openapi-specs/compute/31-02/desc/trust/data_get.md index dd55d47a3..88983f139 100644 --- a/openapi-specs/compute/31-02/desc/trust/data_get.md +++ b/openapi-specs/compute/31-02/desc/trust/data_get.md @@ -5,7 +5,7 @@ Returns the trusted registries, repositories, and images. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/trust/data_put.md b/openapi-specs/compute/31-02/desc/trust/data_put.md index 0e6a0ba49..733514505 100644 --- a/openapi-specs/compute/31-02/desc/trust/data_put.md +++ b/openapi-specs/compute/31-02/desc/trust/data_put.md @@ -6,7 +6,7 @@ Specify trusted images using either the image name or layers properties. Refer to the following example cURL command that uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -19,7 +19,7 @@ To edit a trust group based on image base layers, use PUT to specify a list of S Refer to the following example that specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/31-02/desc/trust/get.md b/openapi-specs/compute/31-02/desc/trust/get.md index 1226cd0a3..57ff5bdb5 100644 --- a/openapi-specs/compute/31-02/desc/trust/get.md +++ b/openapi-specs/compute/31-02/desc/trust/get.md @@ -3,7 +3,7 @@ Retrieves a list of all trusted images. The following example curl command uses basic auth to retrieve all trusted images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/trust/id_delete.md b/openapi-specs/compute/31-02/desc/trust/id_delete.md index b3114775f..d63cdf71a 100644 --- a/openapi-specs/compute/31-02/desc/trust/id_delete.md +++ b/openapi-specs/compute/31-02/desc/trust/id_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to specify a image trust grou ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/31-02/desc/trust/id_put.md b/openapi-specs/compute/31-02/desc/trust/id_put.md index 44d2c8b8b..c98617bcd 100644 --- a/openapi-specs/compute/31-02/desc/trust/id_put.md +++ b/openapi-specs/compute/31-02/desc/trust/id_put.md @@ -9,7 +9,7 @@ For more information about handles, see the `_id` in the response body for the G The following example curl command uses basic auth to modify the image property for an existing trusted image entry, where the handle for the entry is `docker-ubuntu-group`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/31-02/desc/trust/learn_get.md b/openapi-specs/compute/31-02/desc/trust/learn_get.md index d8a3414d0..004b16b02 100644 --- a/openapi-specs/compute/31-02/desc/trust/learn_get.md +++ b/openapi-specs/compute/31-02/desc/trust/learn_get.md @@ -1,7 +1,7 @@ Returns the state of the trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/trust/learn_post.md b/openapi-specs/compute/31-02/desc/trust/learn_post.md index 094817738..008657fa2 100644 --- a/openapi-specs/compute/31-02/desc/trust/learn_post.md +++ b/openapi-specs/compute/31-02/desc/trust/learn_post.md @@ -1,7 +1,7 @@ Sets the state of trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/trust/post.md b/openapi-specs/compute/31-02/desc/trust/post.md index 1072275a1..23a324c6c 100644 --- a/openapi-specs/compute/31-02/desc/trust/post.md +++ b/openapi-specs/compute/31-02/desc/trust/post.md @@ -7,7 +7,7 @@ For more information about handles, see the `_id` key in the response body for t The following example curl command uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ To create a trust group based on image base layers, POST a list of SHA256 hashes The following example specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/users/get.md b/openapi-specs/compute/31-02/desc/users/get.md index e4e6966ec..cd5a661ba 100644 --- a/openapi-specs/compute/31-02/desc/users/get.md +++ b/openapi-specs/compute/31-02/desc/users/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Manage > Authentication > Users** in the Console UI. The following cURL command retrieves all users. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/users/id_delete.md b/openapi-specs/compute/31-02/desc/users/id_delete.md index 1cfa5642d..66a1102f9 100644 --- a/openapi-specs/compute/31-02/desc/users/id_delete.md +++ b/openapi-specs/compute/31-02/desc/users/id_delete.md @@ -17,7 +17,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes user `ID` from the system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/31-02/desc/util/osx_twistcli_arm64_get.md b/openapi-specs/compute/31-02/desc/util/osx_twistcli_arm64_get.md index b385d0d3b..a30686374 100644 --- a/openapi-specs/compute/31-02/desc/util/osx_twistcli_arm64_get.md +++ b/openapi-specs/compute/31-02/desc/util/osx_twistcli_arm64_get.md @@ -7,7 +7,7 @@ Downloads the twistcli binary executable for MacOS platforms based on ARM64 arch Refer to the following example cURL command that downloads and saves the “twistcli” binary executable for ARM64 bit MacOS platforms to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/compute/31-02/desc/util/osx_twistcli_get.md b/openapi-specs/compute/31-02/desc/util/osx_twistcli_get.md index c49f96c41..2353ea338 100644 --- a/openapi-specs/compute/31-02/desc/util/osx_twistcli_get.md +++ b/openapi-specs/compute/31-02/desc/util/osx_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **MacOS platform** hyperlink in **Manage > System > Ut The following cURL command downloads the twistcli binary executable for MacOS platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli \ diff --git a/openapi-specs/compute/31-02/desc/util/twistcli_arm64_get.md b/openapi-specs/compute/31-02/desc/util/twistcli_arm64_get.md index 7ec36d3f5..a3d7318ab 100644 --- a/openapi-specs/compute/31-02/desc/util/twistcli_arm64_get.md +++ b/openapi-specs/compute/31-02/desc/util/twistcli_arm64_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/compute/31-02/desc/util/twistcli_get.md b/openapi-specs/compute/31-02/desc/util/twistcli_get.md index f9d2d295c..08a3ae8aa 100644 --- a/openapi-specs/compute/31-02/desc/util/twistcli_get.md +++ b/openapi-specs/compute/31-02/desc/util/twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -X GET -o \ 'https:///api/v/util/twistcli' diff --git a/openapi-specs/compute/31-02/desc/util/twistlock_jenkins_plugin_get.md b/openapi-specs/compute/31-02/desc/util/twistlock_jenkins_plugin_get.md index 9fb8d4a02..c9f180e5e 100644 --- a/openapi-specs/compute/31-02/desc/util/twistlock_jenkins_plugin_get.md +++ b/openapi-specs/compute/31-02/desc/util/twistlock_jenkins_plugin_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-jenkins-plugin.hpi \ diff --git a/openapi-specs/compute/31-02/desc/util/twistlock_tas_tile_get.md b/openapi-specs/compute/31-02/desc/util/twistlock_tas_tile_get.md index fea28aaad..3fd114e2d 100644 --- a/openapi-specs/compute/31-02/desc/util/twistlock_tas_tile_get.md +++ b/openapi-specs/compute/31-02/desc/util/twistlock_tas_tile_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-tile.pivotal \ diff --git a/openapi-specs/compute/31-02/desc/util/windows_twistcli_get.md b/openapi-specs/compute/31-02/desc/util/windows_twistcli_get.md index 1c545dbbb..38c609b08 100644 --- a/openapi-specs/compute/31-02/desc/util/windows_twistcli_get.md +++ b/openapi-specs/compute/31-02/desc/util/windows_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Windows platform** hyperlink in **Manage > System > The following cURL command downloads the twistcli binary executable for Windows platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli.exe \ diff --git a/openapi-specs/compute/31-02/desc/version/get.md b/openapi-specs/compute/31-02/desc/version/get.md index 28be315e0..5787e90fd 100644 --- a/openapi-specs/compute/31-02/desc/version/get.md +++ b/openapi-specs/compute/31-02/desc/version/get.md @@ -5,7 +5,7 @@ Retrieves the version number for Console. The following cURL command retrieves the version number for Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/vms/download_get.md b/openapi-specs/compute/31-02/desc/vms/download_get.md index e65e4efc9..3cc813bc5 100644 --- a/openapi-specs/compute/31-02/desc/vms/download_get.md +++ b/openapi-specs/compute/31-02/desc/vms/download_get.md @@ -7,7 +7,7 @@ Returns all VM image scan reports in CSV format. Refer to the following example cURL command that retrieves all VM image scan reports and saves the results in a CSV file called `vm_images_scan.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/vms/get.md b/openapi-specs/compute/31-02/desc/vms/get.md index d44d9d801..ad9938124 100644 --- a/openapi-specs/compute/31-02/desc/vms/get.md +++ b/openapi-specs/compute/31-02/desc/vms/get.md @@ -10,7 +10,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > Hosts > VM imag Refer to the following example cURL command that retrieves all VM image scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/vms/labels_get.md b/openapi-specs/compute/31-02/desc/vms/labels_get.md index ad678b30d..eb2674bf6 100644 --- a/openapi-specs/compute/31-02/desc/vms/labels_get.md +++ b/openapi-specs/compute/31-02/desc/vms/labels_get.md @@ -5,7 +5,7 @@ Returns an array of strings containing all AWS tags of the scanned VM images. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/31-02/desc/vms/names_get.md b/openapi-specs/compute/31-02/desc/vms/names_get.md index 0283ed28e..0b905c37b 100644 --- a/openapi-specs/compute/31-02/desc/vms/names_get.md +++ b/openapi-specs/compute/31-02/desc/vms/names_get.md @@ -6,7 +6,7 @@ Returns an array of strings containing VM image names. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/31-02/desc/vms/scan_post.md b/openapi-specs/compute/31-02/desc/vms/scan_post.md index 1caa2dcaf..4d4de3ab1 100644 --- a/openapi-specs/compute/31-02/desc/vms/scan_post.md +++ b/openapi-specs/compute/31-02/desc/vms/scan_post.md @@ -5,7 +5,7 @@ Re-scans all VM images immediately. This endpoint returns the time that the scan Refer to the following example cURL command that forces Prisma Cloud to re-scan all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/31-02/desc/vms/stop_post.md b/openapi-specs/compute/31-02/desc/vms/stop_post.md index 4a74743eb..49b2b26f9 100644 --- a/openapi-specs/compute/31-02/desc/vms/stop_post.md +++ b/openapi-specs/compute/31-02/desc/vms/stop_post.md @@ -7,7 +7,7 @@ Note: It might take a few minutes for the scan to stop completely. Refer to the following example cURL command that forces Prisma Cloud to stop scanning all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/SCAP/get.md b/openapi-specs/compute/32-03/desc/SCAP/get.md index a25abe94e..f5870d822 100644 --- a/openapi-specs/compute/32-03/desc/SCAP/get.md +++ b/openapi-specs/compute/32-03/desc/SCAP/get.md @@ -3,7 +3,7 @@ This endpoint will return any SCAP datastreams uploaded to the console. This end The following is an example curl command that uses basic auth to retrieve any uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/SCAP/id_delete.md b/openapi-specs/compute/32-03/desc/SCAP/id_delete.md index 39f1b0132..52923f20a 100644 --- a/openapi-specs/compute/32-03/desc/SCAP/id_delete.md +++ b/openapi-specs/compute/32-03/desc/SCAP/id_delete.md @@ -3,7 +3,7 @@ This endpoint will delete any SCAP datastreams uploaded to the console. You can The following is an example curl command that uses basic auth to delete an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-03/desc/SCAP/post.md b/openapi-specs/compute/32-03/desc/SCAP/post.md index d459a0e97..c45fd6b4e 100644 --- a/openapi-specs/compute/32-03/desc/SCAP/post.md +++ b/openapi-specs/compute/32-03/desc/SCAP/post.md @@ -3,7 +3,7 @@ This endpoint will allow you to add a SCAP datastream to the console. The following is an example curl command that uses basic auth to add an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/_ping/get.md b/openapi-specs/compute/32-03/desc/_ping/get.md index 8e143ef67..b7ffdc653 100644 --- a/openapi-specs/compute/32-03/desc/_ping/get.md +++ b/openapi-specs/compute/32-03/desc/_ping/get.md @@ -5,7 +5,7 @@ Checks if Console is reachable from your network host. Refer to the following cURL example command that pings Console and prints the HTTP response code: ```bash -$ curl -k \ +$ curl \ -s \ -o /dev/null \ -w "%{http_code}\n" \ diff --git a/openapi-specs/compute/32-03/desc/agentless/get_agentless_progress.md b/openapi-specs/compute/32-03/desc/agentless/get_agentless_progress.md index b98ed9da5..78396eec6 100644 --- a/openapi-specs/compute/32-03/desc/agentless/get_agentless_progress.md +++ b/openapi-specs/compute/32-03/desc/agentless/get_agentless_progress.md @@ -5,7 +5,7 @@ Shows the progress of an ongoing scan on hosts or containers for vulnerabilities Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/agentless/post_agentless_scan.md b/openapi-specs/compute/32-03/desc/agentless/post_agentless_scan.md index f1295cdc4..e2f8a4e11 100644 --- a/openapi-specs/compute/32-03/desc/agentless/post_agentless_scan.md +++ b/openapi-specs/compute/32-03/desc/agentless/post_agentless_scan.md @@ -9,7 +9,7 @@ Make sure that you download (use the agentless/templates API) and apply the perm Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/agentless/post_agentless_stop.md b/openapi-specs/compute/32-03/desc/agentless/post_agentless_stop.md index ab83960cc..ddee6ec7a 100644 --- a/openapi-specs/compute/32-03/desc/agentless/post_agentless_stop.md +++ b/openapi-specs/compute/32-03/desc/agentless/post_agentless_stop.md @@ -5,7 +5,7 @@ Stops an ongoing scan on hosts or containers for vulnerabilities and compliance. Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/agentless/post_agentless_templates.md b/openapi-specs/compute/32-03/desc/agentless/post_agentless_templates.md index 96be32555..5159c439a 100644 --- a/openapi-specs/compute/32-03/desc/agentless/post_agentless_templates.md +++ b/openapi-specs/compute/32-03/desc/agentless/post_agentless_templates.md @@ -31,7 +31,7 @@ Add the supported cloud accounts (AWS, Azure, GCP, and OCI) in Prisma Cloud Comp Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/alert-profiles/get.md b/openapi-specs/compute/32-03/desc/alert-profiles/get.md index 82647e248..f17191ac4 100644 --- a/openapi-specs/compute/32-03/desc/alert-profiles/get.md +++ b/openapi-specs/compute/32-03/desc/alert-profiles/get.md @@ -3,7 +3,7 @@ Retrieve a list of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/alert-profiles/id_delete.md b/openapi-specs/compute/32-03/desc/alert-profiles/id_delete.md index 1a67fe20e..2cf21b57e 100644 --- a/openapi-specs/compute/32-03/desc/alert-profiles/id_delete.md +++ b/openapi-specs/compute/32-03/desc/alert-profiles/id_delete.md @@ -5,7 +5,7 @@ This method has no response data. The following example curl command deletes an existing alert profile named `PROFILE-NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-03/desc/alert-profiles/names_get.md b/openapi-specs/compute/32-03/desc/alert-profiles/names_get.md index cac14437b..38a1f78ca 100644 --- a/openapi-specs/compute/32-03/desc/alert-profiles/names_get.md +++ b/openapi-specs/compute/32-03/desc/alert-profiles/names_get.md @@ -3,7 +3,7 @@ Retrieve a list of only the names of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles' names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/alert-profiles/post.md b/openapi-specs/compute/32-03/desc/alert-profiles/post.md index 9fa643429..19db863d5 100644 --- a/openapi-specs/compute/32-03/desc/alert-profiles/post.md +++ b/openapi-specs/compute/32-03/desc/alert-profiles/post.md @@ -3,7 +3,7 @@ Update an existing alert profile created in the system. The following example curl command uses basic auth to add a Jira Alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/alert-profiles/test_post.md b/openapi-specs/compute/32-03/desc/alert-profiles/test_post.md index 1fc745efa..2205a6e73 100644 --- a/openapi-specs/compute/32-03/desc/alert-profiles/test_post.md +++ b/openapi-specs/compute/32-03/desc/alert-profiles/test_post.md @@ -3,7 +3,7 @@ Sends a test alert to verify successful configuration of the alert profile setti The following example curl command uses basic auth to send test alert for an email alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/audits/access_delete.md b/openapi-specs/compute/32-03/desc/audits/access_delete.md index 37f33ca64..0450b534c 100644 --- a/openapi-specs/compute/32-03/desc/audits/access_delete.md +++ b/openapi-specs/compute/32-03/desc/audits/access_delete.md @@ -2,7 +2,7 @@ Deletes **all** access audits. This deletion cannot be undone. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-03/desc/audits/access_download_get.md b/openapi-specs/compute/32-03/desc/audits/access_download_get.md index 1700deb8d..8d8fee259 100644 --- a/openapi-specs/compute/32-03/desc/audits/access_download_get.md +++ b/openapi-specs/compute/32-03/desc/audits/access_download_get.md @@ -3,7 +3,7 @@ Returns the docker access audit events data in CSV format that are logged and ag **Note**: You can download the access events from Console under **Monitor > Events > Docker audits > Download CSV**. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/access_filters_get.md b/openapi-specs/compute/32-03/desc/audits/access_filters_get.md index 00ac061c1..4b8e9cd9b 100644 --- a/openapi-specs/compute/32-03/desc/audits/access_filters_get.md +++ b/openapi-specs/compute/32-03/desc/audits/access_filters_get.md @@ -5,7 +5,7 @@ The following example uses basic auth to list history of commands that are run o ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ The following command gives list of sudo events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -27,7 +27,7 @@ $ curl -k \ The following command gives list of SSHD events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/access_get.md b/openapi-specs/compute/32-03/desc/audits/access_get.md index 2401391c7..56e53fe12 100644 --- a/openapi-specs/compute/32-03/desc/audits/access_get.md +++ b/openapi-specs/compute/32-03/desc/audits/access_get.md @@ -8,7 +8,7 @@ You can configure Prisma Cloud Compute to log and aggregate events such as sudo Refer to the following example cURL command that gives a list of all access audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/admission_download_get.md b/openapi-specs/compute/32-03/desc/audits/admission_download_get.md index 9571c483f..d45f47c4e 100644 --- a/openapi-specs/compute/32-03/desc/audits/admission_download_get.md +++ b/openapi-specs/compute/32-03/desc/audits/admission_download_get.md @@ -4,7 +4,7 @@ Returns the access admission events data in CSV format that were alerted or bloc Refer to the following example cURL command that downloads the admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/admission_get.md b/openapi-specs/compute/32-03/desc/audits/admission_get.md index 84414496c..3640c737c 100644 --- a/openapi-specs/compute/32-03/desc/audits/admission_get.md +++ b/openapi-specs/compute/32-03/desc/audits/admission_get.md @@ -4,7 +4,7 @@ Returns all activities that were alerted or blocked by Defender functioning as O Refer to the following example cURL command that gives a list of all admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/firewall_network_container_download_get.md b/openapi-specs/compute/32-03/desc/audits/firewall_network_container_download_get.md index 29029ac6d..434e09acd 100644 --- a/openapi-specs/compute/32-03/desc/audits/firewall_network_container_download_get.md +++ b/openapi-specs/compute/32-03/desc/audits/firewall_network_container_download_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/firewall_network_container_get.md b/openapi-specs/compute/32-03/desc/audits/firewall_network_container_get.md index 454558a44..be03b2c45 100644 --- a/openapi-specs/compute/32-03/desc/audits/firewall_network_container_get.md +++ b/openapi-specs/compute/32-03/desc/audits/firewall_network_container_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/firewall_network_host_download_get.md b/openapi-specs/compute/32-03/desc/audits/firewall_network_host_download_get.md index 768dd00d7..e83e8e1c3 100644 --- a/openapi-specs/compute/32-03/desc/audits/firewall_network_host_download_get.md +++ b/openapi-specs/compute/32-03/desc/audits/firewall_network_host_download_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/firewall_network_host_get.md b/openapi-specs/compute/32-03/desc/audits/firewall_network_host_get.md index e5dc4c399..6cbda0d4b 100644 --- a/openapi-specs/compute/32-03/desc/audits/firewall_network_host_get.md +++ b/openapi-specs/compute/32-03/desc/audits/firewall_network_host_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/incidents_archive_patch.md b/openapi-specs/compute/32-03/desc/audits/incidents_archive_patch.md index a1127a001..d1f42eedd 100644 --- a/openapi-specs/compute/32-03/desc/audits/incidents_archive_patch.md +++ b/openapi-specs/compute/32-03/desc/audits/incidents_archive_patch.md @@ -7,7 +7,7 @@ You can get an incident ID from the list of incidents using the endpoint GET /ap Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/compute/32-03/desc/audits/incidents_download_get.md b/openapi-specs/compute/32-03/desc/audits/incidents_download_get.md index 2266c3471..5958756bf 100644 --- a/openapi-specs/compute/32-03/desc/audits/incidents_download_get.md +++ b/openapi-specs/compute/32-03/desc/audits/incidents_download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the **CSV** hyperlink in **Monitor > Runtime > Incident ex The following cURL command downloads all incidents and saves the result in a CSV file called `incidents.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/incidents_filters_get.md b/openapi-specs/compute/32-03/desc/audits/incidents_filters_get.md index 7d1c6f303..856881c90 100644 --- a/openapi-specs/compute/32-03/desc/audits/incidents_filters_get.md +++ b/openapi-specs/compute/32-03/desc/audits/incidents_filters_get.md @@ -3,7 +3,7 @@ This endpoint lists the incident categories found in your environment. The following example lists incident filters. ```bash -$ curl -k \ +$ curl \ -u \ https://console:8083/api/v1/audits/incidents/filters ``` diff --git a/openapi-specs/compute/32-03/desc/audits/incidents_get.md b/openapi-specs/compute/32-03/desc/audits/incidents_get.md index 7724a08c1..9b9451821 100644 --- a/openapi-specs/compute/32-03/desc/audits/incidents_get.md +++ b/openapi-specs/compute/32-03/desc/audits/incidents_get.md @@ -9,7 +9,7 @@ This endpoint maps to the table in **Monitor > Runtime > Incident explorer** in Refer to the following example cURL command that retrieves a list of unacknowledged incidents (not in the archived state): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/kubernetes_download_get.md b/openapi-specs/compute/32-03/desc/audits/kubernetes_download_get.md index 6008bd92a..62992095c 100644 --- a/openapi-specs/compute/32-03/desc/audits/kubernetes_download_get.md +++ b/openapi-specs/compute/32-03/desc/audits/kubernetes_download_get.md @@ -7,7 +7,7 @@ Returns the audit events data that occur in an integrated Kubernetes cluster tha Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/kubernetes_get.md b/openapi-specs/compute/32-03/desc/audits/kubernetes_get.md index e1ecb8a88..2e3f51b71 100644 --- a/openapi-specs/compute/32-03/desc/audits/kubernetes_get.md +++ b/openapi-specs/compute/32-03/desc/audits/kubernetes_get.md @@ -7,7 +7,7 @@ Retrieves events that occur in an integrated Kubernetes cluster that you configu Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/mgmt_download_get.md b/openapi-specs/compute/32-03/desc/audits/mgmt_download_get.md index ae3ef45b6..bcee17342 100644 --- a/openapi-specs/compute/32-03/desc/audits/mgmt_download_get.md +++ b/openapi-specs/compute/32-03/desc/audits/mgmt_download_get.md @@ -10,7 +10,7 @@ Management audits are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/mgmt_filters_get.md b/openapi-specs/compute/32-03/desc/audits/mgmt_filters_get.md index 854977b99..f910a4c2a 100644 --- a/openapi-specs/compute/32-03/desc/audits/mgmt_filters_get.md +++ b/openapi-specs/compute/32-03/desc/audits/mgmt_filters_get.md @@ -6,7 +6,7 @@ Use these filters to query management audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/mgmt_get.md b/openapi-specs/compute/32-03/desc/audits/mgmt_get.md index 5b586cb5e..abe802348 100644 --- a/openapi-specs/compute/32-03/desc/audits/mgmt_get.md +++ b/openapi-specs/compute/32-03/desc/audits/mgmt_get.md @@ -10,7 +10,7 @@ Management audit events are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/runtime_app_embedded_download_get.md b/openapi-specs/compute/32-03/desc/audits/runtime_app_embedded_download_get.md index f3d844ead..ec5ae0f2a 100644 --- a/openapi-specs/compute/32-03/desc/audits/runtime_app_embedded_download_get.md +++ b/openapi-specs/compute/32-03/desc/audits/runtime_app_embedded_download_get.md @@ -5,7 +5,7 @@ Returns the app-embedded runtime audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/runtime_app_embedded_get.md b/openapi-specs/compute/32-03/desc/audits/runtime_app_embedded_get.md index c1d72acfa..51a43b7f5 100644 --- a/openapi-specs/compute/32-03/desc/audits/runtime_app_embedded_get.md +++ b/openapi-specs/compute/32-03/desc/audits/runtime_app_embedded_get.md @@ -5,7 +5,7 @@ Retrieves all app-embedded runtime audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/runtime_container_delete.md b/openapi-specs/compute/32-03/desc/audits/runtime_container_delete.md index ddc8e82d6..62050c71f 100644 --- a/openapi-specs/compute/32-03/desc/audits/runtime_container_delete.md +++ b/openapi-specs/compute/32-03/desc/audits/runtime_container_delete.md @@ -3,7 +3,7 @@ Deletes all container runtime audits. The following example curl command uses basic auth to delete all the audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-03/desc/audits/runtime_container_download_get.md b/openapi-specs/compute/32-03/desc/audits/runtime_container_download_get.md index 20e673b5e..81286d929 100644 --- a/openapi-specs/compute/32-03/desc/audits/runtime_container_download_get.md +++ b/openapi-specs/compute/32-03/desc/audits/runtime_container_download_get.md @@ -6,7 +6,7 @@ Returns the container audit events data in CSV format when a runtime sensor such Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o \ diff --git a/openapi-specs/compute/32-03/desc/audits/runtime_container_get.md b/openapi-specs/compute/32-03/desc/audits/runtime_container_get.md index 11beffb24..a6b6ba484 100644 --- a/openapi-specs/compute/32-03/desc/audits/runtime_container_get.md +++ b/openapi-specs/compute/32-03/desc/audits/runtime_container_get.md @@ -7,7 +7,7 @@ Retrieves all container audit events when a runtime sensor such as process, netw Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/runtime_container_timeslice_get.md b/openapi-specs/compute/32-03/desc/audits/runtime_container_timeslice_get.md index f65d477af..01df48f28 100644 --- a/openapi-specs/compute/32-03/desc/audits/runtime_container_timeslice_get.md +++ b/openapi-specs/compute/32-03/desc/audits/runtime_container_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/runtime_file-integrity_download_get.md b/openapi-specs/compute/32-03/desc/audits/runtime_file-integrity_download_get.md index 99ec70c52..234c3ce32 100644 --- a/openapi-specs/compute/32-03/desc/audits/runtime_file-integrity_download_get.md +++ b/openapi-specs/compute/32-03/desc/audits/runtime_file-integrity_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for file-integrity checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/runtime_file-integrity_get.md b/openapi-specs/compute/32-03/desc/audits/runtime_file-integrity_get.md index 53fec9f9f..c31904422 100644 --- a/openapi-specs/compute/32-03/desc/audits/runtime_file-integrity_get.md +++ b/openapi-specs/compute/32-03/desc/audits/runtime_file-integrity_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for file-integrity checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/runtime_host_delete.md b/openapi-specs/compute/32-03/desc/audits/runtime_host_delete.md index 0ab1c877e..2ada9b15a 100644 --- a/openapi-specs/compute/32-03/desc/audits/runtime_host_delete.md +++ b/openapi-specs/compute/32-03/desc/audits/runtime_host_delete.md @@ -3,7 +3,7 @@ Deletes all host audits from the database. The following example curl command uses basic auth to delete all host audits: ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/audits/runtime/host diff --git a/openapi-specs/compute/32-03/desc/audits/runtime_host_download_get.md b/openapi-specs/compute/32-03/desc/audits/runtime_host_download_get.md index 4d0454f56..d85cc39d0 100644 --- a/openapi-specs/compute/32-03/desc/audits/runtime_host_download_get.md +++ b/openapi-specs/compute/32-03/desc/audits/runtime_host_download_get.md @@ -5,7 +5,7 @@ Returns the runtime host audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/runtime_host_get.md b/openapi-specs/compute/32-03/desc/audits/runtime_host_get.md index 044b8b42d..e063550d6 100644 --- a/openapi-specs/compute/32-03/desc/audits/runtime_host_get.md +++ b/openapi-specs/compute/32-03/desc/audits/runtime_host_get.md @@ -5,7 +5,7 @@ Retrieves the runtime host audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/runtime_host_timeslice_get.md b/openapi-specs/compute/32-03/desc/audits/runtime_host_timeslice_get.md index 8933efa74..aafd869b8 100644 --- a/openapi-specs/compute/32-03/desc/audits/runtime_host_timeslice_get.md +++ b/openapi-specs/compute/32-03/desc/audits/runtime_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/runtime_log-inspection_download_get.md b/openapi-specs/compute/32-03/desc/audits/runtime_log-inspection_download_get.md index f047ed96f..0aa1a5710 100644 --- a/openapi-specs/compute/32-03/desc/audits/runtime_log-inspection_download_get.md +++ b/openapi-specs/compute/32-03/desc/audits/runtime_log-inspection_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for log inspection checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/runtime_log-inspection_get.md b/openapi-specs/compute/32-03/desc/audits/runtime_log-inspection_get.md index 49f0d7be4..8292b623e 100644 --- a/openapi-specs/compute/32-03/desc/audits/runtime_log-inspection_get.md +++ b/openapi-specs/compute/32-03/desc/audits/runtime_log-inspection_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for log inspection checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/runtime_rasp_delete.md b/openapi-specs/compute/32-03/desc/audits/runtime_rasp_delete.md index 688e04038..14315c55b 100644 --- a/openapi-specs/compute/32-03/desc/audits/runtime_rasp_delete.md +++ b/openapi-specs/compute/32-03/desc/audits/runtime_rasp_delete.md @@ -1,7 +1,7 @@ Deletes all RASP Defender runtime audits. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-03/desc/audits/runtime_rasp_download_get.md b/openapi-specs/compute/32-03/desc/audits/runtime_rasp_download_get.md index 303c75858..11a85100d 100644 --- a/openapi-specs/compute/32-03/desc/audits/runtime_rasp_download_get.md +++ b/openapi-specs/compute/32-03/desc/audits/runtime_rasp_download_get.md @@ -1,7 +1,7 @@ Returns CSV data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/runtime_rasp_get.md b/openapi-specs/compute/32-03/desc/audits/runtime_rasp_get.md index 229d908b1..0475cb149 100644 --- a/openapi-specs/compute/32-03/desc/audits/runtime_rasp_get.md +++ b/openapi-specs/compute/32-03/desc/audits/runtime_rasp_get.md @@ -1,7 +1,7 @@ Returns JSON data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/runtime_serverless_delete.md b/openapi-specs/compute/32-03/desc/audits/runtime_serverless_delete.md index 99ada0515..e27ebe858 100644 --- a/openapi-specs/compute/32-03/desc/audits/runtime_serverless_delete.md +++ b/openapi-specs/compute/32-03/desc/audits/runtime_serverless_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to delete the current audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-03/desc/audits/runtime_serverless_download_get.md b/openapi-specs/compute/32-03/desc/audits/runtime_serverless_download_get.md index f829d2342..91693c145 100644 --- a/openapi-specs/compute/32-03/desc/audits/runtime_serverless_download_get.md +++ b/openapi-specs/compute/32-03/desc/audits/runtime_serverless_download_get.md @@ -5,7 +5,7 @@ Returns the scan audit events data in CSV format for any configured serverless f Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/runtime_serverless_filters_get.md b/openapi-specs/compute/32-03/desc/audits/runtime_serverless_filters_get.md index b9bf38610..babda78dd 100644 --- a/openapi-specs/compute/32-03/desc/audits/runtime_serverless_filters_get.md +++ b/openapi-specs/compute/32-03/desc/audits/runtime_serverless_filters_get.md @@ -2,7 +2,7 @@ Returns all serverless filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/runtime_serverless_get.md b/openapi-specs/compute/32-03/desc/audits/runtime_serverless_get.md index 045946886..f6aeb748e 100644 --- a/openapi-specs/compute/32-03/desc/audits/runtime_serverless_get.md +++ b/openapi-specs/compute/32-03/desc/audits/runtime_serverless_get.md @@ -5,7 +5,7 @@ Retrieves all scan events for any configured serverless functions in Prisma Clou Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/runtime_serverless_timeslice_get.md b/openapi-specs/compute/32-03/desc/audits/runtime_serverless_timeslice_get.md index 863890174..a2456cec0 100644 --- a/openapi-specs/compute/32-03/desc/audits/runtime_serverless_timeslice_get.md +++ b/openapi-specs/compute/32-03/desc/audits/runtime_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/trust_delete.md b/openapi-specs/compute/32-03/desc/audits/trust_delete.md index 0bfb2bd81..4aaeef3fe 100644 --- a/openapi-specs/compute/32-03/desc/audits/trust_delete.md +++ b/openapi-specs/compute/32-03/desc/audits/trust_delete.md @@ -1,7 +1,7 @@ Deletes all the trust audits from the events page in Console. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-03/desc/audits/trust_download_get.md b/openapi-specs/compute/32-03/desc/audits/trust_download_get.md index 21c0e55a2..234089449 100644 --- a/openapi-specs/compute/32-03/desc/audits/trust_download_get.md +++ b/openapi-specs/compute/32-03/desc/audits/trust_download_get.md @@ -5,7 +5,7 @@ Returns the trust audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/trust_get.md b/openapi-specs/compute/32-03/desc/audits/trust_get.md index 8fb3a341d..de7d47e96 100644 --- a/openapi-specs/compute/32-03/desc/audits/trust_get.md +++ b/openapi-specs/compute/32-03/desc/audits/trust_get.md @@ -4,7 +4,7 @@ Retrieves all the trust audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/waas_agentless_download_get.md b/openapi-specs/compute/32-03/desc/audits/waas_agentless_download_get.md index bbfcd12f5..f930ef6b3 100644 --- a/openapi-specs/compute/32-03/desc/audits/waas_agentless_download_get.md +++ b/openapi-specs/compute/32-03/desc/audits/waas_agentless_download_get.md @@ -7,7 +7,7 @@ Returns the agentless Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/waas_agentless_get.md b/openapi-specs/compute/32-03/desc/audits/waas_agentless_get.md index ad40ae497..b257b0385 100644 --- a/openapi-specs/compute/32-03/desc/audits/waas_agentless_get.md +++ b/openapi-specs/compute/32-03/desc/audits/waas_agentless_get.md @@ -7,7 +7,7 @@ Retrieves all agentless Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/waas_agentless_timeslice_get.md b/openapi-specs/compute/32-03/desc/audits/waas_agentless_timeslice_get.md index 007c6dba3..3eaf34b25 100644 --- a/openapi-specs/compute/32-03/desc/audits/waas_agentless_timeslice_get.md +++ b/openapi-specs/compute/32-03/desc/audits/waas_agentless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/waas_app_embedded_download_get.md b/openapi-specs/compute/32-03/desc/audits/waas_app_embedded_download_get.md index 149c10376..c94aa87b0 100644 --- a/openapi-specs/compute/32-03/desc/audits/waas_app_embedded_download_get.md +++ b/openapi-specs/compute/32-03/desc/audits/waas_app_embedded_download_get.md @@ -6,7 +6,7 @@ Returns the app-embedded WAAS audit events data in CSV format for the specified Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/waas_app_embedded_get.md b/openapi-specs/compute/32-03/desc/audits/waas_app_embedded_get.md index 400fa447d..6318fb299 100644 --- a/openapi-specs/compute/32-03/desc/audits/waas_app_embedded_get.md +++ b/openapi-specs/compute/32-03/desc/audits/waas_app_embedded_get.md @@ -6,7 +6,7 @@ Returns all app-embedded WAAS audit events for the specified query parameters. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/waas_app_embedded_timeslice_get.md b/openapi-specs/compute/32-03/desc/audits/waas_app_embedded_timeslice_get.md index 79a60038e..42a76d08c 100644 --- a/openapi-specs/compute/32-03/desc/audits/waas_app_embedded_timeslice_get.md +++ b/openapi-specs/compute/32-03/desc/audits/waas_app_embedded_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the app-embedded WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/waas_container_download_get.md b/openapi-specs/compute/32-03/desc/audits/waas_container_download_get.md index 9a5e04fad..7d26c34f4 100644 --- a/openapi-specs/compute/32-03/desc/audits/waas_container_download_get.md +++ b/openapi-specs/compute/32-03/desc/audits/waas_container_download_get.md @@ -6,7 +6,7 @@ Returns the container Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that downloads the WAAS container audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/waas_container_get.md b/openapi-specs/compute/32-03/desc/audits/waas_container_get.md index ac0df80fd..c1ad08f3c 100644 --- a/openapi-specs/compute/32-03/desc/audits/waas_container_get.md +++ b/openapi-specs/compute/32-03/desc/audits/waas_container_get.md @@ -6,7 +6,7 @@ Retrieves all container Web-Application and API Security (WAAS) audits. Refer to the following example cURL command that retrieves all container WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/waas_container_timeslice_get.md b/openapi-specs/compute/32-03/desc/audits/waas_container_timeslice_get.md index a56b4c48f..be56260d6 100644 --- a/openapi-specs/compute/32-03/desc/audits/waas_container_timeslice_get.md +++ b/openapi-specs/compute/32-03/desc/audits/waas_container_timeslice_get.md @@ -11,7 +11,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the container WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s):: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/waas_host_download_get.md b/openapi-specs/compute/32-03/desc/audits/waas_host_download_get.md index 4bc66202b..71692e682 100644 --- a/openapi-specs/compute/32-03/desc/audits/waas_host_download_get.md +++ b/openapi-specs/compute/32-03/desc/audits/waas_host_download_get.md @@ -7,7 +7,7 @@ Returns the host Web-Application and API Security (WAAS) audit events data in CS Refer to the following example cURL command that downloads the host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/waas_host_get.md b/openapi-specs/compute/32-03/desc/audits/waas_host_get.md index 14c967594..f6e3df050 100644 --- a/openapi-specs/compute/32-03/desc/audits/waas_host_get.md +++ b/openapi-specs/compute/32-03/desc/audits/waas_host_get.md @@ -7,7 +7,7 @@ Retrieves all host Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/waas_host_timeslice_get.md b/openapi-specs/compute/32-03/desc/audits/waas_host_timeslice_get.md index e28ed7b7a..67b3a54c3 100644 --- a/openapi-specs/compute/32-03/desc/audits/waas_host_timeslice_get.md +++ b/openapi-specs/compute/32-03/desc/audits/waas_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves host WAAS audit events for a specific time frame: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/waas_serverless_download_get.md b/openapi-specs/compute/32-03/desc/audits/waas_serverless_download_get.md index da05504df..0c0dbe698 100644 --- a/openapi-specs/compute/32-03/desc/audits/waas_serverless_download_get.md +++ b/openapi-specs/compute/32-03/desc/audits/waas_serverless_download_get.md @@ -7,7 +7,7 @@ Returns the serverless function Web-Application and API Security (WAAS) audit ev Refer to the following example cURL command that downloads the serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/waas_serverless_get.md b/openapi-specs/compute/32-03/desc/audits/waas_serverless_get.md index fe482a3f3..82488f7ee 100644 --- a/openapi-specs/compute/32-03/desc/audits/waas_serverless_get.md +++ b/openapi-specs/compute/32-03/desc/audits/waas_serverless_get.md @@ -7,7 +7,7 @@ Retrieves all serverless function Web-Application and API Security (WAAS) audit Refer to the following example cURL command that retrieves all serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/audits/waas_serverless_timeslice_get.md b/openapi-specs/compute/32-03/desc/audits/waas_serverless_timeslice_get.md index ec9ff3df1..a0a9a1368 100644 --- a/openapi-specs/compute/32-03/desc/audits/waas_serverless_timeslice_get.md +++ b/openapi-specs/compute/32-03/desc/audits/waas_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the serverless WAAS audit events for a : ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/authenticate-client/post.md b/openapi-specs/compute/32-03/desc/authenticate-client/post.md index bc493d04e..ce6f00afe 100644 --- a/openapi-specs/compute/32-03/desc/authenticate-client/post.md +++ b/openapi-specs/compute/32-03/desc/authenticate-client/post.md @@ -8,7 +8,7 @@ This endpoint checks the supplied client certificate and authorizes the user bas Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X POST \ --cert \ https:///api/v/authenticate-client diff --git a/openapi-specs/compute/32-03/desc/authenticate/post.md b/openapi-specs/compute/32-03/desc/authenticate/post.md index cb018de64..4f85c5d34 100644 --- a/openapi-specs/compute/32-03/desc/authenticate/post.md +++ b/openapi-specs/compute/32-03/desc/authenticate/post.md @@ -9,7 +9,7 @@ You can set the validity period in Console under **Manage > Authentication > Log Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H "Content-Type: application/json" \ -X POST \ -d \ diff --git a/openapi-specs/compute/32-03/desc/authenticate/renew_get.md b/openapi-specs/compute/32-03/desc/authenticate/renew_get.md index 6040d58e1..3458b500a 100644 --- a/openapi-specs/compute/32-03/desc/authenticate/renew_get.md +++ b/openapi-specs/compute/32-03/desc/authenticate/renew_get.md @@ -5,7 +5,7 @@ Renews an old (unexpired) access token and returns a new token. The following cURL command retrieves a new access token using an old access token. ```bash -$ curl -k \ +$ curl \ -H "Authorization: Bearer " \ https:///api/v1/authenticate/renew ``` diff --git a/openapi-specs/compute/32-03/desc/certs/capem_get.md b/openapi-specs/compute/32-03/desc/certs/capem_get.md index f0f0f1bf3..945476c9b 100644 --- a/openapi-specs/compute/32-03/desc/certs/capem_get.md +++ b/openapi-specs/compute/32-03/desc/certs/capem_get.md @@ -5,7 +5,7 @@ Retrieves the Base64-encoded SSL root certificate self-signed by primary certifi Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/certs/client-certs_get.md b/openapi-specs/compute/32-03/desc/certs/client-certs_get.md index d099b3e3d..279d196b1 100644 --- a/openapi-specs/compute/32-03/desc/certs/client-certs_get.md +++ b/openapi-specs/compute/32-03/desc/certs/client-certs_get.md @@ -3,7 +3,7 @@ Downloads a script that installs a client certificate, client private key, and c The following example curl command uses basic auth to download and run the install script for your client certs: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/certs/client-certs.sh | sh diff --git a/openapi-specs/compute/32-03/desc/certs/server-certs_get.md b/openapi-specs/compute/32-03/desc/certs/server-certs_get.md index 0bb13f51d..118a4d9b0 100644 --- a/openapi-specs/compute/32-03/desc/certs/server-certs_get.md +++ b/openapi-specs/compute/32-03/desc/certs/server-certs_get.md @@ -12,7 +12,7 @@ Retrieves the server certificate bundle from Prisma Cloud Compute that contains Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -u \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/cloud/compliance_download_get.md b/openapi-specs/compute/32-03/desc/cloud/compliance_download_get.md index 7b1ec9fea..14f2725b1 100644 --- a/openapi-specs/compute/32-03/desc/cloud/compliance_download_get.md +++ b/openapi-specs/compute/32-03/desc/cloud/compliance_download_get.md @@ -2,7 +2,7 @@ Download all cloud scan data in CSV format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/cloud/compliance_get.md b/openapi-specs/compute/32-03/desc/cloud/compliance_get.md index 48c2fe5bb..ad47e0998 100644 --- a/openapi-specs/compute/32-03/desc/cloud/compliance_get.md +++ b/openapi-specs/compute/32-03/desc/cloud/compliance_get.md @@ -2,7 +2,7 @@ Returns a list of all cloud compliance scan results. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/cloud/compliance_scan_post.md b/openapi-specs/compute/32-03/desc/cloud/compliance_scan_post.md index 7f87bf1f4..7321c3b9d 100644 --- a/openapi-specs/compute/32-03/desc/cloud/compliance_scan_post.md +++ b/openapi-specs/compute/32-03/desc/cloud/compliance_scan_post.md @@ -2,7 +2,7 @@ Initiates a new cloud compliance scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/cloud/compliance_stop_post.md b/openapi-specs/compute/32-03/desc/cloud/compliance_stop_post.md index df0febb56..60c31dc51 100644 --- a/openapi-specs/compute/32-03/desc/cloud/compliance_stop_post.md +++ b/openapi-specs/compute/32-03/desc/cloud/compliance_stop_post.md @@ -2,7 +2,7 @@ Terminates a cloud compliance scan that's in progress.. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/cloud/discovery_download_get.md b/openapi-specs/compute/32-03/desc/cloud/discovery_download_get.md index 44d60a113..a667c8471 100644 --- a/openapi-specs/compute/32-03/desc/cloud/discovery_download_get.md +++ b/openapi-specs/compute/32-03/desc/cloud/discovery_download_get.md @@ -5,7 +5,7 @@ Downloads all cloud scan data in a CSV file. Refer to the following cURL example command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/cloud/discovery_entities_get.md b/openapi-specs/compute/32-03/desc/cloud/discovery_entities_get.md index a7abbdfb6..85f1be971 100644 --- a/openapi-specs/compute/32-03/desc/cloud/discovery_entities_get.md +++ b/openapi-specs/compute/32-03/desc/cloud/discovery_entities_get.md @@ -7,7 +7,7 @@ Use this API endpoint along with the `GET, api/vVERSION/cloud/discovery` to get Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/cloud/discovery_get.md b/openapi-specs/compute/32-03/desc/cloud/discovery_get.md index 28025f140..c2b4c6e3c 100644 --- a/openapi-specs/compute/32-03/desc/cloud/discovery_get.md +++ b/openapi-specs/compute/32-03/desc/cloud/discovery_get.md @@ -8,7 +8,7 @@ Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/cloud/discovery_scan_post.md b/openapi-specs/compute/32-03/desc/cloud/discovery_scan_post.md index 51799ebdb..0717096f8 100644 --- a/openapi-specs/compute/32-03/desc/cloud/discovery_scan_post.md +++ b/openapi-specs/compute/32-03/desc/cloud/discovery_scan_post.md @@ -5,7 +5,7 @@ Initiates a new cloud discovery scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/cloud/discovery_stop_post.md b/openapi-specs/compute/32-03/desc/cloud/discovery_stop_post.md index 6a6c7a5a5..73dbf46e7 100644 --- a/openapi-specs/compute/32-03/desc/cloud/discovery_stop_post.md +++ b/openapi-specs/compute/32-03/desc/cloud/discovery_stop_post.md @@ -5,7 +5,7 @@ Terminates a cloud discovery scan that's in progress. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/cloud/discovery_vms_get.md b/openapi-specs/compute/32-03/desc/cloud/discovery_vms_get.md index 6766f4e5a..2264a27fe 100644 --- a/openapi-specs/compute/32-03/desc/cloud/discovery_vms_get.md +++ b/openapi-specs/compute/32-03/desc/cloud/discovery_vms_get.md @@ -5,7 +5,7 @@ Returns the discovered cloud VM instances. Refer to the following example cURL command that retrieves all the discovered cloud VM instances: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/coderepos/download_get.md b/openapi-specs/compute/32-03/desc/coderepos/download_get.md index 4ec0197bb..b06dd9f17 100644 --- a/openapi-specs/compute/32-03/desc/coderepos/download_get.md +++ b/openapi-specs/compute/32-03/desc/coderepos/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Code re The following cURL command generates a CSV file containing the reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/coderepos/get.md b/openapi-specs/compute/32-03/desc/coderepos/get.md index 54c4e99bf..42dc16fb6 100644 --- a/openapi-specs/compute/32-03/desc/coderepos/get.md +++ b/openapi-specs/compute/32-03/desc/coderepos/get.md @@ -10,7 +10,7 @@ This endpoint maps to the **Code repositories** table in **Monitor > Vulnerabili The following cURL command retrieves all code repository scan reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/collections/get.md b/openapi-specs/compute/32-03/desc/collections/get.md index 99120d17d..5a9e8a50c 100755 --- a/openapi-specs/compute/32-03/desc/collections/get.md +++ b/openapi-specs/compute/32-03/desc/collections/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table in **Manage > Collections and Tags > Collections Refer to the following example cURL command that returns a list of collections: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/collections/name_delete.md b/openapi-specs/compute/32-03/desc/collections/name_delete.md index 3e2debd01..033358000 100755 --- a/openapi-specs/compute/32-03/desc/collections/name_delete.md +++ b/openapi-specs/compute/32-03/desc/collections/name_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that deletes a collection with the name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-03/desc/collections/name_usages_get.md b/openapi-specs/compute/32-03/desc/collections/name_usages_get.md index 5c9c40424..89e383cce 100755 --- a/openapi-specs/compute/32-03/desc/collections/name_usages_get.md +++ b/openapi-specs/compute/32-03/desc/collections/name_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that retrieves all policies with name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/containers/count_get.md b/openapi-specs/compute/32-03/desc/containers/count_get.md index 4c6ecdcb4..aca59a913 100644 --- a/openapi-specs/compute/32-03/desc/containers/count_get.md +++ b/openapi-specs/compute/32-03/desc/containers/count_get.md @@ -5,7 +5,7 @@ Returns an integer representing the number of containers in your environment. Refer to the following example cURL command that returns the number of containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/containers/download_get.md b/openapi-specs/compute/32-03/desc/containers/download_get.md index 8f581aabe..d76a8de25 100644 --- a/openapi-specs/compute/32-03/desc/containers/download_get.md +++ b/openapi-specs/compute/32-03/desc/containers/download_get.md @@ -9,7 +9,7 @@ You can download the container scan reports in CSV format in Console under **Mon Refer to the following example cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/containers/filters_get.md b/openapi-specs/compute/32-03/desc/containers/filters_get.md index c8a1dfca4..6c2777819 100644 --- a/openapi-specs/compute/32-03/desc/containers/filters_get.md +++ b/openapi-specs/compute/32-03/desc/containers/filters_get.md @@ -1,7 +1,7 @@ Returns all container filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/containers/get.md b/openapi-specs/compute/32-03/desc/containers/get.md index 4cacdde60..3de9dd4af 100644 --- a/openapi-specs/compute/32-03/desc/containers/get.md +++ b/openapi-specs/compute/32-03/desc/containers/get.md @@ -16,7 +16,7 @@ Refer to the following available options for the `fields` query parameters: Refer to the following example cURL command that retrieves a scan report for all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -26,7 +26,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a scan report for a container with the collection ``: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/containers/labels_get.md b/openapi-specs/compute/32-03/desc/containers/labels_get.md index eb40a748d..7a63ab6fb 100644 --- a/openapi-specs/compute/32-03/desc/containers/labels_get.md +++ b/openapi-specs/compute/32-03/desc/containers/labels_get.md @@ -1,7 +1,7 @@ Returns an array of strings containing all of the labels. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/containers/names_get.md b/openapi-specs/compute/32-03/desc/containers/names_get.md index 8b32465d5..9025e2e10 100644 --- a/openapi-specs/compute/32-03/desc/containers/names_get.md +++ b/openapi-specs/compute/32-03/desc/containers/names_get.md @@ -5,7 +5,7 @@ Returns an array of strings containing all container names. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/containers/scan_post.md b/openapi-specs/compute/32-03/desc/containers/scan_post.md index 6b2bdaaba..56137cf64 100644 --- a/openapi-specs/compute/32-03/desc/containers/scan_post.md +++ b/openapi-specs/compute/32-03/desc/containers/scan_post.md @@ -4,7 +4,7 @@ This endpoint returns the time that the scans were initiated. The following example command uses curl and basic auth to force Prisma Cloud Compute to re-scan all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/credentials/get.md b/openapi-specs/compute/32-03/desc/credentials/get.md index ee4309dee..b807ce8f3 100644 --- a/openapi-specs/compute/32-03/desc/credentials/get.md +++ b/openapi-specs/compute/32-03/desc/credentials/get.md @@ -6,7 +6,7 @@ This endpoint maps to **Manage > Authentication > Credentials store** in the Con Refer to the following example cURL command that retrieves all credentials: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/credentials/id_delete.md b/openapi-specs/compute/32-03/desc/credentials/id_delete.md index e5c70259e..27f090158 100644 --- a/openapi-specs/compute/32-03/desc/credentials/id_delete.md +++ b/openapi-specs/compute/32-03/desc/credentials/id_delete.md @@ -14,7 +14,7 @@ To invoke this endpoint in the Prisma Cloud Compute user interface: Refer to the following example cURL command that deletes an existing credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-03/desc/credentials/id_usages_get.md b/openapi-specs/compute/32-03/desc/credentials/id_usages_get.md index 76c1099aa..ca2ce6216 100644 --- a/openapi-specs/compute/32-03/desc/credentials/id_usages_get.md +++ b/openapi-specs/compute/32-03/desc/credentials/id_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following cURL command that retrieves all usages for a credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/curl_examples.md b/openapi-specs/compute/32-03/desc/curl_examples.md index 3d4fcd468..745d21db3 100644 --- a/openapi-specs/compute/32-03/desc/curl_examples.md +++ b/openapi-specs/compute/32-03/desc/curl_examples.md @@ -6,7 +6,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -17,7 +17,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -29,7 +29,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/compute/32-03/desc/custom-compliance/get.md b/openapi-specs/compute/32-03/desc/custom-compliance/get.md index 9022a87b7..9dddcff4e 100644 --- a/openapi-specs/compute/32-03/desc/custom-compliance/get.md +++ b/openapi-specs/compute/32-03/desc/custom-compliance/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example curl command that gets the list of custom compliance checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/custom-compliance/id_delete.md b/openapi-specs/compute/32-03/desc/custom-compliance/id_delete.md index 72c7183ee..f6536e51d 100644 --- a/openapi-specs/compute/32-03/desc/custom-compliance/id_delete.md +++ b/openapi-specs/compute/32-03/desc/custom-compliance/id_delete.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example cURL command that uses basic auth to delete the compliance check with id 9000: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-03/desc/custom-compliance/put.md b/openapi-specs/compute/32-03/desc/custom-compliance/put.md index 480e41b54..b8760a11f 100644 --- a/openapi-specs/compute/32-03/desc/custom-compliance/put.md +++ b/openapi-specs/compute/32-03/desc/custom-compliance/put.md @@ -21,7 +21,7 @@ Create `custom_check.json` file (example): Refer to the following example curl command that uses basic auth to update the checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-03/desc/custom-rules/get.md b/openapi-specs/compute/32-03/desc/custom-rules/get.md index f0385f81a..f77924be8 100644 --- a/openapi-specs/compute/32-03/desc/custom-rules/get.md +++ b/openapi-specs/compute/32-03/desc/custom-rules/get.md @@ -7,7 +7,7 @@ This endpoint maps to the policy table in **Defend > Custom rules** in the Conso Refer to the following example cURL command that retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/custom-rules/id_delete.md b/openapi-specs/compute/32-03/desc/custom-rules/id_delete.md index c0d6dc8b0..01412abf3 100644 --- a/openapi-specs/compute/32-03/desc/custom-rules/id_delete.md +++ b/openapi-specs/compute/32-03/desc/custom-rules/id_delete.md @@ -5,7 +5,7 @@ Deletes a custom rule. Refer to the following example cURL command that deletes a custom rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-03/desc/cves/distribution_get.md b/openapi-specs/compute/32-03/desc/cves/distribution_get.md index aecddce23..7365e1a5e 100644 --- a/openapi-specs/compute/32-03/desc/cves/distribution_get.md +++ b/openapi-specs/compute/32-03/desc/cves/distribution_get.md @@ -3,7 +3,7 @@ Retrieves CVEs from the vulnerability database grouped into distribution where y The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/cves/get.md b/openapi-specs/compute/32-03/desc/cves/get.md index 469ea4b28..f81223298 100644 --- a/openapi-specs/compute/32-03/desc/cves/get.md +++ b/openapi-specs/compute/32-03/desc/cves/get.md @@ -6,7 +6,7 @@ A null response indicates that the CVE is not in our database. The following example curl command queries the Prisma Cloud Compute database for `CVE-2018-1102`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/defenders/app_embedded_post.md b/openapi-specs/compute/32-03/desc/defenders/app_embedded_post.md index 9167469d0..7999cbadb 100644 --- a/openapi-specs/compute/32-03/desc/defenders/app_embedded_post.md +++ b/openapi-specs/compute/32-03/desc/defenders/app_embedded_post.md @@ -5,7 +5,7 @@ Creates an augmented Dockerfile with Defender and dependencies included as a ZIP Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/defenders/daemonset_yaml_get.md b/openapi-specs/compute/32-03/desc/defenders/daemonset_yaml_get.md index 678901a8a..b68869081 100644 --- a/openapi-specs/compute/32-03/desc/defenders/daemonset_yaml_get.md +++ b/openapi-specs/compute/32-03/desc/defenders/daemonset_yaml_get.md @@ -10,7 +10,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https://:8083/api/v1/defenders/daemonset.yaml?consoleaddr=&listener=none&namespace=twistlock&orchestration=kubernetes' diff --git a/openapi-specs/compute/32-03/desc/defenders/daemonset_yaml_post.md b/openapi-specs/compute/32-03/desc/defenders/daemonset_yaml_post.md index 8dcf30639..91abe241f 100644 --- a/openapi-specs/compute/32-03/desc/defenders/daemonset_yaml_post.md +++ b/openapi-specs/compute/32-03/desc/defenders/daemonset_yaml_post.md @@ -5,7 +5,7 @@ Creates a DaemonSet deployment file in YAML format that you can use to deploy De Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/defenders/download_get.md b/openapi-specs/compute/32-03/desc/defenders/download_get.md index 2d9435506..67f08c0e5 100644 --- a/openapi-specs/compute/32-03/desc/defenders/download_get.md +++ b/openapi-specs/compute/32-03/desc/defenders/download_get.md @@ -8,7 +8,7 @@ Use the query parameters to filter what data is returned. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o \ diff --git a/openapi-specs/compute/32-03/desc/defenders/fargate_json_post.md b/openapi-specs/compute/32-03/desc/defenders/fargate_json_post.md index 5128e90a1..e2e4e85ab 100644 --- a/openapi-specs/compute/32-03/desc/defenders/fargate_json_post.md +++ b/openapi-specs/compute/32-03/desc/defenders/fargate_json_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command: Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -23,7 +23,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/defenders/fargate_yaml_post.md b/openapi-specs/compute/32-03/desc/defenders/fargate_yaml_post.md index 9a8306a1b..95560526a 100644 --- a/openapi-specs/compute/32-03/desc/defenders/fargate_yaml_post.md +++ b/openapi-specs/compute/32-03/desc/defenders/fargate_yaml_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.yaml` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/yaml' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/defenders/get.md b/openapi-specs/compute/32-03/desc/defenders/get.md index 471e7ef9d..8d2f5cd4c 100644 --- a/openapi-specs/compute/32-03/desc/defenders/get.md +++ b/openapi-specs/compute/32-03/desc/defenders/get.md @@ -7,7 +7,7 @@ This endpoint maps to the UI Console page in **Manage > Defenders > Defenders**. Refer to the following example cURL command that retrieves all deployed Defenders. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/defenders/helm_get.md b/openapi-specs/compute/32-03/desc/defenders/helm_get.md index b11f9c4b9..487c8b7e8 100644 --- a/openapi-specs/compute/32-03/desc/defenders/helm_get.md +++ b/openapi-specs/compute/32-03/desc/defenders/helm_get.md @@ -13,7 +13,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o twistlock-defender-helm.tar.gz \ diff --git a/openapi-specs/compute/32-03/desc/defenders/helm_post.md b/openapi-specs/compute/32-03/desc/defenders/helm_post.md index 2046e63eb..fb76807ae 100644 --- a/openapi-specs/compute/32-03/desc/defenders/helm_post.md +++ b/openapi-specs/compute/32-03/desc/defenders/helm_post.md @@ -5,7 +5,7 @@ Creates a Helm deployment file that you can use to deploy Defenders to your clus Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/defenders/id_delete.md b/openapi-specs/compute/32-03/desc/defenders/id_delete.md index f637ef850..e3ac52daf 100644 --- a/openapi-specs/compute/32-03/desc/defenders/id_delete.md +++ b/openapi-specs/compute/32-03/desc/defenders/id_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes an existing Defender on a host. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-03/desc/defenders/id_features_post.md b/openapi-specs/compute/32-03/desc/defenders/id_features_post.md index ec8e4c5f3..9b42f5fa0 100644 --- a/openapi-specs/compute/32-03/desc/defenders/id_features_post.md +++ b/openapi-specs/compute/32-03/desc/defenders/id_features_post.md @@ -3,7 +3,7 @@ Updates a deployed Defender's configuration. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/defenders/id_restart_post.md b/openapi-specs/compute/32-03/desc/defenders/id_restart_post.md index da0cc7811..7296a186b 100644 --- a/openapi-specs/compute/32-03/desc/defenders/id_restart_post.md +++ b/openapi-specs/compute/32-03/desc/defenders/id_restart_post.md @@ -3,7 +3,7 @@ Restarts Defender on a given host. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/defenders/id_upgrade_post.md b/openapi-specs/compute/32-03/desc/defenders/id_upgrade_post.md index f0d30d1e9..3e63c6414 100644 --- a/openapi-specs/compute/32-03/desc/defenders/id_upgrade_post.md +++ b/openapi-specs/compute/32-03/desc/defenders/id_upgrade_post.md @@ -7,7 +7,7 @@ Upgrades Defender on ``. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/defenders/image-name_get.md b/openapi-specs/compute/32-03/desc/defenders/image-name_get.md index e81ba3e19..19f360c07 100644 --- a/openapi-specs/compute/32-03/desc/defenders/image-name_get.md +++ b/openapi-specs/compute/32-03/desc/defenders/image-name_get.md @@ -5,7 +5,7 @@ Returns the full Docker image name for Defender. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/defenders/install-bundle_get.md b/openapi-specs/compute/32-03/desc/defenders/install-bundle_get.md index 882d0cd53..9b09e733f 100644 --- a/openapi-specs/compute/32-03/desc/defenders/install-bundle_get.md +++ b/openapi-specs/compute/32-03/desc/defenders/install-bundle_get.md @@ -5,7 +5,7 @@ Returns the certificate bundle that Defender needs to securely connect to Consol Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/defenders/names_get.md b/openapi-specs/compute/32-03/desc/defenders/names_get.md index 728eb6364..6339c1483 100644 --- a/openapi-specs/compute/32-03/desc/defenders/names_get.md +++ b/openapi-specs/compute/32-03/desc/defenders/names_get.md @@ -5,7 +5,7 @@ Retrieves a list of Defender hostnames that can be used as the `{id}` query para Refer to the following example cURL command that retrieves a list of all Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -15,7 +15,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of connected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -25,7 +25,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of disconnected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -37,7 +37,7 @@ The endpoint enlists all the connected and disconnected Defenders if do not spec Refer to the following example cURL command that retrieves a list of Defenders by type: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/defenders/rasp_post.md b/openapi-specs/compute/32-03/desc/defenders/rasp_post.md index 526a9e112..e110044dd 100644 --- a/openapi-specs/compute/32-03/desc/defenders/rasp_post.md +++ b/openapi-specs/compute/32-03/desc/defenders/rasp_post.md @@ -7,7 +7,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o rasp-defender.zip diff --git a/openapi-specs/compute/32-03/desc/defenders/serverless-bundle_post.md b/openapi-specs/compute/32-03/desc/defenders/serverless-bundle_post.md index df4f13e6a..7533e436b 100644 --- a/openapi-specs/compute/32-03/desc/defenders/serverless-bundle_post.md +++ b/openapi-specs/compute/32-03/desc/defenders/serverless-bundle_post.md @@ -5,7 +5,7 @@ Downloads a ZIP file with serverless Defender bundle. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/octet-stream' \ -o serverless_bundle.zip \ diff --git a/openapi-specs/compute/32-03/desc/defenders/summary_get.md b/openapi-specs/compute/32-03/desc/defenders/summary_get.md index 08be4ebc4..e308ef64b 100644 --- a/openapi-specs/compute/32-03/desc/defenders/summary_get.md +++ b/openapi-specs/compute/32-03/desc/defenders/summary_get.md @@ -6,7 +6,7 @@ Lists the number of Defenders in each defender category. Refer to the following example cURL command that retrieves a summary of Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/defenders/upgrade_post.md b/openapi-specs/compute/32-03/desc/defenders/upgrade_post.md index 2f0b4d39e..eacd6b779 100644 --- a/openapi-specs/compute/32-03/desc/defenders/upgrade_post.md +++ b/openapi-specs/compute/32-03/desc/defenders/upgrade_post.md @@ -9,7 +9,7 @@ To upgrade Serverless and Fargate Defenders, re-embed them. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/deployment/daemonsets_deploy_post.md b/openapi-specs/compute/32-03/desc/deployment/daemonsets_deploy_post.md index 94ec9386b..b60f28346 100644 --- a/openapi-specs/compute/32-03/desc/deployment/daemonsets_deploy_post.md +++ b/openapi-specs/compute/32-03/desc/deployment/daemonsets_deploy_post.md @@ -5,7 +5,7 @@ It identifies the cluster's API server, user, and credentials. Use the various request parameters to control the properties of the deployed DaemonSet. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/deployment/daemonsets_get.md b/openapi-specs/compute/32-03/desc/deployment/daemonsets_get.md index a0b7f3798..0385acf75 100644 --- a/openapi-specs/compute/32-03/desc/deployment/daemonsets_get.md +++ b/openapi-specs/compute/32-03/desc/deployment/daemonsets_get.md @@ -3,7 +3,7 @@ You must specify a `credentialID`, of type `kubeconfig`, which identifies your c Credentials are managed in Console's credentials store (`/api/v1/credentials`). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/feeds/custom_vuln_get.md b/openapi-specs/compute/32-03/desc/feeds/custom_vuln_get.md index 71834f19d..d661acf55 100644 --- a/openapi-specs/compute/32-03/desc/feeds/custom_vuln_get.md +++ b/openapi-specs/compute/32-03/desc/feeds/custom_vuln_get.md @@ -11,7 +11,7 @@ Vulnerability rules can be created using the Prisma Cloud Compute. Refer to the following cURL command that retrieves a list of all the custom vulnerabilities and associated rules. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/feeds/custom_vuln_put.md b/openapi-specs/compute/32-03/desc/feeds/custom_vuln_put.md index 4fe1c1898..149ada978 100644 --- a/openapi-specs/compute/32-03/desc/feeds/custom_vuln_put.md +++ b/openapi-specs/compute/32-03/desc/feeds/custom_vuln_put.md @@ -5,7 +5,7 @@ Updates all the custom vulnerabilities and associated rules simultaneously for h Refer to the following cURL command that updates a vulnerability for a library named `internal-lib`, and specifies that its versions `1.1` to `1.8` are known to be vulnerable. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -37,7 +37,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: **Note:** You will need `jq` to execute this command. ``` - $ curl -k \ + $ curl \ -u \ https:///api/v/feeds/custom/custom-vulnerabilities \ | jq '.' > custom_vulnerability_rules.json @@ -66,7 +66,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 3. Update the rules by pushing the new JSON payload. **Note:** Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -77,7 +77,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 4. Run the cURL command for the `GET /api/vVERSION/feeds/custom/custom-vulnerabilities` endpoint and you can see that the previously installed rules are now overwritten with your new rules. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/feeds/custom_vulnerabilities_digest_get.md b/openapi-specs/compute/32-03/desc/feeds/custom_vulnerabilities_digest_get.md index 0eb501d9b..02af9a3ab 100644 --- a/openapi-specs/compute/32-03/desc/feeds/custom_vulnerabilities_digest_get.md +++ b/openapi-specs/compute/32-03/desc/feeds/custom_vulnerabilities_digest_get.md @@ -5,7 +5,7 @@ Returns the unique digest for the custom vulnerabilities and associated rules fo The following cURL command retrieves the digest for the configured custom vulnerabilities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/feeds/cve_allow_list_digest_get.md b/openapi-specs/compute/32-03/desc/feeds/cve_allow_list_digest_get.md index e27f21251..911a07fd9 100644 --- a/openapi-specs/compute/32-03/desc/feeds/cve_allow_list_digest_get.md +++ b/openapi-specs/compute/32-03/desc/feeds/cve_allow_list_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the Common Vulnerabilities and Exposures (CVE) a The following cURL command retrieves the digest for the configured CVE allow list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/feeds/cve_allow_list_get.md b/openapi-specs/compute/32-03/desc/feeds/cve_allow_list_get.md index 34fb2c7f8..d73ce17c2 100644 --- a/openapi-specs/compute/32-03/desc/feeds/cve_allow_list_get.md +++ b/openapi-specs/compute/32-03/desc/feeds/cve_allow_list_get.md @@ -5,7 +5,7 @@ Retrieves the globally allow-listed Common Vulnerabilities and Exposures (CVE). The following cURL command retrieves the globally allow-listed CVEs. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/feeds/cve_allow_list_put.md b/openapi-specs/compute/32-03/desc/feeds/cve_allow_list_put.md index 850016965..c4e2ce0af 100644 --- a/openapi-specs/compute/32-03/desc/feeds/cve_allow_list_put.md +++ b/openapi-specs/compute/32-03/desc/feeds/cve_allow_list_put.md @@ -7,7 +7,7 @@ Globally allow-lists a set of Common Vulnerabilities and Exposures (CVE). The following cURL command installs a global CVE allow-list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-03/desc/feeds/ips_digest_get.md b/openapi-specs/compute/32-03/desc/feeds/ips_digest_get.md index d059271ea..ae2a09915 100644 --- a/openapi-specs/compute/32-03/desc/feeds/ips_digest_get.md +++ b/openapi-specs/compute/32-03/desc/feeds/ips_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the list of suspicious or high risk IP endpoints The following cURL command retrieves the digest for the banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/feeds/ips_get.md b/openapi-specs/compute/32-03/desc/feeds/ips_get.md index 381257d47..f51c577a7 100644 --- a/openapi-specs/compute/32-03/desc/feeds/ips_get.md +++ b/openapi-specs/compute/32-03/desc/feeds/ips_get.md @@ -5,7 +5,7 @@ Retrieves the customized list of block-listed suspicious or high-risk IP address The following cURL command retrieves the list of globally block-listed suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/feeds/ips_put.md b/openapi-specs/compute/32-03/desc/feeds/ips_put.md index 6f8fc2419..5bf791044 100644 --- a/openapi-specs/compute/32-03/desc/feeds/ips_put.md +++ b/openapi-specs/compute/32-03/desc/feeds/ips_put.md @@ -7,7 +7,7 @@ Bans a custom list of suspicious or high-risk IP addresses. The following cURL command installs a custom list of banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-03/desc/feeds/malware_digest_get.md b/openapi-specs/compute/32-03/desc/feeds/malware_digest_get.md index 005c476a2..522a59aef 100644 --- a/openapi-specs/compute/32-03/desc/feeds/malware_digest_get.md +++ b/openapi-specs/compute/32-03/desc/feeds/malware_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for all the MD5 signatures of malicious executables The following cURL command retrieves the digest for the configured list for the MD5 signatures of malicious executables. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/feeds/malware_get.md b/openapi-specs/compute/32-03/desc/feeds/malware_get.md index 2a7aa128b..72bee6594 100644 --- a/openapi-specs/compute/32-03/desc/feeds/malware_get.md +++ b/openapi-specs/compute/32-03/desc/feeds/malware_get.md @@ -5,7 +5,7 @@ Returns the customized list of MD5 signatures of malicious executables. Refer to the following cURL command that retrieves the list of MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/feeds/malware_put.md b/openapi-specs/compute/32-03/desc/feeds/malware_put.md index 7e6ec5da0..176304cb9 100644 --- a/openapi-specs/compute/32-03/desc/feeds/malware_put.md +++ b/openapi-specs/compute/32-03/desc/feeds/malware_put.md @@ -7,7 +7,7 @@ Creates a custom list of malware MD5 signatures of malicious executables. Refer to the following cURL command that installs a custom list of malware MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-03/desc/feeds/refresh_post.md b/openapi-specs/compute/32-03/desc/feeds/refresh_post.md index a83c40d10..1c756edae 100644 --- a/openapi-specs/compute/32-03/desc/feeds/refresh_post.md +++ b/openapi-specs/compute/32-03/desc/feeds/refresh_post.md @@ -1,7 +1,7 @@ Triggers Console to refresh its data from the **Intelligence Stream** ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/forensic/activities_download_get.md b/openapi-specs/compute/32-03/desc/forensic/activities_download_get.md index 8a2dbd926..1918e3790 100644 --- a/openapi-specs/compute/32-03/desc/forensic/activities_download_get.md +++ b/openapi-specs/compute/32-03/desc/forensic/activities_download_get.md @@ -3,7 +3,7 @@ Downloads all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/forensic/activities_get.md b/openapi-specs/compute/32-03/desc/forensic/activities_get.md index c8fb1d0cd..c0761aa60 100644 --- a/openapi-specs/compute/32-03/desc/forensic/activities_get.md +++ b/openapi-specs/compute/32-03/desc/forensic/activities_get.md @@ -3,7 +3,7 @@ Retrieves all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/groups/get.md b/openapi-specs/compute/32-03/desc/groups/get.md index 6a0daa2eb..34a2711e0 100644 --- a/openapi-specs/compute/32-03/desc/groups/get.md +++ b/openapi-specs/compute/32-03/desc/groups/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups. ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-03/desc/groups/id_delete.md b/openapi-specs/compute/32-03/desc/groups/id_delete.md index 5962a1135..0c3cfa1cd 100644 --- a/openapi-specs/compute/32-03/desc/groups/id_delete.md +++ b/openapi-specs/compute/32-03/desc/groups/id_delete.md @@ -13,7 +13,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes a collection with the name `{id}`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-03/desc/groups/names.md b/openapi-specs/compute/32-03/desc/groups/names.md index 80f34f536..9c2dd1089 100644 --- a/openapi-specs/compute/32-03/desc/groups/names.md +++ b/openapi-specs/compute/32-03/desc/groups/names.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-03/desc/groups/post.md b/openapi-specs/compute/32-03/desc/groups/post.md index d0fc23a6d..ebad011f4 100644 --- a/openapi-specs/compute/32-03/desc/groups/post.md +++ b/openapi-specs/compute/32-03/desc/groups/post.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that creates a new group named `my-group`: ```bash -$ curl -k \ +$ curl \ -X POST \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-03/desc/high-availability/get.md b/openapi-specs/compute/32-03/desc/high-availability/get.md index a988d47ef..83d5d9b46 100644 --- a/openapi-specs/compute/32-03/desc/high-availability/get.md +++ b/openapi-specs/compute/32-03/desc/high-availability/get.md @@ -3,7 +3,7 @@ Returns the status of high high availability. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-03/desc/hosts/download_get.md b/openapi-specs/compute/32-03/desc/hosts/download_get.md index ab691fb49..34e546573 100644 --- a/openapi-specs/compute/32-03/desc/hosts/download_get.md +++ b/openapi-specs/compute/32-03/desc/hosts/download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Hosts > Refer to the following example cURL command that downloads all host scan reports to a CSV file called `hosts_report.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o hosts_report.csv \ diff --git a/openapi-specs/compute/32-03/desc/hosts/filters_get.md b/openapi-specs/compute/32-03/desc/hosts/filters_get.md index 4bf6df5e6..a39ec8a97 100644 --- a/openapi-specs/compute/32-03/desc/hosts/filters_get.md +++ b/openapi-specs/compute/32-03/desc/hosts/filters_get.md @@ -3,7 +3,7 @@ Returns host filters such as distribution and host name. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/hosts/get.md b/openapi-specs/compute/32-03/desc/hosts/get.md index d125c9d7b..26df89cef 100644 --- a/openapi-specs/compute/32-03/desc/hosts/get.md +++ b/openapi-specs/compute/32-03/desc/hosts/get.md @@ -35,7 +35,7 @@ Refer to the following available options for the `fields` query parameters: Refer to the following cURL command that retrieves all host scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/hosts/info_get.md b/openapi-specs/compute/32-03/desc/hosts/info_get.md index be456b46b..b71c6be2f 100644 --- a/openapi-specs/compute/32-03/desc/hosts/info_get.md +++ b/openapi-specs/compute/32-03/desc/hosts/info_get.md @@ -3,7 +3,7 @@ Returns minimal information that includes hostname, distro, distro-release, coll A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/hosts/scan_post.md b/openapi-specs/compute/32-03/desc/hosts/scan_post.md index 6b72cbfa3..0e0e7b074 100644 --- a/openapi-specs/compute/32-03/desc/hosts/scan_post.md +++ b/openapi-specs/compute/32-03/desc/hosts/scan_post.md @@ -3,7 +3,7 @@ Re-scan all hosts immediately. Refer to the following example command that forces Prisma Cloud Compute to re-scan all hosts: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/hosts/scan diff --git a/openapi-specs/compute/32-03/desc/images/defender_layer_get.md b/openapi-specs/compute/32-03/desc/images/defender_layer_get.md index 1dfe3633d..4bb88d62c 100644 --- a/openapi-specs/compute/32-03/desc/images/defender_layer_get.md +++ b/openapi-specs/compute/32-03/desc/images/defender_layer_get.md @@ -5,7 +5,7 @@ Returns the the Prisma Cloud Compute Defender in as a layer that can be used in Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/compute/32-03/desc/images/defender_rasp_get.md b/openapi-specs/compute/32-03/desc/images/defender_rasp_get.md index a8e145ff7..260e271a1 100644 --- a/openapi-specs/compute/32-03/desc/images/defender_rasp_get.md +++ b/openapi-specs/compute/32-03/desc/images/defender_rasp_get.md @@ -3,7 +3,7 @@ Returns the the Prisma Cloud Compute Defender as the RASP Defender A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/compute/32-03/desc/images/download_get.md b/openapi-specs/compute/32-03/desc/images/download_get.md index 713114955..fcae06e3d 100644 --- a/openapi-specs/compute/32-03/desc/images/download_get.md +++ b/openapi-specs/compute/32-03/desc/images/download_get.md @@ -15,7 +15,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -26,7 +26,7 @@ $ curl -k \ Refer to the following example cURL command that might be useful for developers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/images/get.md b/openapi-specs/compute/32-03/desc/images/get.md index 6c82341b6..bb636e101 100644 --- a/openapi-specs/compute/32-03/desc/images/get.md +++ b/openapi-specs/compute/32-03/desc/images/get.md @@ -19,7 +19,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that retrieves a compact scan report for all images: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -29,7 +29,7 @@ $ curl -k \ Refer to the following cURL command that retrieves a compact scan report for an Ubuntu image: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -40,7 +40,7 @@ The name query is synonymous with the filter images text field in the Console UI Refer to the following cURL command that retrieves the scan report for an image with the matching SHA-256 hash: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/images/names_get.md b/openapi-specs/compute/32-03/desc/images/names_get.md index 3db6f5429..ad5fd25dc 100644 --- a/openapi-specs/compute/32-03/desc/images/names_get.md +++ b/openapi-specs/compute/32-03/desc/images/names_get.md @@ -5,7 +5,7 @@ Returns an array of strings containing image names. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-03/desc/images/scan_post.md b/openapi-specs/compute/32-03/desc/images/scan_post.md index 8d802727a..36278249b 100644 --- a/openapi-specs/compute/32-03/desc/images/scan_post.md +++ b/openapi-specs/compute/32-03/desc/images/scan_post.md @@ -5,7 +5,7 @@ Re-scan all images immediately. This endpoint returns the time that the scans we Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all images: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/images/scan diff --git a/openapi-specs/compute/32-03/desc/images/twistlock_defender_tar_gz_get.md b/openapi-specs/compute/32-03/desc/images/twistlock_defender_tar_gz_get.md index 7852e12ba..36fb66ae8 100644 --- a/openapi-specs/compute/32-03/desc/images/twistlock_defender_tar_gz_get.md +++ b/openapi-specs/compute/32-03/desc/images/twistlock_defender_tar_gz_get.md @@ -1,7 +1,7 @@ Download the Container Defender image for Linux platforms. ```bash -$ curl -k \ +$ curl \ -u \ -H "Content-Type: application/octet-stream" \ -o twistlock_defender.tar.gz \ diff --git a/openapi-specs/compute/32-03/desc/intro.md b/openapi-specs/compute/32-03/desc/intro.md index 9038a3734..5b4ed5864 100644 --- a/openapi-specs/compute/32-03/desc/intro.md +++ b/openapi-specs/compute/32-03/desc/intro.md @@ -47,7 +47,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -58,7 +58,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -70,7 +70,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/compute/32-03/desc/kubernetes/scan_post.md b/openapi-specs/compute/32-03/desc/kubernetes/scan_post.md index 15d614c1a..ab74d5d96 100644 --- a/openapi-specs/compute/32-03/desc/kubernetes/scan_post.md +++ b/openapi-specs/compute/32-03/desc/kubernetes/scan_post.md @@ -3,7 +3,7 @@ This endpoint will trigger a Kubernetes scan. The following example curl command uses basic auth to initiate this scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/logs/console_get.md b/openapi-specs/compute/32-03/desc/logs/console_get.md index 80ece6611..113543540 100644 --- a/openapi-specs/compute/32-03/desc/logs/console_get.md +++ b/openapi-specs/compute/32-03/desc/logs/console_get.md @@ -3,7 +3,7 @@ Retrieves the latest Console log messages. The following example curl command retrieves the 10 latest Console log messages: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/logs/defender_download_get.md b/openapi-specs/compute/32-03/desc/logs/defender_download_get.md index 5d6718db0..05bbc6a75 100644 --- a/openapi-specs/compute/32-03/desc/logs/defender_download_get.md +++ b/openapi-specs/compute/32-03/desc/logs/defender_download_get.md @@ -5,7 +5,7 @@ The hostname can be returned from the endpoint `/defenders/names` The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/logs/defender_get.md b/openapi-specs/compute/32-03/desc/logs/defender_get.md index 1e733a746..f2e3b25df 100644 --- a/openapi-specs/compute/32-03/desc/logs/defender_get.md +++ b/openapi-specs/compute/32-03/desc/logs/defender_get.md @@ -7,7 +7,7 @@ Note that you must quote the URL when running the following command. Otherwise the shell misinterprets the ampersand (`&`) as the end of the command, and puts the curl command in the background. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/logs/system_download_get.md b/openapi-specs/compute/32-03/desc/logs/system_download_get.md index 1e5b5b873..43bb0abce 100644 --- a/openapi-specs/compute/32-03/desc/logs/system_download_get.md +++ b/openapi-specs/compute/32-03/desc/logs/system_download_get.md @@ -4,7 +4,7 @@ This endpoint will return the system debug logs with `tar.gz` file extension. The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/pcf-droplets/addresses_get.md b/openapi-specs/compute/32-03/desc/pcf-droplets/addresses_get.md index 257a47455..bb3365015 100644 --- a/openapi-specs/compute/32-03/desc/pcf-droplets/addresses_get.md +++ b/openapi-specs/compute/32-03/desc/pcf-droplets/addresses_get.md @@ -5,7 +5,7 @@ You can also add optional query parameters to this API call, in this example `cl The following example curl command retrieves the list of addresses: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/pcf-droplets/download_get.md b/openapi-specs/compute/32-03/desc/pcf-droplets/download_get.md index ad761e744..ac8546a25 100644 --- a/openapi-specs/compute/32-03/desc/pcf-droplets/download_get.md +++ b/openapi-specs/compute/32-03/desc/pcf-droplets/download_get.md @@ -3,7 +3,7 @@ This endpoint will download the list of configured cloud controller addresses co The following example curl command retrieves the list of addresses and outputs it to a file call `PCF_blobstores.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/pcf-droplets/get.md b/openapi-specs/compute/32-03/desc/pcf-droplets/get.md index 930d16948..aad607cba 100644 --- a/openapi-specs/compute/32-03/desc/pcf-droplets/get.md +++ b/openapi-specs/compute/32-03/desc/pcf-droplets/get.md @@ -3,7 +3,7 @@ This endpoint will return the full metadata of PCF blobstore from page **Monitor The following example curl command will retrieve this: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/pcf-droplets/scan_post.md b/openapi-specs/compute/32-03/desc/pcf-droplets/scan_post.md index 34e75b26c..d9c9df4dd 100644 --- a/openapi-specs/compute/32-03/desc/pcf-droplets/scan_post.md +++ b/openapi-specs/compute/32-03/desc/pcf-droplets/scan_post.md @@ -3,7 +3,7 @@ This endpoint will kick off a scan of the any PCF Blobstores you have configured Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/pcf-droplets/stop_post.md b/openapi-specs/compute/32-03/desc/pcf-droplets/stop_post.md index 94c376972..2c4d5264a 100644 --- a/openapi-specs/compute/32-03/desc/pcf-droplets/stop_post.md +++ b/openapi-specs/compute/32-03/desc/pcf-droplets/stop_post.md @@ -3,7 +3,7 @@ This endpoint will instruct the PFC Defenders to stop scanning. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/policies/compliance_ci_images_get.md b/openapi-specs/compute/32-03/desc/policies/compliance_ci_images_get.md index f97130a97..9a2b2abf5 100644 --- a/openapi-specs/compute/32-03/desc/policies/compliance_ci_images_get.md +++ b/openapi-specs/compute/32-03/desc/policies/compliance_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > CI** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/policies/compliance_ci_serverless_get.md b/openapi-specs/compute/32-03/desc/policies/compliance_ci_serverless_get.md index 59195f070..2f30e2d74 100644 --- a/openapi-specs/compute/32-03/desc/policies/compliance_ci_serverless_get.md +++ b/openapi-specs/compute/32-03/desc/policies/compliance_ci_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Functions > CI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/policies/compliance_container_get.md b/openapi-specs/compute/32-03/desc/policies/compliance_container_get.md index 7f10245ea..657d4f2dd 100644 --- a/openapi-specs/compute/32-03/desc/policies/compliance_container_get.md +++ b/openapi-specs/compute/32-03/desc/policies/compliance_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > Deployed** Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/policies/compliance_container_impacted_get.md b/openapi-specs/compute/32-03/desc/policies/compliance_container_impacted_get.md index 607bfa3c8..de9e0ee77 100644 --- a/openapi-specs/compute/32-03/desc/policies/compliance_container_impacted_get.md +++ b/openapi-specs/compute/32-03/desc/policies/compliance_container_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of containers captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/compliance/container/impacted?ruleName=' diff --git a/openapi-specs/compute/32-03/desc/policies/compliance_host_get.md b/openapi-specs/compute/32-03/desc/policies/compliance_host_get.md index c029ecf7f..a5e429af5 100755 --- a/openapi-specs/compute/32-03/desc/policies/compliance_host_get.md +++ b/openapi-specs/compute/32-03/desc/policies/compliance_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Hosts > Running hosts** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/policies/compliance_serverless_get.md b/openapi-specs/compute/32-03/desc/policies/compliance_serverless_get.md index c7de886c1..f559179f6 100755 --- a/openapi-specs/compute/32-03/desc/policies/compliance_serverless_get.md +++ b/openapi-specs/compute/32-03/desc/policies/compliance_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Functions > Functions** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/policies/compliance_vms_get.md b/openapi-specs/compute/32-03/desc/policies/compliance_vms_get.md index f7d7e1a49..b61d20d9d 100755 --- a/openapi-specs/compute/32-03/desc/policies/compliance_vms_get.md +++ b/openapi-specs/compute/32-03/desc/policies/compliance_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Hosts > VM ima The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/policies/compliance_vms_impacted_get.md b/openapi-specs/compute/32-03/desc/policies/compliance_vms_impacted_get.md index 9cf5b9d03..4ac3f2832 100644 --- a/openapi-specs/compute/32-03/desc/policies/compliance_vms_impacted_get.md +++ b/openapi-specs/compute/32-03/desc/policies/compliance_vms_impacted_get.md @@ -8,7 +8,7 @@ Use query parameters to retrieve the list of impacted resources by *account ID*, Refer to the following example cURL command, which retrieves a list of impacted resources: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/policies/docker_get.md b/openapi-specs/compute/32-03/desc/policies/docker_get.md index f56872c67..e8ab3d5bb 100644 --- a/openapi-specs/compute/32-03/desc/policies/docker_get.md +++ b/openapi-specs/compute/32-03/desc/policies/docker_get.md @@ -3,7 +3,7 @@ Retrieves a list of all access control rules for Docker Engine commands. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/policies/docker_put.md b/openapi-specs/compute/32-03/desc/policies/docker_put.md index 860e2bb1e..a5d0c0230 100644 --- a/openapi-specs/compute/32-03/desc/policies/docker_put.md +++ b/openapi-specs/compute/32-03/desc/policies/docker_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove Docker access control rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/docker \ | jq '.' > docker_access_control_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove Docker access control rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/32-03/desc/policies/firewall_app-embedded_get.md b/openapi-specs/compute/32-03/desc/policies/firewall_app-embedded_get.md index 3da2a7cd6..4e59c4c21 100644 --- a/openapi-specs/compute/32-03/desc/policies/firewall_app-embedded_get.md +++ b/openapi-specs/compute/32-03/desc/policies/firewall_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > App-Embedded** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/policies/firewall_app_container_get.md b/openapi-specs/compute/32-03/desc/policies/firewall_app_container_get.md index 3b8c157fa..f0486aa4c 100644 --- a/openapi-specs/compute/32-03/desc/policies/firewall_app_container_get.md +++ b/openapi-specs/compute/32-03/desc/policies/firewall_app_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Container** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/container' diff --git a/openapi-specs/compute/32-03/desc/policies/firewall_app_host_get.md b/openapi-specs/compute/32-03/desc/policies/firewall_app_host_get.md index adb90128a..75c22add4 100644 --- a/openapi-specs/compute/32-03/desc/policies/firewall_app_host_get.md +++ b/openapi-specs/compute/32-03/desc/policies/firewall_app_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Host** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/policies/firewall_app_network_list_get.md b/openapi-specs/compute/32-03/desc/policies/firewall_app_network_list_get.md index 13f7fb450..5a1f87d85 100644 --- a/openapi-specs/compute/32-03/desc/policies/firewall_app_network_list_get.md +++ b/openapi-specs/compute/32-03/desc/policies/firewall_app_network_list_get.md @@ -11,7 +11,7 @@ This endpoint maps to **Defend > WAAS > Network lists** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/network-list' diff --git a/openapi-specs/compute/32-03/desc/policies/firewall_app_out-of-band_get.md b/openapi-specs/compute/32-03/desc/policies/firewall_app_out-of-band_get.md index d4f72d041..9ae662687 100644 --- a/openapi-specs/compute/32-03/desc/policies/firewall_app_out-of-band_get.md +++ b/openapi-specs/compute/32-03/desc/policies/firewall_app_out-of-band_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/policies/firewall_app_out-of-band_impacted_get.md b/openapi-specs/compute/32-03/desc/policies/firewall_app_out-of-band_impacted_get.md index 25d2c6691..96a427f94 100644 --- a/openapi-specs/compute/32-03/desc/policies/firewall_app_out-of-band_impacted_get.md +++ b/openapi-specs/compute/32-03/desc/policies/firewall_app_out-of-band_impacted_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/policies/firewall_app_rasp_get.md b/openapi-specs/compute/32-03/desc/policies/firewall_app_rasp_get.md index 15d481cf3..a201d3beb 100644 --- a/openapi-specs/compute/32-03/desc/policies/firewall_app_rasp_get.md +++ b/openapi-specs/compute/32-03/desc/policies/firewall_app_rasp_get.md @@ -1,7 +1,7 @@ Retrieves a list of all application firewall (CNAF) rules for RASP. ``` -$ curl -k \ +$ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp ``` diff --git a/openapi-specs/compute/32-03/desc/policies/firewall_app_rasp_put.md b/openapi-specs/compute/32-03/desc/policies/firewall_app_rasp_put.md index 04ba86483..1101c7690 100644 --- a/openapi-specs/compute/32-03/desc/policies/firewall_app_rasp_put.md +++ b/openapi-specs/compute/32-03/desc/policies/firewall_app_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp \ | jq '.' > app_firewall_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/32-03/desc/policies/firewall_app_serverless_get.md b/openapi-specs/compute/32-03/desc/policies/firewall_app_serverless_get.md index d19e909f3..90cac0015 100644 --- a/openapi-specs/compute/32-03/desc/policies/firewall_app_serverless_get.md +++ b/openapi-specs/compute/32-03/desc/policies/firewall_app_serverless_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Serverless** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/serverless' diff --git a/openapi-specs/compute/32-03/desc/policies/firewall_network_container_get.md b/openapi-specs/compute/32-03/desc/policies/firewall_network_container_get.md index 3f1343b53..82e656818 100644 --- a/openapi-specs/compute/32-03/desc/policies/firewall_network_container_get.md +++ b/openapi-specs/compute/32-03/desc/policies/firewall_network_container_get.md @@ -4,7 +4,7 @@ Retrieves a list of all CNNS container and host rules. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/policies/firewall_network_container_put.md b/openapi-specs/compute/32-03/desc/policies/firewall_network_container_put.md index fd9263430..cffb3f1c4 100644 --- a/openapi-specs/compute/32-03/desc/policies/firewall_network_container_put.md +++ b/openapi-specs/compute/32-03/desc/policies/firewall_network_container_put.md @@ -9,7 +9,7 @@ The procedure to add, edit, or remove rules is: Refer to the following example cURL command that retrieves a list of all rules, pretty-print the JSON response, and save the results to a file: ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -26,7 +26,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/32-03/desc/policies/firewall_network_entities_get.md b/openapi-specs/compute/32-03/desc/policies/firewall_network_entities_get.md index 757121f70..28ed8dbcb 100644 --- a/openapi-specs/compute/32-03/desc/policies/firewall_network_entities_get.md +++ b/openapi-specs/compute/32-03/desc/policies/firewall_network_entities_get.md @@ -1,7 +1,7 @@ Retrieves a list of all CNNF network objects. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/policies/firewall_network_entities_put.md b/openapi-specs/compute/32-03/desc/policies/firewall_network_entities_put.md index 83c023286..39044ee10 100644 --- a/openapi-specs/compute/32-03/desc/policies/firewall_network_entities_put.md +++ b/openapi-specs/compute/32-03/desc/policies/firewall_network_entities_put.md @@ -3,7 +3,7 @@ Updates the list of CNNF network objects. The following example curl command updates the network objects. There is an example of all three types (images,subnets, and applications ): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-03/desc/policies/policies.md b/openapi-specs/compute/32-03/desc/policies/policies.md index 69768c03d..97be7b616 100644 --- a/openapi-specs/compute/32-03/desc/policies/policies.md +++ b/openapi-specs/compute/32-03/desc/policies/policies.md @@ -21,7 +21,7 @@ To add, edit, or remove vulnerability rules from a policy: For example, the following cURL command uses basic auth to retrieve a list of all image vulnerability rules, pretty-prints the JSON response, and saves the results to a `vulnerability_rules.json` file. ```bash - $ curl -k \ + $ curl \ -u \ https:///api/v1/policies/runtime/host \ | jq '.' > vulnerability_rules.json @@ -36,7 +36,7 @@ To add, edit, or remove vulnerability rules from a policy: **Note:** Remember to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -107,7 +107,7 @@ Use the `PUT` method to delete all rules by submitting an empty JSON object. For example, to delete all host runtime rules: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-03/desc/policies/runtime_app-embedded_get.md b/openapi-specs/compute/32-03/desc/policies/runtime_app-embedded_get.md index fcf0ba8b9..517b741bb 100755 --- a/openapi-specs/compute/32-03/desc/policies/runtime_app-embedded_get.md +++ b/openapi-specs/compute/32-03/desc/policies/runtime_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > App-Embedded policy** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/policies/runtime_container_get.md b/openapi-specs/compute/32-03/desc/policies/runtime_container_get.md index f1b50b727..65cd10660 100644 --- a/openapi-specs/compute/32-03/desc/policies/runtime_container_get.md +++ b/openapi-specs/compute/32-03/desc/policies/runtime_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Container policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/policies/runtime_container_impacted_get.md b/openapi-specs/compute/32-03/desc/policies/runtime_container_impacted_get.md index 195f75547..e026d33b9 100644 --- a/openapi-specs/compute/32-03/desc/policies/runtime_container_impacted_get.md +++ b/openapi-specs/compute/32-03/desc/policies/runtime_container_impacted_get.md @@ -6,7 +6,7 @@ In the Console UI, you can see how it works by going to the **Defend > Runtime > Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ $ curl -k \ For additional help with your `ruleName`: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/policies/runtime_host_get.md b/openapi-specs/compute/32-03/desc/policies/runtime_host_get.md index 38800596c..559ef690a 100644 --- a/openapi-specs/compute/32-03/desc/policies/runtime_host_get.md +++ b/openapi-specs/compute/32-03/desc/policies/runtime_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Host policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/policies/runtime_rasp_get.md b/openapi-specs/compute/32-03/desc/policies/runtime_rasp_get.md index 5b7a76457..55a6ff05b 100644 --- a/openapi-specs/compute/32-03/desc/policies/runtime_rasp_get.md +++ b/openapi-specs/compute/32-03/desc/policies/runtime_rasp_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your RASP runtime policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/policies/runtime_rasp_put.md b/openapi-specs/compute/32-03/desc/policies/runtime_rasp_put.md index bba60ba81..f71fb4b93 100644 --- a/openapi-specs/compute/32-03/desc/policies/runtime_rasp_put.md +++ b/openapi-specs/compute/32-03/desc/policies/runtime_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve the rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET @@ -24,7 +24,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -H "Content-Type:application/json" \ -X PUT \ diff --git a/openapi-specs/compute/32-03/desc/policies/runtime_serverless_get.md b/openapi-specs/compute/32-03/desc/policies/runtime_serverless_get.md index 44326bbf6..c98489e16 100644 --- a/openapi-specs/compute/32-03/desc/policies/runtime_serverless_get.md +++ b/openapi-specs/compute/32-03/desc/policies/runtime_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Serverless policy** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/policies/secrets_get.md b/openapi-specs/compute/32-03/desc/policies/secrets_get.md index 89e6b9c0e..cb4ecb37c 100644 --- a/openapi-specs/compute/32-03/desc/policies/secrets_get.md +++ b/openapi-specs/compute/32-03/desc/policies/secrets_get.md @@ -3,7 +3,7 @@ Retrieves a list of all secrets rules. The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/policies/secrets diff --git a/openapi-specs/compute/32-03/desc/policies/secrets_put.md b/openapi-specs/compute/32-03/desc/policies/secrets_put.md index 1e8877ca1..04fd41f24 100644 --- a/openapi-specs/compute/32-03/desc/policies/secrets_put.md +++ b/openapi-specs/compute/32-03/desc/policies/secrets_put.md @@ -10,7 +10,7 @@ The procedure to add, edit, or remove secrets rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/secrets \ | jq '.' > secrets_rules.json @@ -24,7 +24,7 @@ The procedure to add, edit, or remove secrets rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/32-03/desc/policies/trust_get.md b/openapi-specs/compute/32-03/desc/policies/trust_get.md index 8de1ba409..0805d6777 100644 --- a/openapi-specs/compute/32-03/desc/policies/trust_get.md +++ b/openapi-specs/compute/32-03/desc/policies/trust_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/policies/trust_put.md b/openapi-specs/compute/32-03/desc/policies/trust_put.md index fccd4b91e..7fec72031 100644 --- a/openapi-specs/compute/32-03/desc/policies/trust_put.md +++ b/openapi-specs/compute/32-03/desc/policies/trust_put.md @@ -1,7 +1,7 @@ Updates the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-03/desc/policies/vulnerability_ci_images_get.md b/openapi-specs/compute/32-03/desc/policies/vulnerability_ci_images_get.md index abc3da8fa..ce0d50a29 100644 --- a/openapi-specs/compute/32-03/desc/policies/vulnerability_ci_images_get.md +++ b/openapi-specs/compute/32-03/desc/policies/vulnerability_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/policies/vulnerability_ci_serverless_get.md b/openapi-specs/compute/32-03/desc/policies/vulnerability_ci_serverless_get.md index 958c86495..6fb5f93ce 100644 --- a/openapi-specs/compute/32-03/desc/policies/vulnerability_ci_serverless_get.md +++ b/openapi-specs/compute/32-03/desc/policies/vulnerability_ci_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/policies/vulnerability_coderepos_get.md b/openapi-specs/compute/32-03/desc/policies/vulnerability_coderepos_get.md index 08dfed8e1..a4ac62f33 100644 --- a/openapi-specs/compute/32-03/desc/policies/vulnerability_coderepos_get.md +++ b/openapi-specs/compute/32-03/desc/policies/vulnerability_coderepos_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Code repositories** in the Co Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/vulnerability/coderepos' diff --git a/openapi-specs/compute/32-03/desc/policies/vulnerability_coderepos_impacted_get.md b/openapi-specs/compute/32-03/desc/policies/vulnerability_coderepos_impacted_get.md index a401a12c4..e64ef768e 100644 --- a/openapi-specs/compute/32-03/desc/policies/vulnerability_coderepos_impacted_get.md +++ b/openapi-specs/compute/32-03/desc/policies/vulnerability_coderepos_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/coderepos/impacted?project=&ruleName=' ``` diff --git a/openapi-specs/compute/32-03/desc/policies/vulnerability_coderepos_put.md b/openapi-specs/compute/32-03/desc/policies/vulnerability_coderepos_put.md index 514eec136..a002415b9 100644 --- a/openapi-specs/compute/32-03/desc/policies/vulnerability_coderepos_put.md +++ b/openapi-specs/compute/32-03/desc/policies/vulnerability_coderepos_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Code repo Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT 'https:///api/v/policies/vulnerability/coderepos' \ diff --git a/openapi-specs/compute/32-03/desc/policies/vulnerability_host_get.md b/openapi-specs/compute/32-03/desc/policies/vulnerability_host_get.md index 3b9b14b9c..260da7675 100644 --- a/openapi-specs/compute/32-03/desc/policies/vulnerability_host_get.md +++ b/openapi-specs/compute/32-03/desc/policies/vulnerability_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Hosts > Running hosts** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/policies/vulnerability_host_impacted_get.md b/openapi-specs/compute/32-03/desc/policies/vulnerability_host_impacted_get.md index 346368518..f44592830 100644 --- a/openapi-specs/compute/32-03/desc/policies/vulnerability_host_impacted_get.md +++ b/openapi-specs/compute/32-03/desc/policies/vulnerability_host_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by `RULE_NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/host/impacted?project={PROJECT_NAME}&ruleName={RULE_NAME}' ``` diff --git a/openapi-specs/compute/32-03/desc/policies/vulnerability_images_get.md b/openapi-specs/compute/32-03/desc/policies/vulnerability_images_get.md index 33581be37..57359bb8f 100644 --- a/openapi-specs/compute/32-03/desc/policies/vulnerability_images_get.md +++ b/openapi-specs/compute/32-03/desc/policies/vulnerability_images_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images?project=" diff --git a/openapi-specs/compute/32-03/desc/policies/vulnerability_images_impacted_get.md b/openapi-specs/compute/32-03/desc/policies/vulnerability_images_impacted_get.md index ae1d5e396..e2a4efa23 100644 --- a/openapi-specs/compute/32-03/desc/policies/vulnerability_images_impacted_get.md +++ b/openapi-specs/compute/32-03/desc/policies/vulnerability_images_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of images caught by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images/impacted?project=&ruleName=" diff --git a/openapi-specs/compute/32-03/desc/policies/vulnerability_images_put.md b/openapi-specs/compute/32-03/desc/policies/vulnerability_images_put.md index b3330dab7..8c3cc8af2 100644 --- a/openapi-specs/compute/32-03/desc/policies/vulnerability_images_put.md +++ b/openapi-specs/compute/32-03/desc/policies/vulnerability_images_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -X PUT 'https:///api/v/policies/vulnerability/images' \ --data '{ diff --git a/openapi-specs/compute/32-03/desc/policies/vulnerability_serverless_get.md b/openapi-specs/compute/32-03/desc/policies/vulnerability_serverless_get.md index c7a8e2ef5..41c7e75d8 100644 --- a/openapi-specs/compute/32-03/desc/policies/vulnerability_serverless_get.md +++ b/openapi-specs/compute/32-03/desc/policies/vulnerability_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Functions** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/policies/vulnerability_serverless_put.md b/openapi-specs/compute/32-03/desc/policies/vulnerability_serverless_put.md index 2b567b5b1..5199f0997 100644 --- a/openapi-specs/compute/32-03/desc/policies/vulnerability_serverless_put.md +++ b/openapi-specs/compute/32-03/desc/policies/vulnerability_serverless_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k 'https:///api/v/policies/vulnerability/serverless' \ +$ curl 'https:///api/v/policies/vulnerability/serverless' \ -X PUT \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-03/desc/policies/vulnerability_vms_get.md b/openapi-specs/compute/32-03/desc/policies/vulnerability_vms_get.md index 117d2cc4a..e37c1520f 100644 --- a/openapi-specs/compute/32-03/desc/policies/vulnerability_vms_get.md +++ b/openapi-specs/compute/32-03/desc/policies/vulnerability_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Hosts > V The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/policies/vulnerability_vms_impacted_get.md b/openapi-specs/compute/32-03/desc/policies/vulnerability_vms_impacted_get.md index 29d9621ea..f1a7f7ef5 100644 --- a/openapi-specs/compute/32-03/desc/policies/vulnerability_vms_impacted_get.md +++ b/openapi-specs/compute/32-03/desc/policies/vulnerability_vms_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/vms?project=&ruleName=' ``` diff --git a/openapi-specs/compute/32-03/desc/profiles/app-embedded_download_get.md b/openapi-specs/compute/32-03/desc/profiles/app-embedded_download_get.md index 4b3f7ff8a..2e8cac56d 100644 --- a/openapi-specs/compute/32-03/desc/profiles/app-embedded_download_get.md +++ b/openapi-specs/compute/32-03/desc/profiles/app-embedded_download_get.md @@ -5,7 +5,7 @@ Downloads the app-embedded observations in a CSV format. Refer to the following example cURL command that downloads all the app-embedded runtime profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/profiles/app-embedded_get.md b/openapi-specs/compute/32-03/desc/profiles/app-embedded_get.md index f3ddb3125..c332061e5 100644 --- a/openapi-specs/compute/32-03/desc/profiles/app-embedded_get.md +++ b/openapi-specs/compute/32-03/desc/profiles/app-embedded_get.md @@ -5,7 +5,7 @@ Retrieves the app-embedded observations. Refer to the following example cURL command that lists all the app-embedded runtime: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/profiles/container_download_get.md b/openapi-specs/compute/32-03/desc/profiles/container_download_get.md index ad7a86101..ee9d5e9e4 100644 --- a/openapi-specs/compute/32-03/desc/profiles/container_download_get.md +++ b/openapi-specs/compute/32-03/desc/profiles/container_download_get.md @@ -6,7 +6,7 @@ Retrieves the details and state of all runtime models in CSV format. Refer to the following example cURL command that downloads a complete list in CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/profiles/container_filters_get.md b/openapi-specs/compute/32-03/desc/profiles/container_filters_get.md index 8b6122b80..13535b520 100644 --- a/openapi-specs/compute/32-03/desc/profiles/container_filters_get.md +++ b/openapi-specs/compute/32-03/desc/profiles/container_filters_get.md @@ -4,7 +4,7 @@ Returns a list of os and images from page monitor/runtime/container-models in Co Example curl command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/profiles/container_get.md b/openapi-specs/compute/32-03/desc/profiles/container_get.md index cdbc24c3e..59a3764fb 100644 --- a/openapi-specs/compute/32-03/desc/profiles/container_get.md +++ b/openapi-specs/compute/32-03/desc/profiles/container_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of all runtime models. Refer to the following example cURL command that lists all runtime models in a system: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/profiles/container_learn_post.md b/openapi-specs/compute/32-03/desc/profiles/container_learn_post.md index 5fef2e31e..2c1d08af1 100644 --- a/openapi-specs/compute/32-03/desc/profiles/container_learn_post.md +++ b/openapi-specs/compute/32-03/desc/profiles/container_learn_post.md @@ -7,7 +7,7 @@ For more information, refer to [Learning mode](https://docs.prismacloud.io/en/cl Refer to the following example cURL command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/profiles/host_download_get.md b/openapi-specs/compute/32-03/desc/profiles/host_download_get.md index ace270a32..2dfb51ec0 100644 --- a/openapi-specs/compute/32-03/desc/profiles/host_download_get.md +++ b/openapi-specs/compute/32-03/desc/profiles/host_download_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of each host service runtime model in CSV format Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/profiles/host_get.md b/openapi-specs/compute/32-03/desc/profiles/host_get.md index 208a24de3..55d8bf8ff 100644 --- a/openapi-specs/compute/32-03/desc/profiles/host_get.md +++ b/openapi-specs/compute/32-03/desc/profiles/host_get.md @@ -15,7 +15,7 @@ The returned JSON object has the following structure: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/profiles/host_id_rule_get.md b/openapi-specs/compute/32-03/desc/profiles/host_id_rule_get.md index 672cb4c62..8be668fca 100644 --- a/openapi-specs/compute/32-03/desc/profiles/host_id_rule_get.md +++ b/openapi-specs/compute/32-03/desc/profiles/host_id_rule_get.md @@ -10,7 +10,7 @@ This is the `PROFILE_ID`. The following example command uses curl and basic auth to specify the learning mode for a profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/profiles/service_download_get.md b/openapi-specs/compute/32-03/desc/profiles/service_download_get.md index 63dff3354..4c1c431c1 100644 --- a/openapi-specs/compute/32-03/desc/profiles/service_download_get.md +++ b/openapi-specs/compute/32-03/desc/profiles/service_download_get.md @@ -1,7 +1,7 @@ Retrieves the details and state of all host service runtime models in CSV format ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/profiles/service_get.md b/openapi-specs/compute/32-03/desc/profiles/service_get.md index a4f8c348d..5d786d919 100644 --- a/openapi-specs/compute/32-03/desc/profiles/service_get.md +++ b/openapi-specs/compute/32-03/desc/profiles/service_get.md @@ -10,7 +10,7 @@ The returned JSON object has the following structure: Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/profiles/service_id_learn_post.md b/openapi-specs/compute/32-03/desc/profiles/service_id_learn_post.md index fb338b80d..fa85fc3a2 100644 --- a/openapi-specs/compute/32-03/desc/profiles/service_id_learn_post.md +++ b/openapi-specs/compute/32-03/desc/profiles/service_id_learn_post.md @@ -11,7 +11,7 @@ The `PROFILE_ID` is typically the service's name, such as `sshd` or `ntpd`. The following example command uses curl and basic auth to specify the learning mode for a host service profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/profiles/service_learn_post.md b/openapi-specs/compute/32-03/desc/profiles/service_learn_post.md index 02a1f299e..ceff8e5a5 100644 --- a/openapi-specs/compute/32-03/desc/profiles/service_learn_post.md +++ b/openapi-specs/compute/32-03/desc/profiles/service_learn_post.md @@ -3,7 +3,7 @@ Specify the learning mode for all host service profiles. The following example command uses curl and basic auth to specify the learning mode for all host service profiles. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/profiles/service_names_get.md b/openapi-specs/compute/32-03/desc/profiles/service_names_get.md index 7da863545..afae56f0d 100644 --- a/openapi-specs/compute/32-03/desc/profiles/service_names_get.md +++ b/openapi-specs/compute/32-03/desc/profiles/service_names_get.md @@ -3,7 +3,7 @@ Retrieves the name of all host service runtime models from within the app at **M The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/projects/get.md b/openapi-specs/compute/32-03/desc/projects/get.md index 05485c24c..1ac04d2c0 100644 --- a/openapi-specs/compute/32-03/desc/projects/get.md +++ b/openapi-specs/compute/32-03/desc/projects/get.md @@ -3,7 +3,7 @@ Lists all projects visible to the given user. Assuming the given user is an admin, the following example curl command would list all projects: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/projects/name_delete.md b/openapi-specs/compute/32-03/desc/projects/name_delete.md index fba889f7e..0a34e72a2 100644 --- a/openapi-specs/compute/32-03/desc/projects/name_delete.md +++ b/openapi-specs/compute/32-03/desc/projects/name_delete.md @@ -6,7 +6,7 @@ The value for `` can be retrieved from the `_id` field in the resp The DELETE method returns the decommissioned supervisor's admin username and password. ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/compute/32-03/desc/projects/name_put.md b/openapi-specs/compute/32-03/desc/projects/name_put.md index b5a83a67d..1bde9b0c7 100644 --- a/openapi-specs/compute/32-03/desc/projects/name_put.md +++ b/openapi-specs/compute/32-03/desc/projects/name_put.md @@ -4,7 +4,7 @@ The following example curl command updates a project named ``. The value for `` can be retrieved from the `_id` field in the response object from `GET /api/v1/projects`. ```bash -$ curl -k \ +$ curl \ -u \ -X PUT \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/compute/32-03/desc/projects/post.md b/openapi-specs/compute/32-03/desc/projects/post.md index 8862c0fd4..38c574173 100644 --- a/openapi-specs/compute/32-03/desc/projects/post.md +++ b/openapi-specs/compute/32-03/desc/projects/post.md @@ -3,7 +3,7 @@ Provisions a new project. The following example curl command provisions a new project named `my-project`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ $ curl -k \ If you have installed a new instance of Console, and you have already created an initial admin user for it, then you can specify the admin username name and password when you provision the project. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/projects/projects.md b/openapi-specs/compute/32-03/desc/projects/projects.md index 7e7dcff66..19c904e9e 100644 --- a/openapi-specs/compute/32-03/desc/projects/projects.md +++ b/openapi-specs/compute/32-03/desc/projects/projects.md @@ -20,7 +20,7 @@ If `project` is not specified, it is set to `Central+Console`. For example, to retrieve the compliance policies for a tenant project named `mobile_payments_division`, use the following curl command: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/radar/container_clean_post.md b/openapi-specs/compute/32-03/desc/radar/container_clean_post.md index 662b6d53f..d4f87e91e 100644 --- a/openapi-specs/compute/32-03/desc/radar/container_clean_post.md +++ b/openapi-specs/compute/32-03/desc/radar/container_clean_post.md @@ -1,7 +1,7 @@ Cleans the container runtime profiles and Radar entities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/radar/container_delete.md b/openapi-specs/compute/32-03/desc/radar/container_delete.md index 4eabe337f..b6cc69cf2 100644 --- a/openapi-specs/compute/32-03/desc/radar/container_delete.md +++ b/openapi-specs/compute/32-03/desc/radar/container_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-03/desc/radar/container_export_get.md b/openapi-specs/compute/32-03/desc/radar/container_export_get.md index 7f577568f..f776c7e6c 100644 --- a/openapi-specs/compute/32-03/desc/radar/container_export_get.md +++ b/openapi-specs/compute/32-03/desc/radar/container_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for containers) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/radar/container_filters_get.md b/openapi-specs/compute/32-03/desc/radar/container_filters_get.md index f66463da1..8d7cd6df3 100644 --- a/openapi-specs/compute/32-03/desc/radar/container_filters_get.md +++ b/openapi-specs/compute/32-03/desc/radar/container_filters_get.md @@ -1,7 +1,7 @@ Returns the namespaces from the container view on the Radar page. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/radar/container_get.md b/openapi-specs/compute/32-03/desc/radar/container_get.md index 280d683d9..404629a25 100644 --- a/openapi-specs/compute/32-03/desc/radar/container_get.md +++ b/openapi-specs/compute/32-03/desc/radar/container_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (container view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/radar/host_delete.md b/openapi-specs/compute/32-03/desc/radar/host_delete.md index 738fa7a7c..b4910a8b7 100644 --- a/openapi-specs/compute/32-03/desc/radar/host_delete.md +++ b/openapi-specs/compute/32-03/desc/radar/host_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two apps in CNNF for hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-03/desc/radar/host_export_get.md b/openapi-specs/compute/32-03/desc/radar/host_export_get.md index dd91b5335..851d6f40f 100644 --- a/openapi-specs/compute/32-03/desc/radar/host_export_get.md +++ b/openapi-specs/compute/32-03/desc/radar/host_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for hosts) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/radar/host_get.md b/openapi-specs/compute/32-03/desc/radar/host_get.md index a12025856..222d075aa 100644 --- a/openapi-specs/compute/32-03/desc/radar/host_get.md +++ b/openapi-specs/compute/32-03/desc/radar/host_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (host view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/radar/serverless_get.md b/openapi-specs/compute/32-03/desc/radar/serverless_get.md index b2f329149..170cfb48d 100644 --- a/openapi-specs/compute/32-03/desc/radar/serverless_get.md +++ b/openapi-specs/compute/32-03/desc/radar/serverless_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/radar/serverless_progress_get.md b/openapi-specs/compute/32-03/desc/radar/serverless_progress_get.md index a11c1ae20..0808dfbf4 100644 --- a/openapi-specs/compute/32-03/desc/radar/serverless_progress_get.md +++ b/openapi-specs/compute/32-03/desc/radar/serverless_progress_get.md @@ -1,7 +1,7 @@ Returns the scan progress from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/radar/serverless_scan_post.md b/openapi-specs/compute/32-03/desc/radar/serverless_scan_post.md index 0d519ba88..2d444ac88 100644 --- a/openapi-specs/compute/32-03/desc/radar/serverless_scan_post.md +++ b/openapi-specs/compute/32-03/desc/radar/serverless_scan_post.md @@ -1,7 +1,7 @@ Initiates a serverless scan of your environments. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/radar/serverless_stop_post.md b/openapi-specs/compute/32-03/desc/radar/serverless_stop_post.md index 5c0bdf186..f15bef34d 100644 --- a/openapi-specs/compute/32-03/desc/radar/serverless_stop_post.md +++ b/openapi-specs/compute/32-03/desc/radar/serverless_stop_post.md @@ -1,7 +1,7 @@ Stops an in-progress serverless scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/rbac/role_delete.md b/openapi-specs/compute/32-03/desc/rbac/role_delete.md index 87015b6e8..46efcf9c9 100644 --- a/openapi-specs/compute/32-03/desc/rbac/role_delete.md +++ b/openapi-specs/compute/32-03/desc/rbac/role_delete.md @@ -4,7 +4,7 @@ System roles and roles assigned to users/groups cannot be deleted. The following example curl command uses basic auth to delete role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-03/desc/rbac/roles_get.md b/openapi-specs/compute/32-03/desc/rbac/roles_get.md index 4cd1d9bc7..112026937 100644 --- a/openapi-specs/compute/32-03/desc/rbac/roles_get.md +++ b/openapi-specs/compute/32-03/desc/rbac/roles_get.md @@ -3,7 +3,7 @@ This endpoint will return a list in JSON format of the roles can be found under The following example curl command uses basic auth to return: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/rbac/roles_post.md b/openapi-specs/compute/32-03/desc/rbac/roles_post.md index 1f20772ce..6988766e8 100644 --- a/openapi-specs/compute/32-03/desc/rbac/roles_post.md +++ b/openapi-specs/compute/32-03/desc/rbac/roles_post.md @@ -37,7 +37,7 @@ The added role must contain the "user" permission with read-write access. This p The following example curl command uses basic auth to create the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/rbac/roles_put.md b/openapi-specs/compute/32-03/desc/rbac/roles_put.md index 34d7b41a7..f62e34ccb 100644 --- a/openapi-specs/compute/32-03/desc/rbac/roles_put.md +++ b/openapi-specs/compute/32-03/desc/rbac/roles_put.md @@ -38,7 +38,7 @@ The updated role must contain the "user" permission with read-write access. This The following example curl command uses basic auth to update the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-03/desc/recovery/backup_get.md b/openapi-specs/compute/32-03/desc/recovery/backup_get.md index 4da46f356..bf735905a 100644 --- a/openapi-specs/compute/32-03/desc/recovery/backup_get.md +++ b/openapi-specs/compute/32-03/desc/recovery/backup_get.md @@ -3,7 +3,7 @@ Returns a list of available backups. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/recovery/backup_id_delete.md b/openapi-specs/compute/32-03/desc/recovery/backup_id_delete.md index ae9c33e90..80cd4c3f6 100644 --- a/openapi-specs/compute/32-03/desc/recovery/backup_id_delete.md +++ b/openapi-specs/compute/32-03/desc/recovery/backup_id_delete.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-03/desc/recovery/backup_id_patch.md b/openapi-specs/compute/32-03/desc/recovery/backup_id_patch.md index 4a78cd67d..b3699972f 100644 --- a/openapi-specs/compute/32-03/desc/recovery/backup_id_patch.md +++ b/openapi-specs/compute/32-03/desc/recovery/backup_id_patch.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/compute/32-03/desc/recovery/backup_post.md b/openapi-specs/compute/32-03/desc/recovery/backup_post.md index f45161712..41436fe5f 100644 --- a/openapi-specs/compute/32-03/desc/recovery/backup_post.md +++ b/openapi-specs/compute/32-03/desc/recovery/backup_post.md @@ -3,7 +3,7 @@ Creates a backup named `backup_name` by invoking the MongoDB dump process. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/recovery/restore_id_post.md b/openapi-specs/compute/32-03/desc/recovery/restore_id_post.md index 850fceeaa..e424641cc 100644 --- a/openapi-specs/compute/32-03/desc/recovery/restore_id_post.md +++ b/openapi-specs/compute/32-03/desc/recovery/restore_id_post.md @@ -5,7 +5,7 @@ Restores Prisma Cloud Compute from the given backup. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/registry/download_get.md b/openapi-specs/compute/32-03/desc/registry/download_get.md index 5a3eb0141..3eef8d50e 100644 --- a/openapi-specs/compute/32-03/desc/registry/download_get.md +++ b/openapi-specs/compute/32-03/desc/registry/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Compliance > Images > Reg Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/registry/get.md b/openapi-specs/compute/32-03/desc/registry/get.md index 96b46382e..7474b119a 100644 --- a/openapi-specs/compute/32-03/desc/registry/get.md +++ b/openapi-specs/compute/32-03/desc/registry/get.md @@ -20,7 +20,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that retrieves a scan report for all images in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -32,7 +32,7 @@ The compact query can be used to get a general overview of the number of Vulnera Refer to the following cURL command that retrieves a compact scan report for the Ubuntu image in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -43,7 +43,7 @@ The name query is synonymous with the filter registry text field in the Console Refer to the following cURL that retrieves the scan report for the image in the registry with the matching **sha256** hash: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -53,7 +53,7 @@ $ curl -k \ Refer to the following cURL command that retrieves the images in the first 10 registries: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/registry/get_registry_progress.md b/openapi-specs/compute/32-03/desc/registry/get_registry_progress.md index 03c5d0896..c08331d5b 100644 --- a/openapi-specs/compute/32-03/desc/registry/get_registry_progress.md +++ b/openapi-specs/compute/32-03/desc/registry/get_registry_progress.md @@ -9,7 +9,7 @@ For a regular scan, use the API path only without any query parameters. Refer to the following example cURL request that retrieves the ongoing scan details for a regular registry scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -63,7 +63,7 @@ For an on-demand scan that is started using the `/registry/scan` endpoint with t Refer to the following example cURL request that retrieves the ongoing scan details for an on-demand registry scan that is started using the `/registry/scan` endpoint for the repository `alpine` with tag `3.16`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/registry/names_get.md b/openapi-specs/compute/32-03/desc/registry/names_get.md index 1e5bed727..f3b8676a8 100644 --- a/openapi-specs/compute/32-03/desc/registry/names_get.md +++ b/openapi-specs/compute/32-03/desc/registry/names_get.md @@ -5,7 +5,7 @@ Retrieves a list of image names from current scanned registry images. The base ` Refer to the following example cURL command that retrieves a list of image names from your scanned registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/registry/scan_post.md b/openapi-specs/compute/32-03/desc/registry/scan_post.md index ce7e19533..96bfd5f16 100644 --- a/openapi-specs/compute/32-03/desc/registry/scan_post.md +++ b/openapi-specs/compute/32-03/desc/registry/scan_post.md @@ -17,7 +17,7 @@ For information on scan result, see [Get Registry Scan Report](https://prisma.pa Refer to the following example cURL command that forces Prisma Cloud Compute to rescan all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -27,7 +27,7 @@ $ curl -k \ Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan a specific image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -52,7 +52,7 @@ For information on scan result, see [Get Registry Scan Report](https://pan.dev/p Refer to the following example cURL command to trigger an on-demand scan for an image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/registry/stop_post.md b/openapi-specs/compute/32-03/desc/registry/stop_post.md index 29e103ac1..05ac2f436 100644 --- a/openapi-specs/compute/32-03/desc/registry/stop_post.md +++ b/openapi-specs/compute/32-03/desc/registry/stop_post.md @@ -5,7 +5,7 @@ Stops current registry scan immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to stop scanning all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/scans/download_get.md b/openapi-specs/compute/32-03/desc/scans/download_get.md index 61a0ccc2d..3785bf562 100644 --- a/openapi-specs/compute/32-03/desc/scans/download_get.md +++ b/openapi-specs/compute/32-03/desc/scans/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Images The following cURL command retrieves and saves your Jenkins and twistcli scan reports to a CSV file called `scans_report.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/scans/filter_get.md b/openapi-specs/compute/32-03/desc/scans/filter_get.md index 58550ad35..df3e9cdb0 100644 --- a/openapi-specs/compute/32-03/desc/scans/filter_get.md +++ b/openapi-specs/compute/32-03/desc/scans/filter_get.md @@ -3,7 +3,7 @@ Retrieves the list of Jenkins projects that have been scanned by the Jenkins plu The following example curl command uses basic auth to retrieve the list of Jenkins project names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/scans/get.md b/openapi-specs/compute/32-03/desc/scans/get.md index 9bc06317f..775d9934f 100644 --- a/openapi-specs/compute/32-03/desc/scans/get.md +++ b/openapi-specs/compute/32-03/desc/scans/get.md @@ -10,7 +10,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command that retrieves the scan reports for all images scanned using the Jenkins CI plugin or the twistcli tool: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -22,7 +22,7 @@ To get the report of a specific scan, add query parameters to narrow the scope o The following cURL command retrieves the scan report for an image with a SHA256 ID of `sha256:f756e84300d8e53006090573dd33abe5b8cfac3e42d104fc4be37f435fe512f3`. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/scans/id_get.md b/openapi-specs/compute/32-03/desc/scans/id_get.md index 7a342ef60..1557b1905 100644 --- a/openapi-specs/compute/32-03/desc/scans/id_get.md +++ b/openapi-specs/compute/32-03/desc/scans/id_get.md @@ -3,7 +3,7 @@ Retrieves all scan reports for images scanned by the Jenkins plugin or twistcli The following example curl command uses basic auth to retrieve the scan report for just an image with a SHA256 ID of `5c3385fd2e76c5c16124c077`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/scripts/console_sh_get.md b/openapi-specs/compute/32-03/desc/scripts/console_sh_get.md index d8f02038f..1622321ca 100644 --- a/openapi-specs/compute/32-03/desc/scripts/console_sh_get.md +++ b/openapi-specs/compute/32-03/desc/scripts/console_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/scripts/defender_ps1_get.md b/openapi-specs/compute/32-03/desc/scripts/defender_ps1_get.md index a47616983..45e4a6133 100644 --- a/openapi-specs/compute/32-03/desc/scripts/defender_ps1_get.md +++ b/openapi-specs/compute/32-03/desc/scripts/defender_ps1_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/scripts/defender_sh_get.md b/openapi-specs/compute/32-03/desc/scripts/defender_sh_get.md index 98ad6cf62..a8a302426 100644 --- a/openapi-specs/compute/32-03/desc/scripts/defender_sh_get.md +++ b/openapi-specs/compute/32-03/desc/scripts/defender_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/serverless/download_get.md b/openapi-specs/compute/32-03/desc/serverless/download_get.md index a8e49ff25..4d7d3adc1 100644 --- a/openapi-specs/compute/32-03/desc/serverless/download_get.md +++ b/openapi-specs/compute/32-03/desc/serverless/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Functio The following cURL command retrieves a list of all serverless resources monitored by Prisma Cloud Compute and saves the results in a CSV file called `serverless.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/serverless/download' \ diff --git a/openapi-specs/compute/32-03/desc/serverless/embed_post.md b/openapi-specs/compute/32-03/desc/serverless/embed_post.md index 6cce784b8..353b5721c 100644 --- a/openapi-specs/compute/32-03/desc/serverless/embed_post.md +++ b/openapi-specs/compute/32-03/desc/serverless/embed_post.md @@ -1,7 +1,7 @@ The following curl command uses basic auth to retrieve a list of all Serverless resources that monitored by Prisma Cloud Compute, and save the results to a CSV file: ```bash -$ curl -k \ +$ curl \ -X POST \ -H "Content-Type: application/octet-stream" \ -u \ diff --git a/openapi-specs/compute/32-03/desc/serverless/get.md b/openapi-specs/compute/32-03/desc/serverless/get.md index 77a0d8a4e..c6c75c480 100644 --- a/openapi-specs/compute/32-03/desc/serverless/get.md +++ b/openapi-specs/compute/32-03/desc/serverless/get.md @@ -10,7 +10,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Functions > Scanned function Refer to the following example cURL command that retrieves the scan reports for serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/serverless/names_get.md b/openapi-specs/compute/32-03/desc/serverless/names_get.md index 62cbcd53b..ab229e0f8 100644 --- a/openapi-specs/compute/32-03/desc/serverless/names_get.md +++ b/openapi-specs/compute/32-03/desc/serverless/names_get.md @@ -1,7 +1,7 @@ The following curl command uses basic auth to retrieve a list of names of all Serverless resources monitored by Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -X GET \ -H "Content-Type: application/json" \ -u \ diff --git a/openapi-specs/compute/32-03/desc/serverless/scan_post.md b/openapi-specs/compute/32-03/desc/serverless/scan_post.md index 159285349..70a3a3b4e 100644 --- a/openapi-specs/compute/32-03/desc/serverless/scan_post.md +++ b/openapi-specs/compute/32-03/desc/serverless/scan_post.md @@ -5,7 +5,7 @@ Re-scan all serverless functions immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/scan diff --git a/openapi-specs/compute/32-03/desc/serverless/stop_post.md b/openapi-specs/compute/32-03/desc/serverless/stop_post.md index 763710842..67c0d2239 100644 --- a/openapi-specs/compute/32-03/desc/serverless/stop_post.md +++ b/openapi-specs/compute/32-03/desc/serverless/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing serverless scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/stop diff --git a/openapi-specs/compute/32-03/desc/settings/alerts_get.md b/openapi-specs/compute/32-03/desc/settings/alerts_get.md index 060114c39..2b25dc6c9 100644 --- a/openapi-specs/compute/32-03/desc/settings/alerts_get.md +++ b/openapi-specs/compute/32-03/desc/settings/alerts_get.md @@ -1,7 +1,7 @@ Retrieves a list of your alert settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/settings/alerts_options_get.md b/openapi-specs/compute/32-03/desc/settings/alerts_options_get.md index 095c1f1b7..aa7a1d250 100644 --- a/openapi-specs/compute/32-03/desc/settings/alerts_options_get.md +++ b/openapi-specs/compute/32-03/desc/settings/alerts_options_get.md @@ -3,7 +3,7 @@ This endpoint will return the alert profile configuration options that can be fo The following example curl command uses basic auth to retrieve all alert profile configuration options: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/settings/alerts_post.md b/openapi-specs/compute/32-03/desc/settings/alerts_post.md index 3acb8d543..cd303f880 100644 --- a/openapi-specs/compute/32-03/desc/settings/alerts_post.md +++ b/openapi-specs/compute/32-03/desc/settings/alerts_post.md @@ -3,7 +3,7 @@ Configure alerts. The following example curl command sets the aggregation period for alerts to one hour. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/settings/certificates_post.md b/openapi-specs/compute/32-03/desc/settings/certificates_post.md index fbdc8a5a9..bd30ea399 100644 --- a/openapi-specs/compute/32-03/desc/settings/certificates_post.md +++ b/openapi-specs/compute/32-03/desc/settings/certificates_post.md @@ -9,7 +9,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to set the validity period for client certificates to seven days: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/32-03/desc/settings/certs_get.md b/openapi-specs/compute/32-03/desc/settings/certs_get.md index ba6674a3c..dbf1d3790 100644 --- a/openapi-specs/compute/32-03/desc/settings/certs_get.md +++ b/openapi-specs/compute/32-03/desc/settings/certs_get.md @@ -6,7 +6,7 @@ Defenders use these names to connect to Console. Refer to the following example cURL request that uses basic auth to retrieve the SANs in Console's cert: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/settings/certs_post.md b/openapi-specs/compute/32-03/desc/settings/certs_post.md index a6e429006..fb2cedee5 100644 --- a/openapi-specs/compute/32-03/desc/settings/certs_post.md +++ b/openapi-specs/compute/32-03/desc/settings/certs_post.md @@ -12,7 +12,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to add `node-01.example.com` to the `subjectAltName` field in the certificate: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/32-03/desc/settings/coderepos_get.md b/openapi-specs/compute/32-03/desc/settings/coderepos_get.md index 6cbfb78cb..286a8d905 100644 --- a/openapi-specs/compute/32-03/desc/settings/coderepos_get.md +++ b/openapi-specs/compute/32-03/desc/settings/coderepos_get.md @@ -20,7 +20,7 @@ Construct the full webhook using Console's publicly accessible DNS name or IP ad Refer to the following example cURL command that retrieves all code repositories to scan, as well as the webhook URL suffix: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/settings/console-certificate_post.md b/openapi-specs/compute/32-03/desc/settings/console-certificate_post.md index 5673af840..392061c8f 100644 --- a/openapi-specs/compute/32-03/desc/settings/console-certificate_post.md +++ b/openapi-specs/compute/32-03/desc/settings/console-certificate_post.md @@ -9,7 +9,7 @@ For the custom TLS certificate for securing browser access, this file must be in Refer to the following example cURL request that uses basic auth and configures the custom certificate to use for securing browser access to the console: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/settings/custom-labels_get.md b/openapi-specs/compute/32-03/desc/settings/custom-labels_get.md index a849dd8a8..19c1cadde 100644 --- a/openapi-specs/compute/32-03/desc/settings/custom-labels_get.md +++ b/openapi-specs/compute/32-03/desc/settings/custom-labels_get.md @@ -5,7 +5,7 @@ Returns the list of alert labels configured in Prisma Cloud Compute. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/settings/custom-labels_post.md b/openapi-specs/compute/32-03/desc/settings/custom-labels_post.md index 6bb66e706..9b0702fe8 100644 --- a/openapi-specs/compute/32-03/desc/settings/custom-labels_post.md +++ b/openapi-specs/compute/32-03/desc/settings/custom-labels_post.md @@ -5,7 +5,7 @@ Creates a custom alert label to augment audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/settings/defender_get.md b/openapi-specs/compute/32-03/desc/settings/defender_get.md index ecb8b6989..cf43bb304 100644 --- a/openapi-specs/compute/32-03/desc/settings/defender_get.md +++ b/openapi-specs/compute/32-03/desc/settings/defender_get.md @@ -5,7 +5,7 @@ Returns the advanced settings for Defenders. Refer to the following example cURL command that gets all advanced settings for Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/settings/forensic_get.md b/openapi-specs/compute/32-03/desc/settings/forensic_get.md index 9c16b70b9..3486b2bf9 100644 --- a/openapi-specs/compute/32-03/desc/settings/forensic_get.md +++ b/openapi-specs/compute/32-03/desc/settings/forensic_get.md @@ -1,7 +1,7 @@ Retrieves the settings for the forensics system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/settings/forensic_post.md b/openapi-specs/compute/32-03/desc/settings/forensic_post.md index 31f809d39..8943842fb 100644 --- a/openapi-specs/compute/32-03/desc/settings/forensic_post.md +++ b/openapi-specs/compute/32-03/desc/settings/forensic_post.md @@ -3,7 +3,7 @@ Configures the forensics system. The following example curl command allocates 100 MB of local disk space for container forensic data and 10 MB for host forensics data. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/settings/initialized_get.md b/openapi-specs/compute/32-03/desc/settings/initialized_get.md index 3134912d1..2af8462f1 100644 --- a/openapi-specs/compute/32-03/desc/settings/initialized_get.md +++ b/openapi-specs/compute/32-03/desc/settings/initialized_get.md @@ -4,7 +4,7 @@ After first installing Console, the first thing you must do is create an admin a Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/settings/intelligence-windows_post.md b/openapi-specs/compute/32-03/desc/settings/intelligence-windows_post.md index c39e256d2..0721dab3b 100644 --- a/openapi-specs/compute/32-03/desc/settings/intelligence-windows_post.md +++ b/openapi-specs/compute/32-03/desc/settings/intelligence-windows_post.md @@ -3,7 +3,7 @@ This endpoint will enable or disable the Windows Intelligence Service from **Man The following example curl command uses basic auth to enable online updates of Windows vulnerabilities from the intelligence stream: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/settings/intelligence_get.md b/openapi-specs/compute/32-03/desc/settings/intelligence_get.md index 26c694246..15e9f24ae 100644 --- a/openapi-specs/compute/32-03/desc/settings/intelligence_get.md +++ b/openapi-specs/compute/32-03/desc/settings/intelligence_get.md @@ -5,7 +5,7 @@ Returns the details about the Intelligence Stream configuration. Refer to the following example cURL command that uses basic auth to retrieve your Intelligence Stream configuration settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/settings/intelligence_post.md b/openapi-specs/compute/32-03/desc/settings/intelligence_post.md index 74b06a3a0..2dbbd0168 100644 --- a/openapi-specs/compute/32-03/desc/settings/intelligence_post.md +++ b/openapi-specs/compute/32-03/desc/settings/intelligence_post.md @@ -7,7 +7,7 @@ For more information, see [Intelligence Stream](https://docs.paloaltonetworks.co Refer to the following example cURL command that uses basic auth to configure settings of your Intelligence Stream. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/settings/latest-version_get.md b/openapi-specs/compute/32-03/desc/settings/latest-version_get.md index c443fa7b5..16601fb5b 100644 --- a/openapi-specs/compute/32-03/desc/settings/latest-version_get.md +++ b/openapi-specs/compute/32-03/desc/settings/latest-version_get.md @@ -3,7 +3,7 @@ Retrieves the version number of the latest available Prisma Cloud Compute releas Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/settings/latest_version_get.md b/openapi-specs/compute/32-03/desc/settings/latest_version_get.md index 18e436668..5c64edff1 100644 --- a/openapi-specs/compute/32-03/desc/settings/latest_version_get.md +++ b/openapi-specs/compute/32-03/desc/settings/latest_version_get.md @@ -1,7 +1,7 @@ This endpoint will return the latest version of the product. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/settings/ldap_get.md b/openapi-specs/compute/32-03/desc/settings/ldap_get.md index 4ad0ad0c9..7d803ba1c 100644 --- a/openapi-specs/compute/32-03/desc/settings/ldap_get.md +++ b/openapi-specs/compute/32-03/desc/settings/ldap_get.md @@ -5,7 +5,7 @@ Returns the LDAP integration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/settings/ldap_post.md b/openapi-specs/compute/32-03/desc/settings/ldap_post.md index c152c7dc5..34bc06ef4 100644 --- a/openapi-specs/compute/32-03/desc/settings/ldap_post.md +++ b/openapi-specs/compute/32-03/desc/settings/ldap_post.md @@ -7,7 +7,7 @@ For more information, see [Active Directory](https://docs.paloaltonetworks.com/p Refer to the following example cURL command that enables the LDAP integration and specifies the parameters required to integrate with an Active Directory service. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/settings/license_get.md b/openapi-specs/compute/32-03/desc/settings/license_get.md index 5c792cae8..2b4b548e3 100644 --- a/openapi-specs/compute/32-03/desc/settings/license_get.md +++ b/openapi-specs/compute/32-03/desc/settings/license_get.md @@ -5,7 +5,7 @@ Returns the details about the installed license. Refer to the following example cURL request that retrieves the license details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/settings/license_post.md b/openapi-specs/compute/32-03/desc/settings/license_post.md index b77800a5f..ce74b0d0f 100644 --- a/openapi-specs/compute/32-03/desc/settings/license_post.md +++ b/openapi-specs/compute/32-03/desc/settings/license_post.md @@ -8,7 +8,7 @@ For more information, see [Licensing](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to set your license: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/settings/logging_get.md b/openapi-specs/compute/32-03/desc/settings/logging_get.md index 6eda3e484..012be5def 100644 --- a/openapi-specs/compute/32-03/desc/settings/logging_get.md +++ b/openapi-specs/compute/32-03/desc/settings/logging_get.md @@ -5,7 +5,7 @@ Returns the logging settings. Refer to the following example cURL request that uses basic auth to retrieve your logging details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/settings/logging_post.md b/openapi-specs/compute/32-03/desc/settings/logging_post.md index 3619d9c0f..8d27ee1b3 100644 --- a/openapi-specs/compute/32-03/desc/settings/logging_post.md +++ b/openapi-specs/compute/32-03/desc/settings/logging_post.md @@ -8,7 +8,7 @@ For more information, see [Logging](https://docs.paloaltonetworks.com/prisma/pri Refer to the following example cURL request that enables verbose scan output for syslog and stdout: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/settings/logon_get.md b/openapi-specs/compute/32-03/desc/settings/logon_get.md index 1559f2405..b1e9164f2 100644 --- a/openapi-specs/compute/32-03/desc/settings/logon_get.md +++ b/openapi-specs/compute/32-03/desc/settings/logon_get.md @@ -5,7 +5,7 @@ Configures the logon settings. Refer to the following example cURL request that uses basic auth to retrieve all current logon settings. ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/settings/logon_post.md b/openapi-specs/compute/32-03/desc/settings/logon_post.md index 5c2b60c9f..691e082fe 100644 --- a/openapi-specs/compute/32-03/desc/settings/logon_post.md +++ b/openapi-specs/compute/32-03/desc/settings/logon_post.md @@ -7,7 +7,7 @@ For more information, see [Logon Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that uses basic auth to set the timeout to 900 seconds (15 minutes): ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/32-03/desc/settings/oauth_get.md b/openapi-specs/compute/32-03/desc/settings/oauth_get.md index 6dcf70fb5..5d997f016 100644 --- a/openapi-specs/compute/32-03/desc/settings/oauth_get.md +++ b/openapi-specs/compute/32-03/desc/settings/oauth_get.md @@ -5,7 +5,7 @@ Returns the OAuth configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/settings/oauth_post.md b/openapi-specs/compute/32-03/desc/settings/oauth_post.md index c593b9237..da3c83d2f 100644 --- a/openapi-specs/compute/32-03/desc/settings/oauth_post.md +++ b/openapi-specs/compute/32-03/desc/settings/oauth_post.md @@ -7,7 +7,7 @@ For more information, see [GitHub OAuth](https://docs.paloaltonetworks.com/prism Refer to the following example cURL response: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/settings/oidc_get.md b/openapi-specs/compute/32-03/desc/settings/oidc_get.md index ee439622b..1f27f93ba 100644 --- a/openapi-specs/compute/32-03/desc/settings/oidc_get.md +++ b/openapi-specs/compute/32-03/desc/settings/oidc_get.md @@ -5,7 +5,7 @@ Returns the OpenID Connect configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/settings/oidc_post.md b/openapi-specs/compute/32-03/desc/settings/oidc_post.md index e0270247e..5bd3a9192 100644 --- a/openapi-specs/compute/32-03/desc/settings/oidc_post.md +++ b/openapi-specs/compute/32-03/desc/settings/oidc_post.md @@ -7,7 +7,7 @@ For more information, see [OIDC](https://docs.paloaltonetworks.com/prisma/prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/settings/pcf_get.md b/openapi-specs/compute/32-03/desc/settings/pcf_get.md index 5dc21eb17..c5e42a823 100644 --- a/openapi-specs/compute/32-03/desc/settings/pcf_get.md +++ b/openapi-specs/compute/32-03/desc/settings/pcf_get.md @@ -3,7 +3,7 @@ This endpoint will return settings for PCF (Pivotal Cloud Foundry)Blobstore scan The following example curl command uses basic auth to retrieve the current PCF Blobstore scanning settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/settings/pcf_post.md b/openapi-specs/compute/32-03/desc/settings/pcf_post.md index 139e947cb..657e14f27 100644 --- a/openapi-specs/compute/32-03/desc/settings/pcf_post.md +++ b/openapi-specs/compute/32-03/desc/settings/pcf_post.md @@ -3,7 +3,7 @@ This endpoint will allow for updating settings for PCF (Pivotal Cloud Foundry) B The following example curl command uses basic auth to set up a PCF Blobstore scanner that scans the last `5` droplets for every droplet in the PCF Blobstore: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/settings/projects_get.md b/openapi-specs/compute/32-03/desc/settings/projects_get.md index f5dd20395..bc95414a1 100644 --- a/openapi-specs/compute/32-03/desc/settings/projects_get.md +++ b/openapi-specs/compute/32-03/desc/settings/projects_get.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command retrieves the state of the Projects feature from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ All API calls must be proxied through Central Console, where the request is auto To retrieve the Projects settings from a supervisor Console, append the `project` query parameter to your request. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/settings/projects_post.md b/openapi-specs/compute/32-03/desc/settings/projects_post.md index d29f8e9d5..b3472e6b9 100644 --- a/openapi-specs/compute/32-03/desc/settings/projects_post.md +++ b/openapi-specs/compute/32-03/desc/settings/projects_post.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command designates `` as master. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/settings/proxy_get.md b/openapi-specs/compute/32-03/desc/settings/proxy_get.md index 9a4922d59..477563069 100644 --- a/openapi-specs/compute/32-03/desc/settings/proxy_get.md +++ b/openapi-specs/compute/32-03/desc/settings/proxy_get.md @@ -5,7 +5,7 @@ Returns the proxy settings for Prisma Cloud Compute containers to access the Int Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/settings/proxy_post.md b/openapi-specs/compute/32-03/desc/settings/proxy_post.md index a1bdc07ed..df926524e 100644 --- a/openapi-specs/compute/32-03/desc/settings/proxy_post.md +++ b/openapi-specs/compute/32-03/desc/settings/proxy_post.md @@ -7,7 +7,7 @@ For more information, see [Proxy Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that specifies the proxy to use to access the Internet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/settings/registry_get.md b/openapi-specs/compute/32-03/desc/settings/registry_get.md index 12745005d..64e70b698 100644 --- a/openapi-specs/compute/32-03/desc/settings/registry_get.md +++ b/openapi-specs/compute/32-03/desc/settings/registry_get.md @@ -17,7 +17,7 @@ Construct the full webhook using the publicly accessible DNS name or IP address, The following cURL command retrieves all the registries to scan and the URL suffix for the registry's webhook URL suffix. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/settings/registry_post.md b/openapi-specs/compute/32-03/desc/settings/registry_post.md index 0fae2c481..f9ff1b8e6 100644 --- a/openapi-specs/compute/32-03/desc/settings/registry_post.md +++ b/openapi-specs/compute/32-03/desc/settings/registry_post.md @@ -30,7 +30,7 @@ The API response returns an HTTP 400 error, if the number of registry specificat Refer to the following example cURL command that configures Prisma Cloud Compute to scan the Ubuntu 16.04 repository on Docker Hub: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -64,7 +64,7 @@ To add settings for a GitLab Container Registry, you must specify the following Refer to the following example cURL command: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/settings/registry_put.md b/openapi-specs/compute/32-03/desc/settings/registry_put.md index 3768914f6..75d6c79a2 100644 --- a/openapi-specs/compute/32-03/desc/settings/registry_put.md +++ b/openapi-specs/compute/32-03/desc/settings/registry_put.md @@ -127,7 +127,7 @@ To remove a registry from the list: To delete all entries, submit an empty `specifications` array. For example: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-03/desc/settings/saml_get.md b/openapi-specs/compute/32-03/desc/settings/saml_get.md index f2228a440..4fb940e80 100644 --- a/openapi-specs/compute/32-03/desc/settings/saml_get.md +++ b/openapi-specs/compute/32-03/desc/settings/saml_get.md @@ -5,7 +5,7 @@ Returns the configured SAML settings that is used to authenticate to the Prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/settings/saml_post.md b/openapi-specs/compute/32-03/desc/settings/saml_post.md index 0bd9c4a25..dfe8d380f 100644 --- a/openapi-specs/compute/32-03/desc/settings/saml_post.md +++ b/openapi-specs/compute/32-03/desc/settings/saml_post.md @@ -7,7 +7,7 @@ For more information, see [Okta via SAML 2.0](https://docs.paloaltonetworks.com/ Refer to the following example cURL request that uses the basic auth to set up and enable the SAML integration with Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/settings/scan_get.md b/openapi-specs/compute/32-03/desc/settings/scan_get.md index 5c1df30a2..543ea7662 100644 --- a/openapi-specs/compute/32-03/desc/settings/scan_get.md +++ b/openapi-specs/compute/32-03/desc/settings/scan_get.md @@ -5,7 +5,7 @@ Returns the global settings for image, host, container, and registry scanning. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/settings/scan_post.md b/openapi-specs/compute/32-03/desc/settings/scan_post.md index f043d1c9f..9ddb521a2 100644 --- a/openapi-specs/compute/32-03/desc/settings/scan_post.md +++ b/openapi-specs/compute/32-03/desc/settings/scan_post.md @@ -9,7 +9,7 @@ Refer to the following example cURL request that configures the following scan i * Scan images, containers, and hosts once per day. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/settings/secrets_get.md b/openapi-specs/compute/32-03/desc/settings/secrets_get.md index 75e2b32c7..339009641 100644 --- a/openapi-specs/compute/32-03/desc/settings/secrets_get.md +++ b/openapi-specs/compute/32-03/desc/settings/secrets_get.md @@ -3,7 +3,7 @@ This endpoint will return configured secret store already configured in the cons The following example curl command retrieves any configured secret stores, as well as the refresh period in hours: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/settings/secrets_post.md b/openapi-specs/compute/32-03/desc/settings/secrets_post.md index d302ecdf8..730d031bf 100644 --- a/openapi-specs/compute/32-03/desc/settings/secrets_post.md +++ b/openapi-specs/compute/32-03/desc/settings/secrets_post.md @@ -5,7 +5,7 @@ Please note the data structure returned from endpoint /settings/secrets GET to s Refer to the following example curl command that adds a CyberArk secret store to the console with the appID set to `Prisma_Cloud_Compute_Console` and set the URL to `https://services-myca.twistlock.com:10882`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/settings/serverless-scan_get.md b/openapi-specs/compute/32-03/desc/settings/serverless-scan_get.md index bb8ce06ba..eb42e4a12 100644 --- a/openapi-specs/compute/32-03/desc/settings/serverless-scan_get.md +++ b/openapi-specs/compute/32-03/desc/settings/serverless-scan_get.md @@ -8,7 +8,7 @@ This endpoint maps to the **Function scope** table data in the **Defend > Vulner Refer to the following example cURL command that retrieves a list of serverless scan scopes: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/settings/serverless_get.md b/openapi-specs/compute/32-03/desc/settings/serverless_get.md index b6122c460..8c654807c 100644 --- a/openapi-specs/compute/32-03/desc/settings/serverless_get.md +++ b/openapi-specs/compute/32-03/desc/settings/serverless_get.md @@ -3,7 +3,7 @@ This endpoint will return any configured serverless function scanners found in * The following example curl command uses basic auth to retrieve serverless settings in an array, sorted by Cloud Provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/settings/serverless_post.md b/openapi-specs/compute/32-03/desc/settings/serverless_post.md index 6e26ea1d3..c0e0f3225 100644 --- a/openapi-specs/compute/32-03/desc/settings/serverless_post.md +++ b/openapi-specs/compute/32-03/desc/settings/serverless_post.md @@ -3,7 +3,7 @@ This endpoint will add serverless function providers to scan for vulnerabilities The following example curl command uses basic auth to add a serverless account to scan for serverless functions. This is assuming that you already have the [credential](https://docs.twistlock.com/docs/latest/configure/credentials_store.html) added to the console that is needed to scan that provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/settings/system_get.md b/openapi-specs/compute/32-03/desc/settings/system_get.md index 6f893abf0..0e8a3cba3 100644 --- a/openapi-specs/compute/32-03/desc/settings/system_get.md +++ b/openapi-specs/compute/32-03/desc/settings/system_get.md @@ -3,7 +3,7 @@ This endpoint will return all system settings in JSON format. The following example curl command does exactly that: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/settings/tas_get.md b/openapi-specs/compute/32-03/desc/settings/tas_get.md index 52f392433..d2d0017f0 100644 --- a/openapi-specs/compute/32-03/desc/settings/tas_get.md +++ b/openapi-specs/compute/32-03/desc/settings/tas_get.md @@ -5,7 +5,7 @@ Retrieves Tanzu Application Service (TAS) settings. Refer to the following example cURL command that retrieves all TAS settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/settings/telemetry_get.md b/openapi-specs/compute/32-03/desc/settings/telemetry_get.md index 6460c3fc3..46a807e77 100644 --- a/openapi-specs/compute/32-03/desc/settings/telemetry_get.md +++ b/openapi-specs/compute/32-03/desc/settings/telemetry_get.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that retrieves the settings if telemetry is enabled or not: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/settings/telemetry_post.md b/openapi-specs/compute/32-03/desc/settings/telemetry_post.md index bc97a6d0f..662846f33 100644 --- a/openapi-specs/compute/32-03/desc/settings/telemetry_post.md +++ b/openapi-specs/compute/32-03/desc/settings/telemetry_post.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to turn off telemetry: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/settings/trusted_certificate_post.md b/openapi-specs/compute/32-03/desc/settings/trusted_certificate_post.md index 5a2a30bda..c54b96fa5 100644 --- a/openapi-specs/compute/32-03/desc/settings/trusted_certificate_post.md +++ b/openapi-specs/compute/32-03/desc/settings/trusted_certificate_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/trusted-certificates` endpoint. Refer to the following example cURL request that uses basic auth to add a certificate to the list: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/32-03/desc/settings/trusted_certificates_post.md b/openapi-specs/compute/32-03/desc/settings/trusted_certificates_post.md index 78c07982b..e9bdc72a1 100644 --- a/openapi-specs/compute/32-03/desc/settings/trusted_certificates_post.md +++ b/openapi-specs/compute/32-03/desc/settings/trusted_certificates_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/certificates` endpoint. Refer to the following example cURL request that uses basic auth to enable this feature: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/32-03/desc/settings/vm_get.md b/openapi-specs/compute/32-03/desc/settings/vm_get.md index 8043742f5..b98b94240 100644 --- a/openapi-specs/compute/32-03/desc/settings/vm_get.md +++ b/openapi-specs/compute/32-03/desc/settings/vm_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **VM images scope** table data in the **Defend > Vulne Refer to the following example cURL command that retrieves all the scopes used for pattern matching on VM functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/signup/post.md b/openapi-specs/compute/32-03/desc/signup/post.md index 1db21df29..67344a0b1 100644 --- a/openapi-specs/compute/32-03/desc/signup/post.md +++ b/openapi-specs/compute/32-03/desc/signup/post.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i The following cURL command creates the initial admin user with the username `admin` and password `password`. ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -X POST \ -d '{"username": "admin", "password": "password"}' \ diff --git a/openapi-specs/compute/32-03/desc/static/capabilities_get.md b/openapi-specs/compute/32-03/desc/static/capabilities_get.md index ea119d2a9..f9b60278c 100644 --- a/openapi-specs/compute/32-03/desc/static/capabilities_get.md +++ b/openapi-specs/compute/32-03/desc/static/capabilities_get.md @@ -1,7 +1,7 @@ Returns a list of capabilities used in host models. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/static/regions_get.md b/openapi-specs/compute/32-03/desc/static/regions_get.md index 4a07097ee..3b1adb5f1 100644 --- a/openapi-specs/compute/32-03/desc/static/regions_get.md +++ b/openapi-specs/compute/32-03/desc/static/regions_get.md @@ -1,7 +1,7 @@ Returns a list of regions used in cloud radar. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/static/syscalls_get.md b/openapi-specs/compute/32-03/desc/static/syscalls_get.md index 9e2ddcde7..09505ba39 100644 --- a/openapi-specs/compute/32-03/desc/static/syscalls_get.md +++ b/openapi-specs/compute/32-03/desc/static/syscalls_get.md @@ -2,7 +2,7 @@ Returns a list of the Linux kernel system calls. Runtime rules for containers can allow-list and deny-list specific system calls. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/static/vulnerabilities_get.md b/openapi-specs/compute/32-03/desc/static/vulnerabilities_get.md index cb6acab28..19809472b 100644 --- a/openapi-specs/compute/32-03/desc/static/vulnerabilities_get.md +++ b/openapi-specs/compute/32-03/desc/static/vulnerabilities_get.md @@ -3,7 +3,7 @@ This data can be used for building out reports with the API. This data can be correlated with the `/api/v1/images` endpoint, specifically the the `complianceVulnerabilities` and `cveVulnerabilities` objects, to generate more thorough reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/stats/compliance.md b/openapi-specs/compute/32-03/desc/stats/compliance.md index 5c5be3991..4f4c90071 100644 --- a/openapi-specs/compute/32-03/desc/stats/compliance.md +++ b/openapi-specs/compute/32-03/desc/stats/compliance.md @@ -5,7 +5,7 @@ For the current day, the response will also include detailed compliance stats fo The following example command that uses curl and basic auth to retrieve compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/stats/compliance_get.md b/openapi-specs/compute/32-03/desc/stats/compliance_get.md index 314f6a179..2ef2f9f75 100644 --- a/openapi-specs/compute/32-03/desc/stats/compliance_get.md +++ b/openapi-specs/compute/32-03/desc/stats/compliance_get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Compliance > Compliance explorer* Refer to the following example cURL command that retrieves compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/stats/compliance_refresh.md b/openapi-specs/compute/32-03/desc/stats/compliance_refresh.md index b75491a69..d8ce211a8 100644 --- a/openapi-specs/compute/32-03/desc/stats/compliance_refresh.md +++ b/openapi-specs/compute/32-03/desc/stats/compliance_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/compliance endpoint return The following example command that uses curl and basic auth to refresh compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/stats/compliance_refresh_post.md b/openapi-specs/compute/32-03/desc/stats/compliance_refresh_post.md index 541a54d16..0f329d1db 100644 --- a/openapi-specs/compute/32-03/desc/stats/compliance_refresh_post.md +++ b/openapi-specs/compute/32-03/desc/stats/compliance_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/compliance`, b Refer to the following example cURL command that refreshes compliance statistics for the current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/stats/daily.md b/openapi-specs/compute/32-03/desc/stats/daily.md index 082f58a27..9fd4c6138 100644 --- a/openapi-specs/compute/32-03/desc/stats/daily.md +++ b/openapi-specs/compute/32-03/desc/stats/daily.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/stats/daily_get.md b/openapi-specs/compute/32-03/desc/stats/daily_get.md index 0db89bdc3..fe852126c 100644 --- a/openapi-specs/compute/32-03/desc/stats/daily_get.md +++ b/openapi-specs/compute/32-03/desc/stats/daily_get.md @@ -3,7 +3,7 @@ Returns a historical list of per-day statistics for the resources protected by P The following example command uses curl and basic auth to retrieve the daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/stats/dashboard.md b/openapi-specs/compute/32-03/desc/stats/dashboard.md index be90a2d32..1e5fabf08 100644 --- a/openapi-specs/compute/32-03/desc/stats/dashboard.md +++ b/openapi-specs/compute/32-03/desc/stats/dashboard.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/stats/dashboard_get.md b/openapi-specs/compute/32-03/desc/stats/dashboard_get.md index 601769645..8f0bc827c 100644 --- a/openapi-specs/compute/32-03/desc/stats/dashboard_get.md +++ b/openapi-specs/compute/32-03/desc/stats/dashboard_get.md @@ -5,7 +5,7 @@ Returns statistics about the resources protected by Prisma Cloud Compute, includ Refer to the following example cURL command that retrieves dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/stats/events_get.md b/openapi-specs/compute/32-03/desc/stats/events_get.md index 3be5eb4e7..e64f98e57 100644 --- a/openapi-specs/compute/32-03/desc/stats/events_get.md +++ b/openapi-specs/compute/32-03/desc/stats/events_get.md @@ -5,7 +5,7 @@ Returns events statistics for your environment. Refer to the following example cURL command retrieves event stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/stats/vulnerabilities.md b/openapi-specs/compute/32-03/desc/stats/vulnerabilities.md index 40c4dd1f1..199cfab62 100644 --- a/openapi-specs/compute/32-03/desc/stats/vulnerabilities.md +++ b/openapi-specs/compute/32-03/desc/stats/vulnerabilities.md @@ -5,7 +5,7 @@ For the current day, the response will also include descriptions of the CVEs cur The following example command that uses curl and basic auth to retrieve vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/stats/vulnerabilities_download_get.md b/openapi-specs/compute/32-03/desc/stats/vulnerabilities_download_get.md index 753af8c7f..9930a636b 100644 --- a/openapi-specs/compute/32-03/desc/stats/vulnerabilities_download_get.md +++ b/openapi-specs/compute/32-03/desc/stats/vulnerabilities_download_get.md @@ -17,7 +17,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a summary count of the CVEs and detailed descriptions for each CVE in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/stats/vulnerabilities_get.md b/openapi-specs/compute/32-03/desc/stats/vulnerabilities_get.md index 1a6f1c152..aaa5a907b 100644 --- a/openapi-specs/compute/32-03/desc/stats/vulnerabilities_get.md +++ b/openapi-specs/compute/32-03/desc/stats/vulnerabilities_get.md @@ -19,7 +19,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a summary count of the CVEs and detailed descriptions for each CVE: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/stats/vulnerabilities_impacted_resources_download_get.md b/openapi-specs/compute/32-03/desc/stats/vulnerabilities_impacted_resources_download_get.md index 0821d6a9f..502c09a6c 100644 --- a/openapi-specs/compute/32-03/desc/stats/vulnerabilities_impacted_resources_download_get.md +++ b/openapi-specs/compute/32-03/desc/stats/vulnerabilities_impacted_resources_download_get.md @@ -15,7 +15,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a list of impacted resources for `CVE-2015-0313` in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/stats/vulnerabilities_impacted_resources_get.md b/openapi-specs/compute/32-03/desc/stats/vulnerabilities_impacted_resources_get.md index c1e6d0ba2..014a5f4a2 100644 --- a/openapi-specs/compute/32-03/desc/stats/vulnerabilities_impacted_resources_get.md +++ b/openapi-specs/compute/32-03/desc/stats/vulnerabilities_impacted_resources_get.md @@ -18,7 +18,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a list of impacted resources for `CVE-2022-28391`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -95,7 +95,7 @@ Refer to the following example JSON response that shows the risk tree for the im Refer to the following example cURL command that retrieves a the impacted registry images `CVE-2015-0313` by using an optional query parameter `resourceType`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -108,7 +108,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a paginated list of impacted resources for `CVE-2015-0313` by using optional query parameters `limit` and `offset`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/stats/vulnerabilities_refresh.md b/openapi-specs/compute/32-03/desc/stats/vulnerabilities_refresh.md index 505a99d98..2aa7da8a1 100644 --- a/openapi-specs/compute/32-03/desc/stats/vulnerabilities_refresh.md +++ b/openapi-specs/compute/32-03/desc/stats/vulnerabilities_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/vulnerabilities endpoint r The following example command that uses curl and basic auth to refresh vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/stats/vulnerabilities_refresh_post.md b/openapi-specs/compute/32-03/desc/stats/vulnerabilities_refresh_post.md index 1e3210e18..85e3ddd7a 100644 --- a/openapi-specs/compute/32-03/desc/stats/vulnerabilities_refresh_post.md +++ b/openapi-specs/compute/32-03/desc/stats/vulnerabilities_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/vulnerabilitie Refer to the following example cURL command that refreshes the vulnerability statistics for current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/stats/workload_get.md b/openapi-specs/compute/32-03/desc/stats/workload_get.md index a25deed5c..940a835ee 100644 --- a/openapi-specs/compute/32-03/desc/stats/workload_get.md +++ b/openapi-specs/compute/32-03/desc/stats/workload_get.md @@ -1,7 +1,7 @@ Returns the workload statistics from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/statuses/intelligence.md b/openapi-specs/compute/32-03/desc/statuses/intelligence.md index 74da8c7ff..ac102e81f 100644 --- a/openapi-specs/compute/32-03/desc/statuses/intelligence.md +++ b/openapi-specs/compute/32-03/desc/statuses/intelligence.md @@ -3,7 +3,7 @@ Returns the connection status of the intelligence stream and the last intelligen The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/statuses/intelligence_get.md b/openapi-specs/compute/32-03/desc/statuses/intelligence_get.md index c18dd9611..b5f620ad9 100644 --- a/openapi-specs/compute/32-03/desc/statuses/intelligence_get.md +++ b/openapi-specs/compute/32-03/desc/statuses/intelligence_get.md @@ -3,7 +3,7 @@ Returns the connection status for the Intelligence Stream, along with the time o The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/statuses/registry_get.md b/openapi-specs/compute/32-03/desc/statuses/registry_get.md index 427c4915c..e4fd09fe9 100644 --- a/openapi-specs/compute/32-03/desc/statuses/registry_get.md +++ b/openapi-specs/compute/32-03/desc/statuses/registry_get.md @@ -13,7 +13,7 @@ To view the more details about the progress of a regular or on-demand registry s Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/statuses/secrets_get.md b/openapi-specs/compute/32-03/desc/statuses/secrets_get.md index 510f15161..e77c5ed70 100644 --- a/openapi-specs/compute/32-03/desc/statuses/secrets_get.md +++ b/openapi-specs/compute/32-03/desc/statuses/secrets_get.md @@ -3,7 +3,7 @@ Returns the connection status of any secret stores you have configured, as well The following is an example curl using basic auth to find the secret store status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/statuses/serverless-radar_get.md b/openapi-specs/compute/32-03/desc/statuses/serverless-radar_get.md index 3bfdbb5bf..4ab5d0c1d 100644 --- a/openapi-specs/compute/32-03/desc/statuses/serverless-radar_get.md +++ b/openapi-specs/compute/32-03/desc/statuses/serverless-radar_get.md @@ -1,7 +1,7 @@ Returns the status of the serverless scans. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/tags/get.md b/openapi-specs/compute/32-03/desc/tags/get.md index 6da7ad135..604eee98e 100644 --- a/openapi-specs/compute/32-03/desc/tags/get.md +++ b/openapi-specs/compute/32-03/desc/tags/get.md @@ -5,7 +5,7 @@ Retrieves a list of tags. Refer to the following example cURL command that retrieves a list of tags: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/tags/name_delete.md b/openapi-specs/compute/32-03/desc/tags/name_delete.md index 2ed010e57..6dedfce8f 100644 --- a/openapi-specs/compute/32-03/desc/tags/name_delete.md +++ b/openapi-specs/compute/32-03/desc/tags/name_delete.md @@ -5,7 +5,7 @@ Deletes a tag from the system. Refer to the following example cURL command that deletes a tag named *my tag*: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-03/desc/tags/name_put.md b/openapi-specs/compute/32-03/desc/tags/name_put.md index cbaea40d3..a5923b8ef 100644 --- a/openapi-specs/compute/32-03/desc/tags/name_put.md +++ b/openapi-specs/compute/32-03/desc/tags/name_put.md @@ -9,7 +9,7 @@ You must define all parameters in your PUT request. Refer to the following example cURL command that updates the parameters in a tag named `my_tag`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-03/desc/tags/post.md b/openapi-specs/compute/32-03/desc/tags/post.md index d55ae8b96..8e1a493d6 100644 --- a/openapi-specs/compute/32-03/desc/tags/post.md +++ b/openapi-specs/compute/32-03/desc/tags/post.md @@ -8,7 +8,7 @@ You can use tags as policy exceptions or assign them to vulnerabilities for acti Refer to the following example cURL command that creates a tag named "my-tag": ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/tags/tag_cve_delete.md b/openapi-specs/compute/32-03/desc/tags/tag_cve_delete.md index 8caed79cf..3031029b9 100644 --- a/openapi-specs/compute/32-03/desc/tags/tag_cve_delete.md +++ b/openapi-specs/compute/32-03/desc/tags/tag_cve_delete.md @@ -6,7 +6,7 @@ When you delete a tag, the tag is deleted from a wider scope. All the packages a Refer to the following example cURL command that removes the tag named `ignored` from the CVE `CVE-2017-15088`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-03/desc/tags/tag_cve_post.md b/openapi-specs/compute/32-03/desc/tags/tag_cve_post.md index 966a80bd8..1b4ead89b 100644 --- a/openapi-specs/compute/32-03/desc/tags/tag_cve_post.md +++ b/openapi-specs/compute/32-03/desc/tags/tag_cve_post.md @@ -45,7 +45,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the source package `perl`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -72,7 +72,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2021-20305` on the binary package `gnutls`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -98,7 +98,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -120,7 +120,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `image` and to all the packages and resources. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -140,7 +140,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `host`, resource `servo-vmware71`, and to all the packages. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/tas-droplets/download_get.md b/openapi-specs/compute/32-03/desc/tas-droplets/download_get.md index 6372f0b35..f9d82820d 100644 --- a/openapi-specs/compute/32-03/desc/tas-droplets/download_get.md +++ b/openapi-specs/compute/32-03/desc/tas-droplets/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > VMware The following cURL command downloads all TAS droplets to a CSV file called `tas_droplets.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/tas-droplets/get.md b/openapi-specs/compute/32-03/desc/tas-droplets/get.md index dd2b44993..a0a97e8ca 100644 --- a/openapi-specs/compute/32-03/desc/tas-droplets/get.md +++ b/openapi-specs/compute/32-03/desc/tas-droplets/get.md @@ -10,7 +10,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > VMware Tanzu bl The following cURL command retrieves all TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/tas-droplets/get_tas_addresses.md b/openapi-specs/compute/32-03/desc/tas-droplets/get_tas_addresses.md index 91ebb2e50..04c6dccb0 100644 --- a/openapi-specs/compute/32-03/desc/tas-droplets/get_tas_addresses.md +++ b/openapi-specs/compute/32-03/desc/tas-droplets/get_tas_addresses.md @@ -9,7 +9,7 @@ You get an HTTP error response 429 if the limit exceeds. The following cURL command retrieves the Cloud Controller Addresses of scanned TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/tas-droplets/progress_get.md b/openapi-specs/compute/32-03/desc/tas-droplets/progress_get.md index 504a21e84..507d001bf 100644 --- a/openapi-specs/compute/32-03/desc/tas-droplets/progress_get.md +++ b/openapi-specs/compute/32-03/desc/tas-droplets/progress_get.md @@ -5,7 +5,7 @@ Returns the details of the TAS Droplets ongoing scan. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/tas-droplets/scan_post.md b/openapi-specs/compute/32-03/desc/tas-droplets/scan_post.md index aad2174af..13c4eeeb9 100644 --- a/openapi-specs/compute/32-03/desc/tas-droplets/scan_post.md +++ b/openapi-specs/compute/32-03/desc/tas-droplets/scan_post.md @@ -5,7 +5,7 @@ Scans the TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/tas-droplets/stop_post.md b/openapi-specs/compute/32-03/desc/tas-droplets/stop_post.md index 5f5a019b1..53d709ec7 100644 --- a/openapi-specs/compute/32-03/desc/tas-droplets/stop_post.md +++ b/openapi-specs/compute/32-03/desc/tas-droplets/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing scan of TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/trust/data_get.md b/openapi-specs/compute/32-03/desc/trust/data_get.md index dd55d47a3..88983f139 100644 --- a/openapi-specs/compute/32-03/desc/trust/data_get.md +++ b/openapi-specs/compute/32-03/desc/trust/data_get.md @@ -5,7 +5,7 @@ Returns the trusted registries, repositories, and images. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/trust/data_put.md b/openapi-specs/compute/32-03/desc/trust/data_put.md index 0e6a0ba49..733514505 100644 --- a/openapi-specs/compute/32-03/desc/trust/data_put.md +++ b/openapi-specs/compute/32-03/desc/trust/data_put.md @@ -6,7 +6,7 @@ Specify trusted images using either the image name or layers properties. Refer to the following example cURL command that uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -19,7 +19,7 @@ To edit a trust group based on image base layers, use PUT to specify a list of S Refer to the following example that specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-03/desc/trust/get.md b/openapi-specs/compute/32-03/desc/trust/get.md index 1226cd0a3..57ff5bdb5 100644 --- a/openapi-specs/compute/32-03/desc/trust/get.md +++ b/openapi-specs/compute/32-03/desc/trust/get.md @@ -3,7 +3,7 @@ Retrieves a list of all trusted images. The following example curl command uses basic auth to retrieve all trusted images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/trust/id_delete.md b/openapi-specs/compute/32-03/desc/trust/id_delete.md index b3114775f..d63cdf71a 100644 --- a/openapi-specs/compute/32-03/desc/trust/id_delete.md +++ b/openapi-specs/compute/32-03/desc/trust/id_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to specify a image trust grou ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-03/desc/trust/id_put.md b/openapi-specs/compute/32-03/desc/trust/id_put.md index 44d2c8b8b..c98617bcd 100644 --- a/openapi-specs/compute/32-03/desc/trust/id_put.md +++ b/openapi-specs/compute/32-03/desc/trust/id_put.md @@ -9,7 +9,7 @@ For more information about handles, see the `_id` in the response body for the G The following example curl command uses basic auth to modify the image property for an existing trusted image entry, where the handle for the entry is `docker-ubuntu-group`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-03/desc/trust/learn_get.md b/openapi-specs/compute/32-03/desc/trust/learn_get.md index d8a3414d0..004b16b02 100644 --- a/openapi-specs/compute/32-03/desc/trust/learn_get.md +++ b/openapi-specs/compute/32-03/desc/trust/learn_get.md @@ -1,7 +1,7 @@ Returns the state of the trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/trust/learn_post.md b/openapi-specs/compute/32-03/desc/trust/learn_post.md index 094817738..008657fa2 100644 --- a/openapi-specs/compute/32-03/desc/trust/learn_post.md +++ b/openapi-specs/compute/32-03/desc/trust/learn_post.md @@ -1,7 +1,7 @@ Sets the state of trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/trust/post.md b/openapi-specs/compute/32-03/desc/trust/post.md index 1072275a1..23a324c6c 100644 --- a/openapi-specs/compute/32-03/desc/trust/post.md +++ b/openapi-specs/compute/32-03/desc/trust/post.md @@ -7,7 +7,7 @@ For more information about handles, see the `_id` key in the response body for t The following example curl command uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ To create a trust group based on image base layers, POST a list of SHA256 hashes The following example specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/users/get.md b/openapi-specs/compute/32-03/desc/users/get.md index e4e6966ec..cd5a661ba 100644 --- a/openapi-specs/compute/32-03/desc/users/get.md +++ b/openapi-specs/compute/32-03/desc/users/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Manage > Authentication > Users** in the Console UI. The following cURL command retrieves all users. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/users/id_delete.md b/openapi-specs/compute/32-03/desc/users/id_delete.md index 1cfa5642d..66a1102f9 100644 --- a/openapi-specs/compute/32-03/desc/users/id_delete.md +++ b/openapi-specs/compute/32-03/desc/users/id_delete.md @@ -17,7 +17,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes user `ID` from the system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-03/desc/util/osx_twistcli_arm64_get.md b/openapi-specs/compute/32-03/desc/util/osx_twistcli_arm64_get.md index b385d0d3b..a30686374 100644 --- a/openapi-specs/compute/32-03/desc/util/osx_twistcli_arm64_get.md +++ b/openapi-specs/compute/32-03/desc/util/osx_twistcli_arm64_get.md @@ -7,7 +7,7 @@ Downloads the twistcli binary executable for MacOS platforms based on ARM64 arch Refer to the following example cURL command that downloads and saves the “twistcli” binary executable for ARM64 bit MacOS platforms to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/compute/32-03/desc/util/osx_twistcli_get.md b/openapi-specs/compute/32-03/desc/util/osx_twistcli_get.md index c49f96c41..2353ea338 100644 --- a/openapi-specs/compute/32-03/desc/util/osx_twistcli_get.md +++ b/openapi-specs/compute/32-03/desc/util/osx_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **MacOS platform** hyperlink in **Manage > System > Ut The following cURL command downloads the twistcli binary executable for MacOS platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli \ diff --git a/openapi-specs/compute/32-03/desc/util/twistcli_arm64_get.md b/openapi-specs/compute/32-03/desc/util/twistcli_arm64_get.md index 7ec36d3f5..a3d7318ab 100644 --- a/openapi-specs/compute/32-03/desc/util/twistcli_arm64_get.md +++ b/openapi-specs/compute/32-03/desc/util/twistcli_arm64_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/compute/32-03/desc/util/twistcli_get.md b/openapi-specs/compute/32-03/desc/util/twistcli_get.md index f9d2d295c..08a3ae8aa 100644 --- a/openapi-specs/compute/32-03/desc/util/twistcli_get.md +++ b/openapi-specs/compute/32-03/desc/util/twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -X GET -o \ 'https:///api/v/util/twistcli' diff --git a/openapi-specs/compute/32-03/desc/util/twistlock_jenkins_plugin_get.md b/openapi-specs/compute/32-03/desc/util/twistlock_jenkins_plugin_get.md index 9fb8d4a02..c9f180e5e 100644 --- a/openapi-specs/compute/32-03/desc/util/twistlock_jenkins_plugin_get.md +++ b/openapi-specs/compute/32-03/desc/util/twistlock_jenkins_plugin_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-jenkins-plugin.hpi \ diff --git a/openapi-specs/compute/32-03/desc/util/twistlock_tas_tile_get.md b/openapi-specs/compute/32-03/desc/util/twistlock_tas_tile_get.md index fea28aaad..3fd114e2d 100644 --- a/openapi-specs/compute/32-03/desc/util/twistlock_tas_tile_get.md +++ b/openapi-specs/compute/32-03/desc/util/twistlock_tas_tile_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-tile.pivotal \ diff --git a/openapi-specs/compute/32-03/desc/util/windows_twistcli_get.md b/openapi-specs/compute/32-03/desc/util/windows_twistcli_get.md index 1c545dbbb..38c609b08 100644 --- a/openapi-specs/compute/32-03/desc/util/windows_twistcli_get.md +++ b/openapi-specs/compute/32-03/desc/util/windows_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Windows platform** hyperlink in **Manage > System > The following cURL command downloads the twistcli binary executable for Windows platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli.exe \ diff --git a/openapi-specs/compute/32-03/desc/version/get.md b/openapi-specs/compute/32-03/desc/version/get.md index 28be315e0..5787e90fd 100644 --- a/openapi-specs/compute/32-03/desc/version/get.md +++ b/openapi-specs/compute/32-03/desc/version/get.md @@ -5,7 +5,7 @@ Retrieves the version number for Console. The following cURL command retrieves the version number for Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/vms/download_get.md b/openapi-specs/compute/32-03/desc/vms/download_get.md index e65e4efc9..3cc813bc5 100644 --- a/openapi-specs/compute/32-03/desc/vms/download_get.md +++ b/openapi-specs/compute/32-03/desc/vms/download_get.md @@ -7,7 +7,7 @@ Returns all VM image scan reports in CSV format. Refer to the following example cURL command that retrieves all VM image scan reports and saves the results in a CSV file called `vm_images_scan.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/vms/get.md b/openapi-specs/compute/32-03/desc/vms/get.md index d44d9d801..ad9938124 100644 --- a/openapi-specs/compute/32-03/desc/vms/get.md +++ b/openapi-specs/compute/32-03/desc/vms/get.md @@ -10,7 +10,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > Hosts > VM imag Refer to the following example cURL command that retrieves all VM image scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/vms/labels_get.md b/openapi-specs/compute/32-03/desc/vms/labels_get.md index ad678b30d..eb2674bf6 100644 --- a/openapi-specs/compute/32-03/desc/vms/labels_get.md +++ b/openapi-specs/compute/32-03/desc/vms/labels_get.md @@ -5,7 +5,7 @@ Returns an array of strings containing all AWS tags of the scanned VM images. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-03/desc/vms/names_get.md b/openapi-specs/compute/32-03/desc/vms/names_get.md index 0283ed28e..0b905c37b 100644 --- a/openapi-specs/compute/32-03/desc/vms/names_get.md +++ b/openapi-specs/compute/32-03/desc/vms/names_get.md @@ -6,7 +6,7 @@ Returns an array of strings containing VM image names. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-03/desc/vms/scan_post.md b/openapi-specs/compute/32-03/desc/vms/scan_post.md index 1caa2dcaf..4d4de3ab1 100644 --- a/openapi-specs/compute/32-03/desc/vms/scan_post.md +++ b/openapi-specs/compute/32-03/desc/vms/scan_post.md @@ -5,7 +5,7 @@ Re-scans all VM images immediately. This endpoint returns the time that the scan Refer to the following example cURL command that forces Prisma Cloud to re-scan all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-03/desc/vms/stop_post.md b/openapi-specs/compute/32-03/desc/vms/stop_post.md index 4a74743eb..49b2b26f9 100644 --- a/openapi-specs/compute/32-03/desc/vms/stop_post.md +++ b/openapi-specs/compute/32-03/desc/vms/stop_post.md @@ -7,7 +7,7 @@ Note: It might take a few minutes for the scan to stop completely. Refer to the following example cURL command that forces Prisma Cloud to stop scanning all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/SCAP/get.md b/openapi-specs/compute/32-04/desc/SCAP/get.md index a25abe94e..f5870d822 100644 --- a/openapi-specs/compute/32-04/desc/SCAP/get.md +++ b/openapi-specs/compute/32-04/desc/SCAP/get.md @@ -3,7 +3,7 @@ This endpoint will return any SCAP datastreams uploaded to the console. This end The following is an example curl command that uses basic auth to retrieve any uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/SCAP/id_delete.md b/openapi-specs/compute/32-04/desc/SCAP/id_delete.md index 39f1b0132..52923f20a 100644 --- a/openapi-specs/compute/32-04/desc/SCAP/id_delete.md +++ b/openapi-specs/compute/32-04/desc/SCAP/id_delete.md @@ -3,7 +3,7 @@ This endpoint will delete any SCAP datastreams uploaded to the console. You can The following is an example curl command that uses basic auth to delete an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-04/desc/SCAP/post.md b/openapi-specs/compute/32-04/desc/SCAP/post.md index d459a0e97..c45fd6b4e 100644 --- a/openapi-specs/compute/32-04/desc/SCAP/post.md +++ b/openapi-specs/compute/32-04/desc/SCAP/post.md @@ -3,7 +3,7 @@ This endpoint will allow you to add a SCAP datastream to the console. The following is an example curl command that uses basic auth to add an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/_ping/get.md b/openapi-specs/compute/32-04/desc/_ping/get.md index 8e143ef67..b7ffdc653 100644 --- a/openapi-specs/compute/32-04/desc/_ping/get.md +++ b/openapi-specs/compute/32-04/desc/_ping/get.md @@ -5,7 +5,7 @@ Checks if Console is reachable from your network host. Refer to the following cURL example command that pings Console and prints the HTTP response code: ```bash -$ curl -k \ +$ curl \ -s \ -o /dev/null \ -w "%{http_code}\n" \ diff --git a/openapi-specs/compute/32-04/desc/agentless/get_agentless_progress.md b/openapi-specs/compute/32-04/desc/agentless/get_agentless_progress.md index b98ed9da5..78396eec6 100644 --- a/openapi-specs/compute/32-04/desc/agentless/get_agentless_progress.md +++ b/openapi-specs/compute/32-04/desc/agentless/get_agentless_progress.md @@ -5,7 +5,7 @@ Shows the progress of an ongoing scan on hosts or containers for vulnerabilities Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/agentless/post_agentless_scan.md b/openapi-specs/compute/32-04/desc/agentless/post_agentless_scan.md index f1295cdc4..e2f8a4e11 100644 --- a/openapi-specs/compute/32-04/desc/agentless/post_agentless_scan.md +++ b/openapi-specs/compute/32-04/desc/agentless/post_agentless_scan.md @@ -9,7 +9,7 @@ Make sure that you download (use the agentless/templates API) and apply the perm Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/agentless/post_agentless_stop.md b/openapi-specs/compute/32-04/desc/agentless/post_agentless_stop.md index ab83960cc..ddee6ec7a 100644 --- a/openapi-specs/compute/32-04/desc/agentless/post_agentless_stop.md +++ b/openapi-specs/compute/32-04/desc/agentless/post_agentless_stop.md @@ -5,7 +5,7 @@ Stops an ongoing scan on hosts or containers for vulnerabilities and compliance. Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/agentless/post_agentless_templates.md b/openapi-specs/compute/32-04/desc/agentless/post_agentless_templates.md index 96be32555..5159c439a 100644 --- a/openapi-specs/compute/32-04/desc/agentless/post_agentless_templates.md +++ b/openapi-specs/compute/32-04/desc/agentless/post_agentless_templates.md @@ -31,7 +31,7 @@ Add the supported cloud accounts (AWS, Azure, GCP, and OCI) in Prisma Cloud Comp Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/alert-profiles/get.md b/openapi-specs/compute/32-04/desc/alert-profiles/get.md index 82647e248..f17191ac4 100644 --- a/openapi-specs/compute/32-04/desc/alert-profiles/get.md +++ b/openapi-specs/compute/32-04/desc/alert-profiles/get.md @@ -3,7 +3,7 @@ Retrieve a list of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/alert-profiles/id_delete.md b/openapi-specs/compute/32-04/desc/alert-profiles/id_delete.md index 1a67fe20e..2cf21b57e 100644 --- a/openapi-specs/compute/32-04/desc/alert-profiles/id_delete.md +++ b/openapi-specs/compute/32-04/desc/alert-profiles/id_delete.md @@ -5,7 +5,7 @@ This method has no response data. The following example curl command deletes an existing alert profile named `PROFILE-NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-04/desc/alert-profiles/names_get.md b/openapi-specs/compute/32-04/desc/alert-profiles/names_get.md index cac14437b..38a1f78ca 100644 --- a/openapi-specs/compute/32-04/desc/alert-profiles/names_get.md +++ b/openapi-specs/compute/32-04/desc/alert-profiles/names_get.md @@ -3,7 +3,7 @@ Retrieve a list of only the names of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles' names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/alert-profiles/post.md b/openapi-specs/compute/32-04/desc/alert-profiles/post.md index 9fa643429..19db863d5 100644 --- a/openapi-specs/compute/32-04/desc/alert-profiles/post.md +++ b/openapi-specs/compute/32-04/desc/alert-profiles/post.md @@ -3,7 +3,7 @@ Update an existing alert profile created in the system. The following example curl command uses basic auth to add a Jira Alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/alert-profiles/test_post.md b/openapi-specs/compute/32-04/desc/alert-profiles/test_post.md index 1fc745efa..2205a6e73 100644 --- a/openapi-specs/compute/32-04/desc/alert-profiles/test_post.md +++ b/openapi-specs/compute/32-04/desc/alert-profiles/test_post.md @@ -3,7 +3,7 @@ Sends a test alert to verify successful configuration of the alert profile setti The following example curl command uses basic auth to send test alert for an email alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/audits/access_delete.md b/openapi-specs/compute/32-04/desc/audits/access_delete.md index 37f33ca64..0450b534c 100644 --- a/openapi-specs/compute/32-04/desc/audits/access_delete.md +++ b/openapi-specs/compute/32-04/desc/audits/access_delete.md @@ -2,7 +2,7 @@ Deletes **all** access audits. This deletion cannot be undone. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-04/desc/audits/access_download_get.md b/openapi-specs/compute/32-04/desc/audits/access_download_get.md index 1700deb8d..8d8fee259 100644 --- a/openapi-specs/compute/32-04/desc/audits/access_download_get.md +++ b/openapi-specs/compute/32-04/desc/audits/access_download_get.md @@ -3,7 +3,7 @@ Returns the docker access audit events data in CSV format that are logged and ag **Note**: You can download the access events from Console under **Monitor > Events > Docker audits > Download CSV**. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/access_filters_get.md b/openapi-specs/compute/32-04/desc/audits/access_filters_get.md index 00ac061c1..4b8e9cd9b 100644 --- a/openapi-specs/compute/32-04/desc/audits/access_filters_get.md +++ b/openapi-specs/compute/32-04/desc/audits/access_filters_get.md @@ -5,7 +5,7 @@ The following example uses basic auth to list history of commands that are run o ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ The following command gives list of sudo events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -27,7 +27,7 @@ $ curl -k \ The following command gives list of SSHD events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/access_get.md b/openapi-specs/compute/32-04/desc/audits/access_get.md index 2401391c7..56e53fe12 100644 --- a/openapi-specs/compute/32-04/desc/audits/access_get.md +++ b/openapi-specs/compute/32-04/desc/audits/access_get.md @@ -8,7 +8,7 @@ You can configure Prisma Cloud Compute to log and aggregate events such as sudo Refer to the following example cURL command that gives a list of all access audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/admission_download_get.md b/openapi-specs/compute/32-04/desc/audits/admission_download_get.md index 9571c483f..d45f47c4e 100644 --- a/openapi-specs/compute/32-04/desc/audits/admission_download_get.md +++ b/openapi-specs/compute/32-04/desc/audits/admission_download_get.md @@ -4,7 +4,7 @@ Returns the access admission events data in CSV format that were alerted or bloc Refer to the following example cURL command that downloads the admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/admission_get.md b/openapi-specs/compute/32-04/desc/audits/admission_get.md index 84414496c..3640c737c 100644 --- a/openapi-specs/compute/32-04/desc/audits/admission_get.md +++ b/openapi-specs/compute/32-04/desc/audits/admission_get.md @@ -4,7 +4,7 @@ Returns all activities that were alerted or blocked by Defender functioning as O Refer to the following example cURL command that gives a list of all admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/firewall_network_container_download_get.md b/openapi-specs/compute/32-04/desc/audits/firewall_network_container_download_get.md index 29029ac6d..434e09acd 100644 --- a/openapi-specs/compute/32-04/desc/audits/firewall_network_container_download_get.md +++ b/openapi-specs/compute/32-04/desc/audits/firewall_network_container_download_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/firewall_network_container_get.md b/openapi-specs/compute/32-04/desc/audits/firewall_network_container_get.md index 454558a44..be03b2c45 100644 --- a/openapi-specs/compute/32-04/desc/audits/firewall_network_container_get.md +++ b/openapi-specs/compute/32-04/desc/audits/firewall_network_container_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/firewall_network_host_download_get.md b/openapi-specs/compute/32-04/desc/audits/firewall_network_host_download_get.md index 768dd00d7..e83e8e1c3 100644 --- a/openapi-specs/compute/32-04/desc/audits/firewall_network_host_download_get.md +++ b/openapi-specs/compute/32-04/desc/audits/firewall_network_host_download_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/firewall_network_host_get.md b/openapi-specs/compute/32-04/desc/audits/firewall_network_host_get.md index e5dc4c399..6cbda0d4b 100644 --- a/openapi-specs/compute/32-04/desc/audits/firewall_network_host_get.md +++ b/openapi-specs/compute/32-04/desc/audits/firewall_network_host_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/incidents_archive_patch.md b/openapi-specs/compute/32-04/desc/audits/incidents_archive_patch.md index a1127a001..d1f42eedd 100644 --- a/openapi-specs/compute/32-04/desc/audits/incidents_archive_patch.md +++ b/openapi-specs/compute/32-04/desc/audits/incidents_archive_patch.md @@ -7,7 +7,7 @@ You can get an incident ID from the list of incidents using the endpoint GET /ap Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/compute/32-04/desc/audits/incidents_download_get.md b/openapi-specs/compute/32-04/desc/audits/incidents_download_get.md index 2266c3471..5958756bf 100644 --- a/openapi-specs/compute/32-04/desc/audits/incidents_download_get.md +++ b/openapi-specs/compute/32-04/desc/audits/incidents_download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the **CSV** hyperlink in **Monitor > Runtime > Incident ex The following cURL command downloads all incidents and saves the result in a CSV file called `incidents.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/incidents_filters_get.md b/openapi-specs/compute/32-04/desc/audits/incidents_filters_get.md index 7d1c6f303..856881c90 100644 --- a/openapi-specs/compute/32-04/desc/audits/incidents_filters_get.md +++ b/openapi-specs/compute/32-04/desc/audits/incidents_filters_get.md @@ -3,7 +3,7 @@ This endpoint lists the incident categories found in your environment. The following example lists incident filters. ```bash -$ curl -k \ +$ curl \ -u \ https://console:8083/api/v1/audits/incidents/filters ``` diff --git a/openapi-specs/compute/32-04/desc/audits/incidents_get.md b/openapi-specs/compute/32-04/desc/audits/incidents_get.md index 7724a08c1..9b9451821 100644 --- a/openapi-specs/compute/32-04/desc/audits/incidents_get.md +++ b/openapi-specs/compute/32-04/desc/audits/incidents_get.md @@ -9,7 +9,7 @@ This endpoint maps to the table in **Monitor > Runtime > Incident explorer** in Refer to the following example cURL command that retrieves a list of unacknowledged incidents (not in the archived state): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/kubernetes_download_get.md b/openapi-specs/compute/32-04/desc/audits/kubernetes_download_get.md index 6008bd92a..62992095c 100644 --- a/openapi-specs/compute/32-04/desc/audits/kubernetes_download_get.md +++ b/openapi-specs/compute/32-04/desc/audits/kubernetes_download_get.md @@ -7,7 +7,7 @@ Returns the audit events data that occur in an integrated Kubernetes cluster tha Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/kubernetes_get.md b/openapi-specs/compute/32-04/desc/audits/kubernetes_get.md index e1ecb8a88..2e3f51b71 100644 --- a/openapi-specs/compute/32-04/desc/audits/kubernetes_get.md +++ b/openapi-specs/compute/32-04/desc/audits/kubernetes_get.md @@ -7,7 +7,7 @@ Retrieves events that occur in an integrated Kubernetes cluster that you configu Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/mgmt_download_get.md b/openapi-specs/compute/32-04/desc/audits/mgmt_download_get.md index ae3ef45b6..bcee17342 100644 --- a/openapi-specs/compute/32-04/desc/audits/mgmt_download_get.md +++ b/openapi-specs/compute/32-04/desc/audits/mgmt_download_get.md @@ -10,7 +10,7 @@ Management audits are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/mgmt_filters_get.md b/openapi-specs/compute/32-04/desc/audits/mgmt_filters_get.md index 854977b99..f910a4c2a 100644 --- a/openapi-specs/compute/32-04/desc/audits/mgmt_filters_get.md +++ b/openapi-specs/compute/32-04/desc/audits/mgmt_filters_get.md @@ -6,7 +6,7 @@ Use these filters to query management audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/mgmt_get.md b/openapi-specs/compute/32-04/desc/audits/mgmt_get.md index 5b586cb5e..abe802348 100644 --- a/openapi-specs/compute/32-04/desc/audits/mgmt_get.md +++ b/openapi-specs/compute/32-04/desc/audits/mgmt_get.md @@ -10,7 +10,7 @@ Management audit events are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/runtime_app_embedded_download_get.md b/openapi-specs/compute/32-04/desc/audits/runtime_app_embedded_download_get.md index f3d844ead..ec5ae0f2a 100644 --- a/openapi-specs/compute/32-04/desc/audits/runtime_app_embedded_download_get.md +++ b/openapi-specs/compute/32-04/desc/audits/runtime_app_embedded_download_get.md @@ -5,7 +5,7 @@ Returns the app-embedded runtime audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/runtime_app_embedded_get.md b/openapi-specs/compute/32-04/desc/audits/runtime_app_embedded_get.md index c1d72acfa..51a43b7f5 100644 --- a/openapi-specs/compute/32-04/desc/audits/runtime_app_embedded_get.md +++ b/openapi-specs/compute/32-04/desc/audits/runtime_app_embedded_get.md @@ -5,7 +5,7 @@ Retrieves all app-embedded runtime audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/runtime_container_delete.md b/openapi-specs/compute/32-04/desc/audits/runtime_container_delete.md index ddc8e82d6..62050c71f 100644 --- a/openapi-specs/compute/32-04/desc/audits/runtime_container_delete.md +++ b/openapi-specs/compute/32-04/desc/audits/runtime_container_delete.md @@ -3,7 +3,7 @@ Deletes all container runtime audits. The following example curl command uses basic auth to delete all the audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-04/desc/audits/runtime_container_download_get.md b/openapi-specs/compute/32-04/desc/audits/runtime_container_download_get.md index 20e673b5e..81286d929 100644 --- a/openapi-specs/compute/32-04/desc/audits/runtime_container_download_get.md +++ b/openapi-specs/compute/32-04/desc/audits/runtime_container_download_get.md @@ -6,7 +6,7 @@ Returns the container audit events data in CSV format when a runtime sensor such Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o \ diff --git a/openapi-specs/compute/32-04/desc/audits/runtime_container_get.md b/openapi-specs/compute/32-04/desc/audits/runtime_container_get.md index 11beffb24..a6b6ba484 100644 --- a/openapi-specs/compute/32-04/desc/audits/runtime_container_get.md +++ b/openapi-specs/compute/32-04/desc/audits/runtime_container_get.md @@ -7,7 +7,7 @@ Retrieves all container audit events when a runtime sensor such as process, netw Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/runtime_container_timeslice_get.md b/openapi-specs/compute/32-04/desc/audits/runtime_container_timeslice_get.md index f65d477af..01df48f28 100644 --- a/openapi-specs/compute/32-04/desc/audits/runtime_container_timeslice_get.md +++ b/openapi-specs/compute/32-04/desc/audits/runtime_container_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/runtime_file-integrity_download_get.md b/openapi-specs/compute/32-04/desc/audits/runtime_file-integrity_download_get.md index 99ec70c52..234c3ce32 100644 --- a/openapi-specs/compute/32-04/desc/audits/runtime_file-integrity_download_get.md +++ b/openapi-specs/compute/32-04/desc/audits/runtime_file-integrity_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for file-integrity checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/runtime_file-integrity_get.md b/openapi-specs/compute/32-04/desc/audits/runtime_file-integrity_get.md index 53fec9f9f..c31904422 100644 --- a/openapi-specs/compute/32-04/desc/audits/runtime_file-integrity_get.md +++ b/openapi-specs/compute/32-04/desc/audits/runtime_file-integrity_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for file-integrity checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/runtime_host_delete.md b/openapi-specs/compute/32-04/desc/audits/runtime_host_delete.md index 0ab1c877e..2ada9b15a 100644 --- a/openapi-specs/compute/32-04/desc/audits/runtime_host_delete.md +++ b/openapi-specs/compute/32-04/desc/audits/runtime_host_delete.md @@ -3,7 +3,7 @@ Deletes all host audits from the database. The following example curl command uses basic auth to delete all host audits: ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/audits/runtime/host diff --git a/openapi-specs/compute/32-04/desc/audits/runtime_host_download_get.md b/openapi-specs/compute/32-04/desc/audits/runtime_host_download_get.md index 4d0454f56..d85cc39d0 100644 --- a/openapi-specs/compute/32-04/desc/audits/runtime_host_download_get.md +++ b/openapi-specs/compute/32-04/desc/audits/runtime_host_download_get.md @@ -5,7 +5,7 @@ Returns the runtime host audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/runtime_host_get.md b/openapi-specs/compute/32-04/desc/audits/runtime_host_get.md index 044b8b42d..e063550d6 100644 --- a/openapi-specs/compute/32-04/desc/audits/runtime_host_get.md +++ b/openapi-specs/compute/32-04/desc/audits/runtime_host_get.md @@ -5,7 +5,7 @@ Retrieves the runtime host audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/runtime_host_timeslice_get.md b/openapi-specs/compute/32-04/desc/audits/runtime_host_timeslice_get.md index 8933efa74..aafd869b8 100644 --- a/openapi-specs/compute/32-04/desc/audits/runtime_host_timeslice_get.md +++ b/openapi-specs/compute/32-04/desc/audits/runtime_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/runtime_log-inspection_download_get.md b/openapi-specs/compute/32-04/desc/audits/runtime_log-inspection_download_get.md index f047ed96f..0aa1a5710 100644 --- a/openapi-specs/compute/32-04/desc/audits/runtime_log-inspection_download_get.md +++ b/openapi-specs/compute/32-04/desc/audits/runtime_log-inspection_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for log inspection checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/runtime_log-inspection_get.md b/openapi-specs/compute/32-04/desc/audits/runtime_log-inspection_get.md index 49f0d7be4..8292b623e 100644 --- a/openapi-specs/compute/32-04/desc/audits/runtime_log-inspection_get.md +++ b/openapi-specs/compute/32-04/desc/audits/runtime_log-inspection_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for log inspection checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/runtime_rasp_delete.md b/openapi-specs/compute/32-04/desc/audits/runtime_rasp_delete.md index 688e04038..14315c55b 100644 --- a/openapi-specs/compute/32-04/desc/audits/runtime_rasp_delete.md +++ b/openapi-specs/compute/32-04/desc/audits/runtime_rasp_delete.md @@ -1,7 +1,7 @@ Deletes all RASP Defender runtime audits. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-04/desc/audits/runtime_rasp_download_get.md b/openapi-specs/compute/32-04/desc/audits/runtime_rasp_download_get.md index 303c75858..11a85100d 100644 --- a/openapi-specs/compute/32-04/desc/audits/runtime_rasp_download_get.md +++ b/openapi-specs/compute/32-04/desc/audits/runtime_rasp_download_get.md @@ -1,7 +1,7 @@ Returns CSV data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/runtime_rasp_get.md b/openapi-specs/compute/32-04/desc/audits/runtime_rasp_get.md index 229d908b1..0475cb149 100644 --- a/openapi-specs/compute/32-04/desc/audits/runtime_rasp_get.md +++ b/openapi-specs/compute/32-04/desc/audits/runtime_rasp_get.md @@ -1,7 +1,7 @@ Returns JSON data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/runtime_serverless_delete.md b/openapi-specs/compute/32-04/desc/audits/runtime_serverless_delete.md index 99ada0515..e27ebe858 100644 --- a/openapi-specs/compute/32-04/desc/audits/runtime_serverless_delete.md +++ b/openapi-specs/compute/32-04/desc/audits/runtime_serverless_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to delete the current audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-04/desc/audits/runtime_serverless_download_get.md b/openapi-specs/compute/32-04/desc/audits/runtime_serverless_download_get.md index f829d2342..91693c145 100644 --- a/openapi-specs/compute/32-04/desc/audits/runtime_serverless_download_get.md +++ b/openapi-specs/compute/32-04/desc/audits/runtime_serverless_download_get.md @@ -5,7 +5,7 @@ Returns the scan audit events data in CSV format for any configured serverless f Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/runtime_serverless_filters_get.md b/openapi-specs/compute/32-04/desc/audits/runtime_serverless_filters_get.md index b9bf38610..babda78dd 100644 --- a/openapi-specs/compute/32-04/desc/audits/runtime_serverless_filters_get.md +++ b/openapi-specs/compute/32-04/desc/audits/runtime_serverless_filters_get.md @@ -2,7 +2,7 @@ Returns all serverless filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/runtime_serverless_get.md b/openapi-specs/compute/32-04/desc/audits/runtime_serverless_get.md index 045946886..f6aeb748e 100644 --- a/openapi-specs/compute/32-04/desc/audits/runtime_serverless_get.md +++ b/openapi-specs/compute/32-04/desc/audits/runtime_serverless_get.md @@ -5,7 +5,7 @@ Retrieves all scan events for any configured serverless functions in Prisma Clou Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/runtime_serverless_timeslice_get.md b/openapi-specs/compute/32-04/desc/audits/runtime_serverless_timeslice_get.md index 863890174..a2456cec0 100644 --- a/openapi-specs/compute/32-04/desc/audits/runtime_serverless_timeslice_get.md +++ b/openapi-specs/compute/32-04/desc/audits/runtime_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/trust_delete.md b/openapi-specs/compute/32-04/desc/audits/trust_delete.md index 0bfb2bd81..4aaeef3fe 100644 --- a/openapi-specs/compute/32-04/desc/audits/trust_delete.md +++ b/openapi-specs/compute/32-04/desc/audits/trust_delete.md @@ -1,7 +1,7 @@ Deletes all the trust audits from the events page in Console. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-04/desc/audits/trust_download_get.md b/openapi-specs/compute/32-04/desc/audits/trust_download_get.md index 21c0e55a2..234089449 100644 --- a/openapi-specs/compute/32-04/desc/audits/trust_download_get.md +++ b/openapi-specs/compute/32-04/desc/audits/trust_download_get.md @@ -5,7 +5,7 @@ Returns the trust audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/trust_get.md b/openapi-specs/compute/32-04/desc/audits/trust_get.md index 8fb3a341d..de7d47e96 100644 --- a/openapi-specs/compute/32-04/desc/audits/trust_get.md +++ b/openapi-specs/compute/32-04/desc/audits/trust_get.md @@ -4,7 +4,7 @@ Retrieves all the trust audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/waas_agentless_download_get.md b/openapi-specs/compute/32-04/desc/audits/waas_agentless_download_get.md index bbfcd12f5..f930ef6b3 100644 --- a/openapi-specs/compute/32-04/desc/audits/waas_agentless_download_get.md +++ b/openapi-specs/compute/32-04/desc/audits/waas_agentless_download_get.md @@ -7,7 +7,7 @@ Returns the agentless Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/waas_agentless_get.md b/openapi-specs/compute/32-04/desc/audits/waas_agentless_get.md index ad40ae497..b257b0385 100644 --- a/openapi-specs/compute/32-04/desc/audits/waas_agentless_get.md +++ b/openapi-specs/compute/32-04/desc/audits/waas_agentless_get.md @@ -7,7 +7,7 @@ Retrieves all agentless Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/waas_agentless_timeslice_get.md b/openapi-specs/compute/32-04/desc/audits/waas_agentless_timeslice_get.md index 007c6dba3..3eaf34b25 100644 --- a/openapi-specs/compute/32-04/desc/audits/waas_agentless_timeslice_get.md +++ b/openapi-specs/compute/32-04/desc/audits/waas_agentless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/waas_app_embedded_download_get.md b/openapi-specs/compute/32-04/desc/audits/waas_app_embedded_download_get.md index 149c10376..c94aa87b0 100644 --- a/openapi-specs/compute/32-04/desc/audits/waas_app_embedded_download_get.md +++ b/openapi-specs/compute/32-04/desc/audits/waas_app_embedded_download_get.md @@ -6,7 +6,7 @@ Returns the app-embedded WAAS audit events data in CSV format for the specified Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/waas_app_embedded_get.md b/openapi-specs/compute/32-04/desc/audits/waas_app_embedded_get.md index 400fa447d..6318fb299 100644 --- a/openapi-specs/compute/32-04/desc/audits/waas_app_embedded_get.md +++ b/openapi-specs/compute/32-04/desc/audits/waas_app_embedded_get.md @@ -6,7 +6,7 @@ Returns all app-embedded WAAS audit events for the specified query parameters. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/waas_app_embedded_timeslice_get.md b/openapi-specs/compute/32-04/desc/audits/waas_app_embedded_timeslice_get.md index 79a60038e..42a76d08c 100644 --- a/openapi-specs/compute/32-04/desc/audits/waas_app_embedded_timeslice_get.md +++ b/openapi-specs/compute/32-04/desc/audits/waas_app_embedded_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the app-embedded WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/waas_container_download_get.md b/openapi-specs/compute/32-04/desc/audits/waas_container_download_get.md index 9a5e04fad..7d26c34f4 100644 --- a/openapi-specs/compute/32-04/desc/audits/waas_container_download_get.md +++ b/openapi-specs/compute/32-04/desc/audits/waas_container_download_get.md @@ -6,7 +6,7 @@ Returns the container Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that downloads the WAAS container audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/waas_container_get.md b/openapi-specs/compute/32-04/desc/audits/waas_container_get.md index ac0df80fd..c1ad08f3c 100644 --- a/openapi-specs/compute/32-04/desc/audits/waas_container_get.md +++ b/openapi-specs/compute/32-04/desc/audits/waas_container_get.md @@ -6,7 +6,7 @@ Retrieves all container Web-Application and API Security (WAAS) audits. Refer to the following example cURL command that retrieves all container WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/waas_container_timeslice_get.md b/openapi-specs/compute/32-04/desc/audits/waas_container_timeslice_get.md index a56b4c48f..be56260d6 100644 --- a/openapi-specs/compute/32-04/desc/audits/waas_container_timeslice_get.md +++ b/openapi-specs/compute/32-04/desc/audits/waas_container_timeslice_get.md @@ -11,7 +11,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the container WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s):: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/waas_host_download_get.md b/openapi-specs/compute/32-04/desc/audits/waas_host_download_get.md index 4bc66202b..71692e682 100644 --- a/openapi-specs/compute/32-04/desc/audits/waas_host_download_get.md +++ b/openapi-specs/compute/32-04/desc/audits/waas_host_download_get.md @@ -7,7 +7,7 @@ Returns the host Web-Application and API Security (WAAS) audit events data in CS Refer to the following example cURL command that downloads the host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/waas_host_get.md b/openapi-specs/compute/32-04/desc/audits/waas_host_get.md index 14c967594..f6e3df050 100644 --- a/openapi-specs/compute/32-04/desc/audits/waas_host_get.md +++ b/openapi-specs/compute/32-04/desc/audits/waas_host_get.md @@ -7,7 +7,7 @@ Retrieves all host Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/waas_host_timeslice_get.md b/openapi-specs/compute/32-04/desc/audits/waas_host_timeslice_get.md index e28ed7b7a..67b3a54c3 100644 --- a/openapi-specs/compute/32-04/desc/audits/waas_host_timeslice_get.md +++ b/openapi-specs/compute/32-04/desc/audits/waas_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves host WAAS audit events for a specific time frame: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/waas_serverless_download_get.md b/openapi-specs/compute/32-04/desc/audits/waas_serverless_download_get.md index da05504df..0c0dbe698 100644 --- a/openapi-specs/compute/32-04/desc/audits/waas_serverless_download_get.md +++ b/openapi-specs/compute/32-04/desc/audits/waas_serverless_download_get.md @@ -7,7 +7,7 @@ Returns the serverless function Web-Application and API Security (WAAS) audit ev Refer to the following example cURL command that downloads the serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/waas_serverless_get.md b/openapi-specs/compute/32-04/desc/audits/waas_serverless_get.md index fe482a3f3..82488f7ee 100644 --- a/openapi-specs/compute/32-04/desc/audits/waas_serverless_get.md +++ b/openapi-specs/compute/32-04/desc/audits/waas_serverless_get.md @@ -7,7 +7,7 @@ Retrieves all serverless function Web-Application and API Security (WAAS) audit Refer to the following example cURL command that retrieves all serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/audits/waas_serverless_timeslice_get.md b/openapi-specs/compute/32-04/desc/audits/waas_serverless_timeslice_get.md index ec9ff3df1..a0a9a1368 100644 --- a/openapi-specs/compute/32-04/desc/audits/waas_serverless_timeslice_get.md +++ b/openapi-specs/compute/32-04/desc/audits/waas_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the serverless WAAS audit events for a : ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/authenticate-client/post.md b/openapi-specs/compute/32-04/desc/authenticate-client/post.md index bc493d04e..ce6f00afe 100644 --- a/openapi-specs/compute/32-04/desc/authenticate-client/post.md +++ b/openapi-specs/compute/32-04/desc/authenticate-client/post.md @@ -8,7 +8,7 @@ This endpoint checks the supplied client certificate and authorizes the user bas Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X POST \ --cert \ https:///api/v/authenticate-client diff --git a/openapi-specs/compute/32-04/desc/authenticate/post.md b/openapi-specs/compute/32-04/desc/authenticate/post.md index cb018de64..4f85c5d34 100644 --- a/openapi-specs/compute/32-04/desc/authenticate/post.md +++ b/openapi-specs/compute/32-04/desc/authenticate/post.md @@ -9,7 +9,7 @@ You can set the validity period in Console under **Manage > Authentication > Log Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H "Content-Type: application/json" \ -X POST \ -d \ diff --git a/openapi-specs/compute/32-04/desc/authenticate/renew_get.md b/openapi-specs/compute/32-04/desc/authenticate/renew_get.md index 6040d58e1..3458b500a 100644 --- a/openapi-specs/compute/32-04/desc/authenticate/renew_get.md +++ b/openapi-specs/compute/32-04/desc/authenticate/renew_get.md @@ -5,7 +5,7 @@ Renews an old (unexpired) access token and returns a new token. The following cURL command retrieves a new access token using an old access token. ```bash -$ curl -k \ +$ curl \ -H "Authorization: Bearer " \ https:///api/v1/authenticate/renew ``` diff --git a/openapi-specs/compute/32-04/desc/certs/capem_get.md b/openapi-specs/compute/32-04/desc/certs/capem_get.md index f0f0f1bf3..945476c9b 100644 --- a/openapi-specs/compute/32-04/desc/certs/capem_get.md +++ b/openapi-specs/compute/32-04/desc/certs/capem_get.md @@ -5,7 +5,7 @@ Retrieves the Base64-encoded SSL root certificate self-signed by primary certifi Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/certs/client-certs_get.md b/openapi-specs/compute/32-04/desc/certs/client-certs_get.md index d099b3e3d..279d196b1 100644 --- a/openapi-specs/compute/32-04/desc/certs/client-certs_get.md +++ b/openapi-specs/compute/32-04/desc/certs/client-certs_get.md @@ -3,7 +3,7 @@ Downloads a script that installs a client certificate, client private key, and c The following example curl command uses basic auth to download and run the install script for your client certs: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/certs/client-certs.sh | sh diff --git a/openapi-specs/compute/32-04/desc/certs/server-certs_get.md b/openapi-specs/compute/32-04/desc/certs/server-certs_get.md index 0bb13f51d..118a4d9b0 100644 --- a/openapi-specs/compute/32-04/desc/certs/server-certs_get.md +++ b/openapi-specs/compute/32-04/desc/certs/server-certs_get.md @@ -12,7 +12,7 @@ Retrieves the server certificate bundle from Prisma Cloud Compute that contains Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -u \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/cloud/compliance_download_get.md b/openapi-specs/compute/32-04/desc/cloud/compliance_download_get.md index 7b1ec9fea..14f2725b1 100644 --- a/openapi-specs/compute/32-04/desc/cloud/compliance_download_get.md +++ b/openapi-specs/compute/32-04/desc/cloud/compliance_download_get.md @@ -2,7 +2,7 @@ Download all cloud scan data in CSV format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/cloud/compliance_get.md b/openapi-specs/compute/32-04/desc/cloud/compliance_get.md index 48c2fe5bb..ad47e0998 100644 --- a/openapi-specs/compute/32-04/desc/cloud/compliance_get.md +++ b/openapi-specs/compute/32-04/desc/cloud/compliance_get.md @@ -2,7 +2,7 @@ Returns a list of all cloud compliance scan results. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/cloud/compliance_scan_post.md b/openapi-specs/compute/32-04/desc/cloud/compliance_scan_post.md index 7f87bf1f4..7321c3b9d 100644 --- a/openapi-specs/compute/32-04/desc/cloud/compliance_scan_post.md +++ b/openapi-specs/compute/32-04/desc/cloud/compliance_scan_post.md @@ -2,7 +2,7 @@ Initiates a new cloud compliance scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/cloud/compliance_stop_post.md b/openapi-specs/compute/32-04/desc/cloud/compliance_stop_post.md index df0febb56..60c31dc51 100644 --- a/openapi-specs/compute/32-04/desc/cloud/compliance_stop_post.md +++ b/openapi-specs/compute/32-04/desc/cloud/compliance_stop_post.md @@ -2,7 +2,7 @@ Terminates a cloud compliance scan that's in progress.. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/cloud/discovery_download_get.md b/openapi-specs/compute/32-04/desc/cloud/discovery_download_get.md index 44d60a113..a667c8471 100644 --- a/openapi-specs/compute/32-04/desc/cloud/discovery_download_get.md +++ b/openapi-specs/compute/32-04/desc/cloud/discovery_download_get.md @@ -5,7 +5,7 @@ Downloads all cloud scan data in a CSV file. Refer to the following cURL example command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/cloud/discovery_entities_get.md b/openapi-specs/compute/32-04/desc/cloud/discovery_entities_get.md index a7abbdfb6..85f1be971 100644 --- a/openapi-specs/compute/32-04/desc/cloud/discovery_entities_get.md +++ b/openapi-specs/compute/32-04/desc/cloud/discovery_entities_get.md @@ -7,7 +7,7 @@ Use this API endpoint along with the `GET, api/vVERSION/cloud/discovery` to get Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/cloud/discovery_get.md b/openapi-specs/compute/32-04/desc/cloud/discovery_get.md index 28025f140..c2b4c6e3c 100644 --- a/openapi-specs/compute/32-04/desc/cloud/discovery_get.md +++ b/openapi-specs/compute/32-04/desc/cloud/discovery_get.md @@ -8,7 +8,7 @@ Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/cloud/discovery_scan_post.md b/openapi-specs/compute/32-04/desc/cloud/discovery_scan_post.md index 51799ebdb..0717096f8 100644 --- a/openapi-specs/compute/32-04/desc/cloud/discovery_scan_post.md +++ b/openapi-specs/compute/32-04/desc/cloud/discovery_scan_post.md @@ -5,7 +5,7 @@ Initiates a new cloud discovery scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/cloud/discovery_stop_post.md b/openapi-specs/compute/32-04/desc/cloud/discovery_stop_post.md index 6a6c7a5a5..73dbf46e7 100644 --- a/openapi-specs/compute/32-04/desc/cloud/discovery_stop_post.md +++ b/openapi-specs/compute/32-04/desc/cloud/discovery_stop_post.md @@ -5,7 +5,7 @@ Terminates a cloud discovery scan that's in progress. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/cloud/discovery_vms_get.md b/openapi-specs/compute/32-04/desc/cloud/discovery_vms_get.md index 6766f4e5a..2264a27fe 100644 --- a/openapi-specs/compute/32-04/desc/cloud/discovery_vms_get.md +++ b/openapi-specs/compute/32-04/desc/cloud/discovery_vms_get.md @@ -5,7 +5,7 @@ Returns the discovered cloud VM instances. Refer to the following example cURL command that retrieves all the discovered cloud VM instances: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/coderepos/download_get.md b/openapi-specs/compute/32-04/desc/coderepos/download_get.md index 4ec0197bb..b06dd9f17 100644 --- a/openapi-specs/compute/32-04/desc/coderepos/download_get.md +++ b/openapi-specs/compute/32-04/desc/coderepos/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Code re The following cURL command generates a CSV file containing the reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/coderepos/get.md b/openapi-specs/compute/32-04/desc/coderepos/get.md index 54c4e99bf..42dc16fb6 100644 --- a/openapi-specs/compute/32-04/desc/coderepos/get.md +++ b/openapi-specs/compute/32-04/desc/coderepos/get.md @@ -10,7 +10,7 @@ This endpoint maps to the **Code repositories** table in **Monitor > Vulnerabili The following cURL command retrieves all code repository scan reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/collections/get.md b/openapi-specs/compute/32-04/desc/collections/get.md index 99120d17d..5a9e8a50c 100755 --- a/openapi-specs/compute/32-04/desc/collections/get.md +++ b/openapi-specs/compute/32-04/desc/collections/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table in **Manage > Collections and Tags > Collections Refer to the following example cURL command that returns a list of collections: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/collections/name_delete.md b/openapi-specs/compute/32-04/desc/collections/name_delete.md index 3e2debd01..033358000 100755 --- a/openapi-specs/compute/32-04/desc/collections/name_delete.md +++ b/openapi-specs/compute/32-04/desc/collections/name_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that deletes a collection with the name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-04/desc/collections/name_usages_get.md b/openapi-specs/compute/32-04/desc/collections/name_usages_get.md index 5c9c40424..89e383cce 100755 --- a/openapi-specs/compute/32-04/desc/collections/name_usages_get.md +++ b/openapi-specs/compute/32-04/desc/collections/name_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that retrieves all policies with name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/containers/count_get.md b/openapi-specs/compute/32-04/desc/containers/count_get.md index 4c6ecdcb4..aca59a913 100644 --- a/openapi-specs/compute/32-04/desc/containers/count_get.md +++ b/openapi-specs/compute/32-04/desc/containers/count_get.md @@ -5,7 +5,7 @@ Returns an integer representing the number of containers in your environment. Refer to the following example cURL command that returns the number of containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/containers/download_get.md b/openapi-specs/compute/32-04/desc/containers/download_get.md index 8f581aabe..d76a8de25 100644 --- a/openapi-specs/compute/32-04/desc/containers/download_get.md +++ b/openapi-specs/compute/32-04/desc/containers/download_get.md @@ -9,7 +9,7 @@ You can download the container scan reports in CSV format in Console under **Mon Refer to the following example cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/containers/filters_get.md b/openapi-specs/compute/32-04/desc/containers/filters_get.md index c8a1dfca4..6c2777819 100644 --- a/openapi-specs/compute/32-04/desc/containers/filters_get.md +++ b/openapi-specs/compute/32-04/desc/containers/filters_get.md @@ -1,7 +1,7 @@ Returns all container filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/containers/get.md b/openapi-specs/compute/32-04/desc/containers/get.md index 4cacdde60..3de9dd4af 100644 --- a/openapi-specs/compute/32-04/desc/containers/get.md +++ b/openapi-specs/compute/32-04/desc/containers/get.md @@ -16,7 +16,7 @@ Refer to the following available options for the `fields` query parameters: Refer to the following example cURL command that retrieves a scan report for all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -26,7 +26,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a scan report for a container with the collection ``: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/containers/labels_get.md b/openapi-specs/compute/32-04/desc/containers/labels_get.md index eb40a748d..7a63ab6fb 100644 --- a/openapi-specs/compute/32-04/desc/containers/labels_get.md +++ b/openapi-specs/compute/32-04/desc/containers/labels_get.md @@ -1,7 +1,7 @@ Returns an array of strings containing all of the labels. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/containers/names_get.md b/openapi-specs/compute/32-04/desc/containers/names_get.md index 8b32465d5..9025e2e10 100644 --- a/openapi-specs/compute/32-04/desc/containers/names_get.md +++ b/openapi-specs/compute/32-04/desc/containers/names_get.md @@ -5,7 +5,7 @@ Returns an array of strings containing all container names. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/containers/scan_post.md b/openapi-specs/compute/32-04/desc/containers/scan_post.md index 6b2bdaaba..56137cf64 100644 --- a/openapi-specs/compute/32-04/desc/containers/scan_post.md +++ b/openapi-specs/compute/32-04/desc/containers/scan_post.md @@ -4,7 +4,7 @@ This endpoint returns the time that the scans were initiated. The following example command uses curl and basic auth to force Prisma Cloud Compute to re-scan all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/credentials/get.md b/openapi-specs/compute/32-04/desc/credentials/get.md index ee4309dee..b807ce8f3 100644 --- a/openapi-specs/compute/32-04/desc/credentials/get.md +++ b/openapi-specs/compute/32-04/desc/credentials/get.md @@ -6,7 +6,7 @@ This endpoint maps to **Manage > Authentication > Credentials store** in the Con Refer to the following example cURL command that retrieves all credentials: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/credentials/id_delete.md b/openapi-specs/compute/32-04/desc/credentials/id_delete.md index e5c70259e..27f090158 100644 --- a/openapi-specs/compute/32-04/desc/credentials/id_delete.md +++ b/openapi-specs/compute/32-04/desc/credentials/id_delete.md @@ -14,7 +14,7 @@ To invoke this endpoint in the Prisma Cloud Compute user interface: Refer to the following example cURL command that deletes an existing credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-04/desc/credentials/id_usages_get.md b/openapi-specs/compute/32-04/desc/credentials/id_usages_get.md index 76c1099aa..ca2ce6216 100644 --- a/openapi-specs/compute/32-04/desc/credentials/id_usages_get.md +++ b/openapi-specs/compute/32-04/desc/credentials/id_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following cURL command that retrieves all usages for a credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/curl_examples.md b/openapi-specs/compute/32-04/desc/curl_examples.md index 3d4fcd468..745d21db3 100644 --- a/openapi-specs/compute/32-04/desc/curl_examples.md +++ b/openapi-specs/compute/32-04/desc/curl_examples.md @@ -6,7 +6,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -17,7 +17,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -29,7 +29,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/compute/32-04/desc/custom-compliance/get.md b/openapi-specs/compute/32-04/desc/custom-compliance/get.md index 9022a87b7..9dddcff4e 100644 --- a/openapi-specs/compute/32-04/desc/custom-compliance/get.md +++ b/openapi-specs/compute/32-04/desc/custom-compliance/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example curl command that gets the list of custom compliance checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/custom-compliance/id_delete.md b/openapi-specs/compute/32-04/desc/custom-compliance/id_delete.md index 72c7183ee..f6536e51d 100644 --- a/openapi-specs/compute/32-04/desc/custom-compliance/id_delete.md +++ b/openapi-specs/compute/32-04/desc/custom-compliance/id_delete.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example cURL command that uses basic auth to delete the compliance check with id 9000: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-04/desc/custom-compliance/put.md b/openapi-specs/compute/32-04/desc/custom-compliance/put.md index 480e41b54..b8760a11f 100644 --- a/openapi-specs/compute/32-04/desc/custom-compliance/put.md +++ b/openapi-specs/compute/32-04/desc/custom-compliance/put.md @@ -21,7 +21,7 @@ Create `custom_check.json` file (example): Refer to the following example curl command that uses basic auth to update the checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-04/desc/custom-rules/get.md b/openapi-specs/compute/32-04/desc/custom-rules/get.md index f0385f81a..f77924be8 100644 --- a/openapi-specs/compute/32-04/desc/custom-rules/get.md +++ b/openapi-specs/compute/32-04/desc/custom-rules/get.md @@ -7,7 +7,7 @@ This endpoint maps to the policy table in **Defend > Custom rules** in the Conso Refer to the following example cURL command that retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/custom-rules/id_delete.md b/openapi-specs/compute/32-04/desc/custom-rules/id_delete.md index c0d6dc8b0..01412abf3 100644 --- a/openapi-specs/compute/32-04/desc/custom-rules/id_delete.md +++ b/openapi-specs/compute/32-04/desc/custom-rules/id_delete.md @@ -5,7 +5,7 @@ Deletes a custom rule. Refer to the following example cURL command that deletes a custom rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-04/desc/cves/distribution_get.md b/openapi-specs/compute/32-04/desc/cves/distribution_get.md index aecddce23..7365e1a5e 100644 --- a/openapi-specs/compute/32-04/desc/cves/distribution_get.md +++ b/openapi-specs/compute/32-04/desc/cves/distribution_get.md @@ -3,7 +3,7 @@ Retrieves CVEs from the vulnerability database grouped into distribution where y The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/cves/get.md b/openapi-specs/compute/32-04/desc/cves/get.md index 469ea4b28..f81223298 100644 --- a/openapi-specs/compute/32-04/desc/cves/get.md +++ b/openapi-specs/compute/32-04/desc/cves/get.md @@ -6,7 +6,7 @@ A null response indicates that the CVE is not in our database. The following example curl command queries the Prisma Cloud Compute database for `CVE-2018-1102`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/defenders/app_embedded_post.md b/openapi-specs/compute/32-04/desc/defenders/app_embedded_post.md index 9167469d0..7999cbadb 100644 --- a/openapi-specs/compute/32-04/desc/defenders/app_embedded_post.md +++ b/openapi-specs/compute/32-04/desc/defenders/app_embedded_post.md @@ -5,7 +5,7 @@ Creates an augmented Dockerfile with Defender and dependencies included as a ZIP Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/defenders/daemonset_yaml_get.md b/openapi-specs/compute/32-04/desc/defenders/daemonset_yaml_get.md index 678901a8a..b68869081 100644 --- a/openapi-specs/compute/32-04/desc/defenders/daemonset_yaml_get.md +++ b/openapi-specs/compute/32-04/desc/defenders/daemonset_yaml_get.md @@ -10,7 +10,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https://:8083/api/v1/defenders/daemonset.yaml?consoleaddr=&listener=none&namespace=twistlock&orchestration=kubernetes' diff --git a/openapi-specs/compute/32-04/desc/defenders/daemonset_yaml_post.md b/openapi-specs/compute/32-04/desc/defenders/daemonset_yaml_post.md index 8dcf30639..91abe241f 100644 --- a/openapi-specs/compute/32-04/desc/defenders/daemonset_yaml_post.md +++ b/openapi-specs/compute/32-04/desc/defenders/daemonset_yaml_post.md @@ -5,7 +5,7 @@ Creates a DaemonSet deployment file in YAML format that you can use to deploy De Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/defenders/download_get.md b/openapi-specs/compute/32-04/desc/defenders/download_get.md index 2d9435506..67f08c0e5 100644 --- a/openapi-specs/compute/32-04/desc/defenders/download_get.md +++ b/openapi-specs/compute/32-04/desc/defenders/download_get.md @@ -8,7 +8,7 @@ Use the query parameters to filter what data is returned. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o \ diff --git a/openapi-specs/compute/32-04/desc/defenders/fargate_json_post.md b/openapi-specs/compute/32-04/desc/defenders/fargate_json_post.md index 5128e90a1..e2e4e85ab 100644 --- a/openapi-specs/compute/32-04/desc/defenders/fargate_json_post.md +++ b/openapi-specs/compute/32-04/desc/defenders/fargate_json_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command: Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -23,7 +23,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/defenders/fargate_yaml_post.md b/openapi-specs/compute/32-04/desc/defenders/fargate_yaml_post.md index 9a8306a1b..95560526a 100644 --- a/openapi-specs/compute/32-04/desc/defenders/fargate_yaml_post.md +++ b/openapi-specs/compute/32-04/desc/defenders/fargate_yaml_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.yaml` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/yaml' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/defenders/get.md b/openapi-specs/compute/32-04/desc/defenders/get.md index 471e7ef9d..8d2f5cd4c 100644 --- a/openapi-specs/compute/32-04/desc/defenders/get.md +++ b/openapi-specs/compute/32-04/desc/defenders/get.md @@ -7,7 +7,7 @@ This endpoint maps to the UI Console page in **Manage > Defenders > Defenders**. Refer to the following example cURL command that retrieves all deployed Defenders. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/defenders/helm_get.md b/openapi-specs/compute/32-04/desc/defenders/helm_get.md index b11f9c4b9..487c8b7e8 100644 --- a/openapi-specs/compute/32-04/desc/defenders/helm_get.md +++ b/openapi-specs/compute/32-04/desc/defenders/helm_get.md @@ -13,7 +13,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o twistlock-defender-helm.tar.gz \ diff --git a/openapi-specs/compute/32-04/desc/defenders/helm_post.md b/openapi-specs/compute/32-04/desc/defenders/helm_post.md index 2046e63eb..fb76807ae 100644 --- a/openapi-specs/compute/32-04/desc/defenders/helm_post.md +++ b/openapi-specs/compute/32-04/desc/defenders/helm_post.md @@ -5,7 +5,7 @@ Creates a Helm deployment file that you can use to deploy Defenders to your clus Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/defenders/id_delete.md b/openapi-specs/compute/32-04/desc/defenders/id_delete.md index f637ef850..e3ac52daf 100644 --- a/openapi-specs/compute/32-04/desc/defenders/id_delete.md +++ b/openapi-specs/compute/32-04/desc/defenders/id_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes an existing Defender on a host. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-04/desc/defenders/id_features_post.md b/openapi-specs/compute/32-04/desc/defenders/id_features_post.md index ec8e4c5f3..9b42f5fa0 100644 --- a/openapi-specs/compute/32-04/desc/defenders/id_features_post.md +++ b/openapi-specs/compute/32-04/desc/defenders/id_features_post.md @@ -3,7 +3,7 @@ Updates a deployed Defender's configuration. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/defenders/id_restart_post.md b/openapi-specs/compute/32-04/desc/defenders/id_restart_post.md index da0cc7811..7296a186b 100644 --- a/openapi-specs/compute/32-04/desc/defenders/id_restart_post.md +++ b/openapi-specs/compute/32-04/desc/defenders/id_restart_post.md @@ -3,7 +3,7 @@ Restarts Defender on a given host. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/defenders/id_upgrade_post.md b/openapi-specs/compute/32-04/desc/defenders/id_upgrade_post.md index f0d30d1e9..3e63c6414 100644 --- a/openapi-specs/compute/32-04/desc/defenders/id_upgrade_post.md +++ b/openapi-specs/compute/32-04/desc/defenders/id_upgrade_post.md @@ -7,7 +7,7 @@ Upgrades Defender on ``. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/defenders/image-name_get.md b/openapi-specs/compute/32-04/desc/defenders/image-name_get.md index e81ba3e19..19f360c07 100644 --- a/openapi-specs/compute/32-04/desc/defenders/image-name_get.md +++ b/openapi-specs/compute/32-04/desc/defenders/image-name_get.md @@ -5,7 +5,7 @@ Returns the full Docker image name for Defender. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/defenders/install-bundle_get.md b/openapi-specs/compute/32-04/desc/defenders/install-bundle_get.md index 882d0cd53..9b09e733f 100644 --- a/openapi-specs/compute/32-04/desc/defenders/install-bundle_get.md +++ b/openapi-specs/compute/32-04/desc/defenders/install-bundle_get.md @@ -5,7 +5,7 @@ Returns the certificate bundle that Defender needs to securely connect to Consol Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/defenders/names_get.md b/openapi-specs/compute/32-04/desc/defenders/names_get.md index 728eb6364..6339c1483 100644 --- a/openapi-specs/compute/32-04/desc/defenders/names_get.md +++ b/openapi-specs/compute/32-04/desc/defenders/names_get.md @@ -5,7 +5,7 @@ Retrieves a list of Defender hostnames that can be used as the `{id}` query para Refer to the following example cURL command that retrieves a list of all Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -15,7 +15,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of connected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -25,7 +25,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of disconnected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -37,7 +37,7 @@ The endpoint enlists all the connected and disconnected Defenders if do not spec Refer to the following example cURL command that retrieves a list of Defenders by type: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/defenders/rasp_post.md b/openapi-specs/compute/32-04/desc/defenders/rasp_post.md index 526a9e112..e110044dd 100644 --- a/openapi-specs/compute/32-04/desc/defenders/rasp_post.md +++ b/openapi-specs/compute/32-04/desc/defenders/rasp_post.md @@ -7,7 +7,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o rasp-defender.zip diff --git a/openapi-specs/compute/32-04/desc/defenders/serverless-bundle_post.md b/openapi-specs/compute/32-04/desc/defenders/serverless-bundle_post.md index df4f13e6a..7533e436b 100644 --- a/openapi-specs/compute/32-04/desc/defenders/serverless-bundle_post.md +++ b/openapi-specs/compute/32-04/desc/defenders/serverless-bundle_post.md @@ -5,7 +5,7 @@ Downloads a ZIP file with serverless Defender bundle. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/octet-stream' \ -o serverless_bundle.zip \ diff --git a/openapi-specs/compute/32-04/desc/defenders/summary_get.md b/openapi-specs/compute/32-04/desc/defenders/summary_get.md index 08be4ebc4..e308ef64b 100644 --- a/openapi-specs/compute/32-04/desc/defenders/summary_get.md +++ b/openapi-specs/compute/32-04/desc/defenders/summary_get.md @@ -6,7 +6,7 @@ Lists the number of Defenders in each defender category. Refer to the following example cURL command that retrieves a summary of Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/defenders/upgrade_post.md b/openapi-specs/compute/32-04/desc/defenders/upgrade_post.md index 2f0b4d39e..eacd6b779 100644 --- a/openapi-specs/compute/32-04/desc/defenders/upgrade_post.md +++ b/openapi-specs/compute/32-04/desc/defenders/upgrade_post.md @@ -9,7 +9,7 @@ To upgrade Serverless and Fargate Defenders, re-embed them. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/deployment/daemonsets_deploy_post.md b/openapi-specs/compute/32-04/desc/deployment/daemonsets_deploy_post.md index 94ec9386b..b60f28346 100644 --- a/openapi-specs/compute/32-04/desc/deployment/daemonsets_deploy_post.md +++ b/openapi-specs/compute/32-04/desc/deployment/daemonsets_deploy_post.md @@ -5,7 +5,7 @@ It identifies the cluster's API server, user, and credentials. Use the various request parameters to control the properties of the deployed DaemonSet. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/deployment/daemonsets_get.md b/openapi-specs/compute/32-04/desc/deployment/daemonsets_get.md index a0b7f3798..0385acf75 100644 --- a/openapi-specs/compute/32-04/desc/deployment/daemonsets_get.md +++ b/openapi-specs/compute/32-04/desc/deployment/daemonsets_get.md @@ -3,7 +3,7 @@ You must specify a `credentialID`, of type `kubeconfig`, which identifies your c Credentials are managed in Console's credentials store (`/api/v1/credentials`). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/feeds/custom_vuln_get.md b/openapi-specs/compute/32-04/desc/feeds/custom_vuln_get.md index 71834f19d..d661acf55 100644 --- a/openapi-specs/compute/32-04/desc/feeds/custom_vuln_get.md +++ b/openapi-specs/compute/32-04/desc/feeds/custom_vuln_get.md @@ -11,7 +11,7 @@ Vulnerability rules can be created using the Prisma Cloud Compute. Refer to the following cURL command that retrieves a list of all the custom vulnerabilities and associated rules. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/feeds/custom_vuln_put.md b/openapi-specs/compute/32-04/desc/feeds/custom_vuln_put.md index 4fe1c1898..149ada978 100644 --- a/openapi-specs/compute/32-04/desc/feeds/custom_vuln_put.md +++ b/openapi-specs/compute/32-04/desc/feeds/custom_vuln_put.md @@ -5,7 +5,7 @@ Updates all the custom vulnerabilities and associated rules simultaneously for h Refer to the following cURL command that updates a vulnerability for a library named `internal-lib`, and specifies that its versions `1.1` to `1.8` are known to be vulnerable. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -37,7 +37,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: **Note:** You will need `jq` to execute this command. ``` - $ curl -k \ + $ curl \ -u \ https:///api/v/feeds/custom/custom-vulnerabilities \ | jq '.' > custom_vulnerability_rules.json @@ -66,7 +66,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 3. Update the rules by pushing the new JSON payload. **Note:** Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -77,7 +77,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 4. Run the cURL command for the `GET /api/vVERSION/feeds/custom/custom-vulnerabilities` endpoint and you can see that the previously installed rules are now overwritten with your new rules. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/feeds/custom_vulnerabilities_digest_get.md b/openapi-specs/compute/32-04/desc/feeds/custom_vulnerabilities_digest_get.md index 0eb501d9b..02af9a3ab 100644 --- a/openapi-specs/compute/32-04/desc/feeds/custom_vulnerabilities_digest_get.md +++ b/openapi-specs/compute/32-04/desc/feeds/custom_vulnerabilities_digest_get.md @@ -5,7 +5,7 @@ Returns the unique digest for the custom vulnerabilities and associated rules fo The following cURL command retrieves the digest for the configured custom vulnerabilities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/feeds/cve_allow_list_digest_get.md b/openapi-specs/compute/32-04/desc/feeds/cve_allow_list_digest_get.md index e27f21251..911a07fd9 100644 --- a/openapi-specs/compute/32-04/desc/feeds/cve_allow_list_digest_get.md +++ b/openapi-specs/compute/32-04/desc/feeds/cve_allow_list_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the Common Vulnerabilities and Exposures (CVE) a The following cURL command retrieves the digest for the configured CVE allow list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/feeds/cve_allow_list_get.md b/openapi-specs/compute/32-04/desc/feeds/cve_allow_list_get.md index 34fb2c7f8..d73ce17c2 100644 --- a/openapi-specs/compute/32-04/desc/feeds/cve_allow_list_get.md +++ b/openapi-specs/compute/32-04/desc/feeds/cve_allow_list_get.md @@ -5,7 +5,7 @@ Retrieves the globally allow-listed Common Vulnerabilities and Exposures (CVE). The following cURL command retrieves the globally allow-listed CVEs. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/feeds/cve_allow_list_put.md b/openapi-specs/compute/32-04/desc/feeds/cve_allow_list_put.md index 850016965..c4e2ce0af 100644 --- a/openapi-specs/compute/32-04/desc/feeds/cve_allow_list_put.md +++ b/openapi-specs/compute/32-04/desc/feeds/cve_allow_list_put.md @@ -7,7 +7,7 @@ Globally allow-lists a set of Common Vulnerabilities and Exposures (CVE). The following cURL command installs a global CVE allow-list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-04/desc/feeds/ips_digest_get.md b/openapi-specs/compute/32-04/desc/feeds/ips_digest_get.md index d059271ea..ae2a09915 100644 --- a/openapi-specs/compute/32-04/desc/feeds/ips_digest_get.md +++ b/openapi-specs/compute/32-04/desc/feeds/ips_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the list of suspicious or high risk IP endpoints The following cURL command retrieves the digest for the banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/feeds/ips_get.md b/openapi-specs/compute/32-04/desc/feeds/ips_get.md index 381257d47..f51c577a7 100644 --- a/openapi-specs/compute/32-04/desc/feeds/ips_get.md +++ b/openapi-specs/compute/32-04/desc/feeds/ips_get.md @@ -5,7 +5,7 @@ Retrieves the customized list of block-listed suspicious or high-risk IP address The following cURL command retrieves the list of globally block-listed suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/feeds/ips_put.md b/openapi-specs/compute/32-04/desc/feeds/ips_put.md index 6f8fc2419..5bf791044 100644 --- a/openapi-specs/compute/32-04/desc/feeds/ips_put.md +++ b/openapi-specs/compute/32-04/desc/feeds/ips_put.md @@ -7,7 +7,7 @@ Bans a custom list of suspicious or high-risk IP addresses. The following cURL command installs a custom list of banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-04/desc/feeds/malware_digest_get.md b/openapi-specs/compute/32-04/desc/feeds/malware_digest_get.md index 005c476a2..522a59aef 100644 --- a/openapi-specs/compute/32-04/desc/feeds/malware_digest_get.md +++ b/openapi-specs/compute/32-04/desc/feeds/malware_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for all the MD5 signatures of malicious executables The following cURL command retrieves the digest for the configured list for the MD5 signatures of malicious executables. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/feeds/malware_get.md b/openapi-specs/compute/32-04/desc/feeds/malware_get.md index 2a7aa128b..72bee6594 100644 --- a/openapi-specs/compute/32-04/desc/feeds/malware_get.md +++ b/openapi-specs/compute/32-04/desc/feeds/malware_get.md @@ -5,7 +5,7 @@ Returns the customized list of MD5 signatures of malicious executables. Refer to the following cURL command that retrieves the list of MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/feeds/malware_put.md b/openapi-specs/compute/32-04/desc/feeds/malware_put.md index 7e6ec5da0..176304cb9 100644 --- a/openapi-specs/compute/32-04/desc/feeds/malware_put.md +++ b/openapi-specs/compute/32-04/desc/feeds/malware_put.md @@ -7,7 +7,7 @@ Creates a custom list of malware MD5 signatures of malicious executables. Refer to the following cURL command that installs a custom list of malware MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-04/desc/feeds/refresh_post.md b/openapi-specs/compute/32-04/desc/feeds/refresh_post.md index a83c40d10..1c756edae 100644 --- a/openapi-specs/compute/32-04/desc/feeds/refresh_post.md +++ b/openapi-specs/compute/32-04/desc/feeds/refresh_post.md @@ -1,7 +1,7 @@ Triggers Console to refresh its data from the **Intelligence Stream** ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/forensic/activities_download_get.md b/openapi-specs/compute/32-04/desc/forensic/activities_download_get.md index 8a2dbd926..1918e3790 100644 --- a/openapi-specs/compute/32-04/desc/forensic/activities_download_get.md +++ b/openapi-specs/compute/32-04/desc/forensic/activities_download_get.md @@ -3,7 +3,7 @@ Downloads all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/forensic/activities_get.md b/openapi-specs/compute/32-04/desc/forensic/activities_get.md index c8fb1d0cd..c0761aa60 100644 --- a/openapi-specs/compute/32-04/desc/forensic/activities_get.md +++ b/openapi-specs/compute/32-04/desc/forensic/activities_get.md @@ -3,7 +3,7 @@ Retrieves all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/groups/get.md b/openapi-specs/compute/32-04/desc/groups/get.md index 6a0daa2eb..34a2711e0 100644 --- a/openapi-specs/compute/32-04/desc/groups/get.md +++ b/openapi-specs/compute/32-04/desc/groups/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups. ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-04/desc/groups/id_delete.md b/openapi-specs/compute/32-04/desc/groups/id_delete.md index 5962a1135..0c3cfa1cd 100644 --- a/openapi-specs/compute/32-04/desc/groups/id_delete.md +++ b/openapi-specs/compute/32-04/desc/groups/id_delete.md @@ -13,7 +13,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes a collection with the name `{id}`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-04/desc/groups/names.md b/openapi-specs/compute/32-04/desc/groups/names.md index 80f34f536..9c2dd1089 100644 --- a/openapi-specs/compute/32-04/desc/groups/names.md +++ b/openapi-specs/compute/32-04/desc/groups/names.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-04/desc/groups/post.md b/openapi-specs/compute/32-04/desc/groups/post.md index d0fc23a6d..ebad011f4 100644 --- a/openapi-specs/compute/32-04/desc/groups/post.md +++ b/openapi-specs/compute/32-04/desc/groups/post.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that creates a new group named `my-group`: ```bash -$ curl -k \ +$ curl \ -X POST \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-04/desc/high-availability/get.md b/openapi-specs/compute/32-04/desc/high-availability/get.md index a988d47ef..83d5d9b46 100644 --- a/openapi-specs/compute/32-04/desc/high-availability/get.md +++ b/openapi-specs/compute/32-04/desc/high-availability/get.md @@ -3,7 +3,7 @@ Returns the status of high high availability. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-04/desc/hosts/download_get.md b/openapi-specs/compute/32-04/desc/hosts/download_get.md index ab691fb49..34e546573 100644 --- a/openapi-specs/compute/32-04/desc/hosts/download_get.md +++ b/openapi-specs/compute/32-04/desc/hosts/download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Hosts > Refer to the following example cURL command that downloads all host scan reports to a CSV file called `hosts_report.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o hosts_report.csv \ diff --git a/openapi-specs/compute/32-04/desc/hosts/filters_get.md b/openapi-specs/compute/32-04/desc/hosts/filters_get.md index 4bf6df5e6..a39ec8a97 100644 --- a/openapi-specs/compute/32-04/desc/hosts/filters_get.md +++ b/openapi-specs/compute/32-04/desc/hosts/filters_get.md @@ -3,7 +3,7 @@ Returns host filters such as distribution and host name. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/hosts/get.md b/openapi-specs/compute/32-04/desc/hosts/get.md index d125c9d7b..26df89cef 100644 --- a/openapi-specs/compute/32-04/desc/hosts/get.md +++ b/openapi-specs/compute/32-04/desc/hosts/get.md @@ -35,7 +35,7 @@ Refer to the following available options for the `fields` query parameters: Refer to the following cURL command that retrieves all host scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/hosts/info_get.md b/openapi-specs/compute/32-04/desc/hosts/info_get.md index be456b46b..b71c6be2f 100644 --- a/openapi-specs/compute/32-04/desc/hosts/info_get.md +++ b/openapi-specs/compute/32-04/desc/hosts/info_get.md @@ -3,7 +3,7 @@ Returns minimal information that includes hostname, distro, distro-release, coll A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/hosts/scan_post.md b/openapi-specs/compute/32-04/desc/hosts/scan_post.md index 6b72cbfa3..0e0e7b074 100644 --- a/openapi-specs/compute/32-04/desc/hosts/scan_post.md +++ b/openapi-specs/compute/32-04/desc/hosts/scan_post.md @@ -3,7 +3,7 @@ Re-scan all hosts immediately. Refer to the following example command that forces Prisma Cloud Compute to re-scan all hosts: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/hosts/scan diff --git a/openapi-specs/compute/32-04/desc/images/defender_layer_get.md b/openapi-specs/compute/32-04/desc/images/defender_layer_get.md index 1dfe3633d..4bb88d62c 100644 --- a/openapi-specs/compute/32-04/desc/images/defender_layer_get.md +++ b/openapi-specs/compute/32-04/desc/images/defender_layer_get.md @@ -5,7 +5,7 @@ Returns the the Prisma Cloud Compute Defender in as a layer that can be used in Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/compute/32-04/desc/images/defender_rasp_get.md b/openapi-specs/compute/32-04/desc/images/defender_rasp_get.md index a8e145ff7..260e271a1 100644 --- a/openapi-specs/compute/32-04/desc/images/defender_rasp_get.md +++ b/openapi-specs/compute/32-04/desc/images/defender_rasp_get.md @@ -3,7 +3,7 @@ Returns the the Prisma Cloud Compute Defender as the RASP Defender A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/compute/32-04/desc/images/download_get.md b/openapi-specs/compute/32-04/desc/images/download_get.md index 713114955..fcae06e3d 100644 --- a/openapi-specs/compute/32-04/desc/images/download_get.md +++ b/openapi-specs/compute/32-04/desc/images/download_get.md @@ -15,7 +15,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -26,7 +26,7 @@ $ curl -k \ Refer to the following example cURL command that might be useful for developers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/images/get.md b/openapi-specs/compute/32-04/desc/images/get.md index 6c82341b6..bb636e101 100644 --- a/openapi-specs/compute/32-04/desc/images/get.md +++ b/openapi-specs/compute/32-04/desc/images/get.md @@ -19,7 +19,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that retrieves a compact scan report for all images: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -29,7 +29,7 @@ $ curl -k \ Refer to the following cURL command that retrieves a compact scan report for an Ubuntu image: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -40,7 +40,7 @@ The name query is synonymous with the filter images text field in the Console UI Refer to the following cURL command that retrieves the scan report for an image with the matching SHA-256 hash: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/images/names_get.md b/openapi-specs/compute/32-04/desc/images/names_get.md index 3db6f5429..ad5fd25dc 100644 --- a/openapi-specs/compute/32-04/desc/images/names_get.md +++ b/openapi-specs/compute/32-04/desc/images/names_get.md @@ -5,7 +5,7 @@ Returns an array of strings containing image names. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-04/desc/images/scan_post.md b/openapi-specs/compute/32-04/desc/images/scan_post.md index 8d802727a..36278249b 100644 --- a/openapi-specs/compute/32-04/desc/images/scan_post.md +++ b/openapi-specs/compute/32-04/desc/images/scan_post.md @@ -5,7 +5,7 @@ Re-scan all images immediately. This endpoint returns the time that the scans we Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all images: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/images/scan diff --git a/openapi-specs/compute/32-04/desc/images/twistlock_defender_tar_gz_get.md b/openapi-specs/compute/32-04/desc/images/twistlock_defender_tar_gz_get.md index 7852e12ba..36fb66ae8 100644 --- a/openapi-specs/compute/32-04/desc/images/twistlock_defender_tar_gz_get.md +++ b/openapi-specs/compute/32-04/desc/images/twistlock_defender_tar_gz_get.md @@ -1,7 +1,7 @@ Download the Container Defender image for Linux platforms. ```bash -$ curl -k \ +$ curl \ -u \ -H "Content-Type: application/octet-stream" \ -o twistlock_defender.tar.gz \ diff --git a/openapi-specs/compute/32-04/desc/intro.md b/openapi-specs/compute/32-04/desc/intro.md index 9038a3734..5b4ed5864 100644 --- a/openapi-specs/compute/32-04/desc/intro.md +++ b/openapi-specs/compute/32-04/desc/intro.md @@ -47,7 +47,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -58,7 +58,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -70,7 +70,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/compute/32-04/desc/kubernetes/scan_post.md b/openapi-specs/compute/32-04/desc/kubernetes/scan_post.md index 15d614c1a..ab74d5d96 100644 --- a/openapi-specs/compute/32-04/desc/kubernetes/scan_post.md +++ b/openapi-specs/compute/32-04/desc/kubernetes/scan_post.md @@ -3,7 +3,7 @@ This endpoint will trigger a Kubernetes scan. The following example curl command uses basic auth to initiate this scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/logs/console_get.md b/openapi-specs/compute/32-04/desc/logs/console_get.md index 80ece6611..113543540 100644 --- a/openapi-specs/compute/32-04/desc/logs/console_get.md +++ b/openapi-specs/compute/32-04/desc/logs/console_get.md @@ -3,7 +3,7 @@ Retrieves the latest Console log messages. The following example curl command retrieves the 10 latest Console log messages: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/logs/defender_download_get.md b/openapi-specs/compute/32-04/desc/logs/defender_download_get.md index 5d6718db0..05bbc6a75 100644 --- a/openapi-specs/compute/32-04/desc/logs/defender_download_get.md +++ b/openapi-specs/compute/32-04/desc/logs/defender_download_get.md @@ -5,7 +5,7 @@ The hostname can be returned from the endpoint `/defenders/names` The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/logs/defender_get.md b/openapi-specs/compute/32-04/desc/logs/defender_get.md index 1e733a746..f2e3b25df 100644 --- a/openapi-specs/compute/32-04/desc/logs/defender_get.md +++ b/openapi-specs/compute/32-04/desc/logs/defender_get.md @@ -7,7 +7,7 @@ Note that you must quote the URL when running the following command. Otherwise the shell misinterprets the ampersand (`&`) as the end of the command, and puts the curl command in the background. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/logs/system_download_get.md b/openapi-specs/compute/32-04/desc/logs/system_download_get.md index 1e5b5b873..43bb0abce 100644 --- a/openapi-specs/compute/32-04/desc/logs/system_download_get.md +++ b/openapi-specs/compute/32-04/desc/logs/system_download_get.md @@ -4,7 +4,7 @@ This endpoint will return the system debug logs with `tar.gz` file extension. The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/pcf-droplets/addresses_get.md b/openapi-specs/compute/32-04/desc/pcf-droplets/addresses_get.md index 257a47455..bb3365015 100644 --- a/openapi-specs/compute/32-04/desc/pcf-droplets/addresses_get.md +++ b/openapi-specs/compute/32-04/desc/pcf-droplets/addresses_get.md @@ -5,7 +5,7 @@ You can also add optional query parameters to this API call, in this example `cl The following example curl command retrieves the list of addresses: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/pcf-droplets/download_get.md b/openapi-specs/compute/32-04/desc/pcf-droplets/download_get.md index ad761e744..ac8546a25 100644 --- a/openapi-specs/compute/32-04/desc/pcf-droplets/download_get.md +++ b/openapi-specs/compute/32-04/desc/pcf-droplets/download_get.md @@ -3,7 +3,7 @@ This endpoint will download the list of configured cloud controller addresses co The following example curl command retrieves the list of addresses and outputs it to a file call `PCF_blobstores.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/pcf-droplets/get.md b/openapi-specs/compute/32-04/desc/pcf-droplets/get.md index 930d16948..aad607cba 100644 --- a/openapi-specs/compute/32-04/desc/pcf-droplets/get.md +++ b/openapi-specs/compute/32-04/desc/pcf-droplets/get.md @@ -3,7 +3,7 @@ This endpoint will return the full metadata of PCF blobstore from page **Monitor The following example curl command will retrieve this: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/pcf-droplets/scan_post.md b/openapi-specs/compute/32-04/desc/pcf-droplets/scan_post.md index 34e75b26c..d9c9df4dd 100644 --- a/openapi-specs/compute/32-04/desc/pcf-droplets/scan_post.md +++ b/openapi-specs/compute/32-04/desc/pcf-droplets/scan_post.md @@ -3,7 +3,7 @@ This endpoint will kick off a scan of the any PCF Blobstores you have configured Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/pcf-droplets/stop_post.md b/openapi-specs/compute/32-04/desc/pcf-droplets/stop_post.md index 94c376972..2c4d5264a 100644 --- a/openapi-specs/compute/32-04/desc/pcf-droplets/stop_post.md +++ b/openapi-specs/compute/32-04/desc/pcf-droplets/stop_post.md @@ -3,7 +3,7 @@ This endpoint will instruct the PFC Defenders to stop scanning. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/policies/compliance_ci_images_get.md b/openapi-specs/compute/32-04/desc/policies/compliance_ci_images_get.md index f97130a97..9a2b2abf5 100644 --- a/openapi-specs/compute/32-04/desc/policies/compliance_ci_images_get.md +++ b/openapi-specs/compute/32-04/desc/policies/compliance_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > CI** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/policies/compliance_ci_serverless_get.md b/openapi-specs/compute/32-04/desc/policies/compliance_ci_serverless_get.md index 59195f070..2f30e2d74 100644 --- a/openapi-specs/compute/32-04/desc/policies/compliance_ci_serverless_get.md +++ b/openapi-specs/compute/32-04/desc/policies/compliance_ci_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Functions > CI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/policies/compliance_container_get.md b/openapi-specs/compute/32-04/desc/policies/compliance_container_get.md index 7f10245ea..657d4f2dd 100644 --- a/openapi-specs/compute/32-04/desc/policies/compliance_container_get.md +++ b/openapi-specs/compute/32-04/desc/policies/compliance_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > Deployed** Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/policies/compliance_container_impacted_get.md b/openapi-specs/compute/32-04/desc/policies/compliance_container_impacted_get.md index 607bfa3c8..de9e0ee77 100644 --- a/openapi-specs/compute/32-04/desc/policies/compliance_container_impacted_get.md +++ b/openapi-specs/compute/32-04/desc/policies/compliance_container_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of containers captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/compliance/container/impacted?ruleName=' diff --git a/openapi-specs/compute/32-04/desc/policies/compliance_host_get.md b/openapi-specs/compute/32-04/desc/policies/compliance_host_get.md index c029ecf7f..a5e429af5 100755 --- a/openapi-specs/compute/32-04/desc/policies/compliance_host_get.md +++ b/openapi-specs/compute/32-04/desc/policies/compliance_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Hosts > Running hosts** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/policies/compliance_serverless_get.md b/openapi-specs/compute/32-04/desc/policies/compliance_serverless_get.md index c7de886c1..f559179f6 100755 --- a/openapi-specs/compute/32-04/desc/policies/compliance_serverless_get.md +++ b/openapi-specs/compute/32-04/desc/policies/compliance_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Functions > Functions** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/policies/compliance_vms_get.md b/openapi-specs/compute/32-04/desc/policies/compliance_vms_get.md index f7d7e1a49..b61d20d9d 100755 --- a/openapi-specs/compute/32-04/desc/policies/compliance_vms_get.md +++ b/openapi-specs/compute/32-04/desc/policies/compliance_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Hosts > VM ima The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/policies/compliance_vms_impacted_get.md b/openapi-specs/compute/32-04/desc/policies/compliance_vms_impacted_get.md index 9cf5b9d03..4ac3f2832 100644 --- a/openapi-specs/compute/32-04/desc/policies/compliance_vms_impacted_get.md +++ b/openapi-specs/compute/32-04/desc/policies/compliance_vms_impacted_get.md @@ -8,7 +8,7 @@ Use query parameters to retrieve the list of impacted resources by *account ID*, Refer to the following example cURL command, which retrieves a list of impacted resources: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/policies/docker_get.md b/openapi-specs/compute/32-04/desc/policies/docker_get.md index f56872c67..e8ab3d5bb 100644 --- a/openapi-specs/compute/32-04/desc/policies/docker_get.md +++ b/openapi-specs/compute/32-04/desc/policies/docker_get.md @@ -3,7 +3,7 @@ Retrieves a list of all access control rules for Docker Engine commands. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/policies/docker_put.md b/openapi-specs/compute/32-04/desc/policies/docker_put.md index 860e2bb1e..a5d0c0230 100644 --- a/openapi-specs/compute/32-04/desc/policies/docker_put.md +++ b/openapi-specs/compute/32-04/desc/policies/docker_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove Docker access control rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/docker \ | jq '.' > docker_access_control_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove Docker access control rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/32-04/desc/policies/firewall_app-embedded_get.md b/openapi-specs/compute/32-04/desc/policies/firewall_app-embedded_get.md index 3da2a7cd6..4e59c4c21 100644 --- a/openapi-specs/compute/32-04/desc/policies/firewall_app-embedded_get.md +++ b/openapi-specs/compute/32-04/desc/policies/firewall_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > App-Embedded** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/policies/firewall_app_container_get.md b/openapi-specs/compute/32-04/desc/policies/firewall_app_container_get.md index 3b8c157fa..f0486aa4c 100644 --- a/openapi-specs/compute/32-04/desc/policies/firewall_app_container_get.md +++ b/openapi-specs/compute/32-04/desc/policies/firewall_app_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Container** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/container' diff --git a/openapi-specs/compute/32-04/desc/policies/firewall_app_host_get.md b/openapi-specs/compute/32-04/desc/policies/firewall_app_host_get.md index adb90128a..75c22add4 100644 --- a/openapi-specs/compute/32-04/desc/policies/firewall_app_host_get.md +++ b/openapi-specs/compute/32-04/desc/policies/firewall_app_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Host** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/policies/firewall_app_network_list_get.md b/openapi-specs/compute/32-04/desc/policies/firewall_app_network_list_get.md index 13f7fb450..5a1f87d85 100644 --- a/openapi-specs/compute/32-04/desc/policies/firewall_app_network_list_get.md +++ b/openapi-specs/compute/32-04/desc/policies/firewall_app_network_list_get.md @@ -11,7 +11,7 @@ This endpoint maps to **Defend > WAAS > Network lists** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/network-list' diff --git a/openapi-specs/compute/32-04/desc/policies/firewall_app_out-of-band_get.md b/openapi-specs/compute/32-04/desc/policies/firewall_app_out-of-band_get.md index d4f72d041..9ae662687 100644 --- a/openapi-specs/compute/32-04/desc/policies/firewall_app_out-of-band_get.md +++ b/openapi-specs/compute/32-04/desc/policies/firewall_app_out-of-band_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/policies/firewall_app_out-of-band_impacted_get.md b/openapi-specs/compute/32-04/desc/policies/firewall_app_out-of-band_impacted_get.md index 25d2c6691..96a427f94 100644 --- a/openapi-specs/compute/32-04/desc/policies/firewall_app_out-of-band_impacted_get.md +++ b/openapi-specs/compute/32-04/desc/policies/firewall_app_out-of-band_impacted_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/policies/firewall_app_rasp_get.md b/openapi-specs/compute/32-04/desc/policies/firewall_app_rasp_get.md index 15d481cf3..a201d3beb 100644 --- a/openapi-specs/compute/32-04/desc/policies/firewall_app_rasp_get.md +++ b/openapi-specs/compute/32-04/desc/policies/firewall_app_rasp_get.md @@ -1,7 +1,7 @@ Retrieves a list of all application firewall (CNAF) rules for RASP. ``` -$ curl -k \ +$ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp ``` diff --git a/openapi-specs/compute/32-04/desc/policies/firewall_app_rasp_put.md b/openapi-specs/compute/32-04/desc/policies/firewall_app_rasp_put.md index 04ba86483..1101c7690 100644 --- a/openapi-specs/compute/32-04/desc/policies/firewall_app_rasp_put.md +++ b/openapi-specs/compute/32-04/desc/policies/firewall_app_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp \ | jq '.' > app_firewall_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/32-04/desc/policies/firewall_app_serverless_get.md b/openapi-specs/compute/32-04/desc/policies/firewall_app_serverless_get.md index d19e909f3..90cac0015 100644 --- a/openapi-specs/compute/32-04/desc/policies/firewall_app_serverless_get.md +++ b/openapi-specs/compute/32-04/desc/policies/firewall_app_serverless_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Serverless** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/serverless' diff --git a/openapi-specs/compute/32-04/desc/policies/firewall_network_container_get.md b/openapi-specs/compute/32-04/desc/policies/firewall_network_container_get.md index 3f1343b53..82e656818 100644 --- a/openapi-specs/compute/32-04/desc/policies/firewall_network_container_get.md +++ b/openapi-specs/compute/32-04/desc/policies/firewall_network_container_get.md @@ -4,7 +4,7 @@ Retrieves a list of all CNNS container and host rules. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/policies/firewall_network_container_put.md b/openapi-specs/compute/32-04/desc/policies/firewall_network_container_put.md index fd9263430..cffb3f1c4 100644 --- a/openapi-specs/compute/32-04/desc/policies/firewall_network_container_put.md +++ b/openapi-specs/compute/32-04/desc/policies/firewall_network_container_put.md @@ -9,7 +9,7 @@ The procedure to add, edit, or remove rules is: Refer to the following example cURL command that retrieves a list of all rules, pretty-print the JSON response, and save the results to a file: ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -26,7 +26,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/32-04/desc/policies/firewall_network_entities_get.md b/openapi-specs/compute/32-04/desc/policies/firewall_network_entities_get.md index 757121f70..28ed8dbcb 100644 --- a/openapi-specs/compute/32-04/desc/policies/firewall_network_entities_get.md +++ b/openapi-specs/compute/32-04/desc/policies/firewall_network_entities_get.md @@ -1,7 +1,7 @@ Retrieves a list of all CNNF network objects. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/policies/firewall_network_entities_put.md b/openapi-specs/compute/32-04/desc/policies/firewall_network_entities_put.md index 83c023286..39044ee10 100644 --- a/openapi-specs/compute/32-04/desc/policies/firewall_network_entities_put.md +++ b/openapi-specs/compute/32-04/desc/policies/firewall_network_entities_put.md @@ -3,7 +3,7 @@ Updates the list of CNNF network objects. The following example curl command updates the network objects. There is an example of all three types (images,subnets, and applications ): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-04/desc/policies/policies.md b/openapi-specs/compute/32-04/desc/policies/policies.md index 69768c03d..97be7b616 100644 --- a/openapi-specs/compute/32-04/desc/policies/policies.md +++ b/openapi-specs/compute/32-04/desc/policies/policies.md @@ -21,7 +21,7 @@ To add, edit, or remove vulnerability rules from a policy: For example, the following cURL command uses basic auth to retrieve a list of all image vulnerability rules, pretty-prints the JSON response, and saves the results to a `vulnerability_rules.json` file. ```bash - $ curl -k \ + $ curl \ -u \ https:///api/v1/policies/runtime/host \ | jq '.' > vulnerability_rules.json @@ -36,7 +36,7 @@ To add, edit, or remove vulnerability rules from a policy: **Note:** Remember to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -107,7 +107,7 @@ Use the `PUT` method to delete all rules by submitting an empty JSON object. For example, to delete all host runtime rules: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-04/desc/policies/runtime_app-embedded_get.md b/openapi-specs/compute/32-04/desc/policies/runtime_app-embedded_get.md index fcf0ba8b9..517b741bb 100755 --- a/openapi-specs/compute/32-04/desc/policies/runtime_app-embedded_get.md +++ b/openapi-specs/compute/32-04/desc/policies/runtime_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > App-Embedded policy** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/policies/runtime_container_get.md b/openapi-specs/compute/32-04/desc/policies/runtime_container_get.md index f1b50b727..65cd10660 100644 --- a/openapi-specs/compute/32-04/desc/policies/runtime_container_get.md +++ b/openapi-specs/compute/32-04/desc/policies/runtime_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Container policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/policies/runtime_container_impacted_get.md b/openapi-specs/compute/32-04/desc/policies/runtime_container_impacted_get.md index 195f75547..e026d33b9 100644 --- a/openapi-specs/compute/32-04/desc/policies/runtime_container_impacted_get.md +++ b/openapi-specs/compute/32-04/desc/policies/runtime_container_impacted_get.md @@ -6,7 +6,7 @@ In the Console UI, you can see how it works by going to the **Defend > Runtime > Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ $ curl -k \ For additional help with your `ruleName`: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/policies/runtime_host_get.md b/openapi-specs/compute/32-04/desc/policies/runtime_host_get.md index 38800596c..559ef690a 100644 --- a/openapi-specs/compute/32-04/desc/policies/runtime_host_get.md +++ b/openapi-specs/compute/32-04/desc/policies/runtime_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Host policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/policies/runtime_rasp_get.md b/openapi-specs/compute/32-04/desc/policies/runtime_rasp_get.md index 5b7a76457..55a6ff05b 100644 --- a/openapi-specs/compute/32-04/desc/policies/runtime_rasp_get.md +++ b/openapi-specs/compute/32-04/desc/policies/runtime_rasp_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your RASP runtime policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/policies/runtime_rasp_put.md b/openapi-specs/compute/32-04/desc/policies/runtime_rasp_put.md index bba60ba81..f71fb4b93 100644 --- a/openapi-specs/compute/32-04/desc/policies/runtime_rasp_put.md +++ b/openapi-specs/compute/32-04/desc/policies/runtime_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve the rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET @@ -24,7 +24,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -H "Content-Type:application/json" \ -X PUT \ diff --git a/openapi-specs/compute/32-04/desc/policies/runtime_serverless_get.md b/openapi-specs/compute/32-04/desc/policies/runtime_serverless_get.md index 44326bbf6..c98489e16 100644 --- a/openapi-specs/compute/32-04/desc/policies/runtime_serverless_get.md +++ b/openapi-specs/compute/32-04/desc/policies/runtime_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Serverless policy** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/policies/secrets_get.md b/openapi-specs/compute/32-04/desc/policies/secrets_get.md index 89e6b9c0e..cb4ecb37c 100644 --- a/openapi-specs/compute/32-04/desc/policies/secrets_get.md +++ b/openapi-specs/compute/32-04/desc/policies/secrets_get.md @@ -3,7 +3,7 @@ Retrieves a list of all secrets rules. The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/policies/secrets diff --git a/openapi-specs/compute/32-04/desc/policies/secrets_put.md b/openapi-specs/compute/32-04/desc/policies/secrets_put.md index 1e8877ca1..04fd41f24 100644 --- a/openapi-specs/compute/32-04/desc/policies/secrets_put.md +++ b/openapi-specs/compute/32-04/desc/policies/secrets_put.md @@ -10,7 +10,7 @@ The procedure to add, edit, or remove secrets rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/secrets \ | jq '.' > secrets_rules.json @@ -24,7 +24,7 @@ The procedure to add, edit, or remove secrets rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/32-04/desc/policies/trust_get.md b/openapi-specs/compute/32-04/desc/policies/trust_get.md index 8de1ba409..0805d6777 100644 --- a/openapi-specs/compute/32-04/desc/policies/trust_get.md +++ b/openapi-specs/compute/32-04/desc/policies/trust_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/policies/trust_put.md b/openapi-specs/compute/32-04/desc/policies/trust_put.md index fccd4b91e..7fec72031 100644 --- a/openapi-specs/compute/32-04/desc/policies/trust_put.md +++ b/openapi-specs/compute/32-04/desc/policies/trust_put.md @@ -1,7 +1,7 @@ Updates the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-04/desc/policies/vulnerability_ci_images_get.md b/openapi-specs/compute/32-04/desc/policies/vulnerability_ci_images_get.md index abc3da8fa..ce0d50a29 100644 --- a/openapi-specs/compute/32-04/desc/policies/vulnerability_ci_images_get.md +++ b/openapi-specs/compute/32-04/desc/policies/vulnerability_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/policies/vulnerability_ci_serverless_get.md b/openapi-specs/compute/32-04/desc/policies/vulnerability_ci_serverless_get.md index 958c86495..6fb5f93ce 100644 --- a/openapi-specs/compute/32-04/desc/policies/vulnerability_ci_serverless_get.md +++ b/openapi-specs/compute/32-04/desc/policies/vulnerability_ci_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/policies/vulnerability_coderepos_get.md b/openapi-specs/compute/32-04/desc/policies/vulnerability_coderepos_get.md index 08dfed8e1..a4ac62f33 100644 --- a/openapi-specs/compute/32-04/desc/policies/vulnerability_coderepos_get.md +++ b/openapi-specs/compute/32-04/desc/policies/vulnerability_coderepos_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Code repositories** in the Co Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/vulnerability/coderepos' diff --git a/openapi-specs/compute/32-04/desc/policies/vulnerability_coderepos_impacted_get.md b/openapi-specs/compute/32-04/desc/policies/vulnerability_coderepos_impacted_get.md index a401a12c4..e64ef768e 100644 --- a/openapi-specs/compute/32-04/desc/policies/vulnerability_coderepos_impacted_get.md +++ b/openapi-specs/compute/32-04/desc/policies/vulnerability_coderepos_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/coderepos/impacted?project=&ruleName=' ``` diff --git a/openapi-specs/compute/32-04/desc/policies/vulnerability_coderepos_put.md b/openapi-specs/compute/32-04/desc/policies/vulnerability_coderepos_put.md index 514eec136..a002415b9 100644 --- a/openapi-specs/compute/32-04/desc/policies/vulnerability_coderepos_put.md +++ b/openapi-specs/compute/32-04/desc/policies/vulnerability_coderepos_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Code repo Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT 'https:///api/v/policies/vulnerability/coderepos' \ diff --git a/openapi-specs/compute/32-04/desc/policies/vulnerability_host_get.md b/openapi-specs/compute/32-04/desc/policies/vulnerability_host_get.md index 3b9b14b9c..260da7675 100644 --- a/openapi-specs/compute/32-04/desc/policies/vulnerability_host_get.md +++ b/openapi-specs/compute/32-04/desc/policies/vulnerability_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Hosts > Running hosts** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/policies/vulnerability_host_impacted_get.md b/openapi-specs/compute/32-04/desc/policies/vulnerability_host_impacted_get.md index 346368518..f44592830 100644 --- a/openapi-specs/compute/32-04/desc/policies/vulnerability_host_impacted_get.md +++ b/openapi-specs/compute/32-04/desc/policies/vulnerability_host_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by `RULE_NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/host/impacted?project={PROJECT_NAME}&ruleName={RULE_NAME}' ``` diff --git a/openapi-specs/compute/32-04/desc/policies/vulnerability_images_get.md b/openapi-specs/compute/32-04/desc/policies/vulnerability_images_get.md index 33581be37..57359bb8f 100644 --- a/openapi-specs/compute/32-04/desc/policies/vulnerability_images_get.md +++ b/openapi-specs/compute/32-04/desc/policies/vulnerability_images_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images?project=" diff --git a/openapi-specs/compute/32-04/desc/policies/vulnerability_images_impacted_get.md b/openapi-specs/compute/32-04/desc/policies/vulnerability_images_impacted_get.md index ae1d5e396..e2a4efa23 100644 --- a/openapi-specs/compute/32-04/desc/policies/vulnerability_images_impacted_get.md +++ b/openapi-specs/compute/32-04/desc/policies/vulnerability_images_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of images caught by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images/impacted?project=&ruleName=" diff --git a/openapi-specs/compute/32-04/desc/policies/vulnerability_images_put.md b/openapi-specs/compute/32-04/desc/policies/vulnerability_images_put.md index b3330dab7..8c3cc8af2 100644 --- a/openapi-specs/compute/32-04/desc/policies/vulnerability_images_put.md +++ b/openapi-specs/compute/32-04/desc/policies/vulnerability_images_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -X PUT 'https:///api/v/policies/vulnerability/images' \ --data '{ diff --git a/openapi-specs/compute/32-04/desc/policies/vulnerability_serverless_get.md b/openapi-specs/compute/32-04/desc/policies/vulnerability_serverless_get.md index c7a8e2ef5..41c7e75d8 100644 --- a/openapi-specs/compute/32-04/desc/policies/vulnerability_serverless_get.md +++ b/openapi-specs/compute/32-04/desc/policies/vulnerability_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Functions** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/policies/vulnerability_serverless_put.md b/openapi-specs/compute/32-04/desc/policies/vulnerability_serverless_put.md index 2b567b5b1..5199f0997 100644 --- a/openapi-specs/compute/32-04/desc/policies/vulnerability_serverless_put.md +++ b/openapi-specs/compute/32-04/desc/policies/vulnerability_serverless_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k 'https:///api/v/policies/vulnerability/serverless' \ +$ curl 'https:///api/v/policies/vulnerability/serverless' \ -X PUT \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-04/desc/policies/vulnerability_vms_get.md b/openapi-specs/compute/32-04/desc/policies/vulnerability_vms_get.md index 117d2cc4a..e37c1520f 100644 --- a/openapi-specs/compute/32-04/desc/policies/vulnerability_vms_get.md +++ b/openapi-specs/compute/32-04/desc/policies/vulnerability_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Hosts > V The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/policies/vulnerability_vms_impacted_get.md b/openapi-specs/compute/32-04/desc/policies/vulnerability_vms_impacted_get.md index 29d9621ea..f1a7f7ef5 100644 --- a/openapi-specs/compute/32-04/desc/policies/vulnerability_vms_impacted_get.md +++ b/openapi-specs/compute/32-04/desc/policies/vulnerability_vms_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/vms?project=&ruleName=' ``` diff --git a/openapi-specs/compute/32-04/desc/profiles/app-embedded_download_get.md b/openapi-specs/compute/32-04/desc/profiles/app-embedded_download_get.md index 4b3f7ff8a..2e8cac56d 100644 --- a/openapi-specs/compute/32-04/desc/profiles/app-embedded_download_get.md +++ b/openapi-specs/compute/32-04/desc/profiles/app-embedded_download_get.md @@ -5,7 +5,7 @@ Downloads the app-embedded observations in a CSV format. Refer to the following example cURL command that downloads all the app-embedded runtime profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/profiles/app-embedded_get.md b/openapi-specs/compute/32-04/desc/profiles/app-embedded_get.md index f3ddb3125..c332061e5 100644 --- a/openapi-specs/compute/32-04/desc/profiles/app-embedded_get.md +++ b/openapi-specs/compute/32-04/desc/profiles/app-embedded_get.md @@ -5,7 +5,7 @@ Retrieves the app-embedded observations. Refer to the following example cURL command that lists all the app-embedded runtime: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/profiles/container_download_get.md b/openapi-specs/compute/32-04/desc/profiles/container_download_get.md index ad7a86101..ee9d5e9e4 100644 --- a/openapi-specs/compute/32-04/desc/profiles/container_download_get.md +++ b/openapi-specs/compute/32-04/desc/profiles/container_download_get.md @@ -6,7 +6,7 @@ Retrieves the details and state of all runtime models in CSV format. Refer to the following example cURL command that downloads a complete list in CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/profiles/container_filters_get.md b/openapi-specs/compute/32-04/desc/profiles/container_filters_get.md index 8b6122b80..13535b520 100644 --- a/openapi-specs/compute/32-04/desc/profiles/container_filters_get.md +++ b/openapi-specs/compute/32-04/desc/profiles/container_filters_get.md @@ -4,7 +4,7 @@ Returns a list of os and images from page monitor/runtime/container-models in Co Example curl command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/profiles/container_get.md b/openapi-specs/compute/32-04/desc/profiles/container_get.md index cdbc24c3e..59a3764fb 100644 --- a/openapi-specs/compute/32-04/desc/profiles/container_get.md +++ b/openapi-specs/compute/32-04/desc/profiles/container_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of all runtime models. Refer to the following example cURL command that lists all runtime models in a system: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/profiles/container_learn_post.md b/openapi-specs/compute/32-04/desc/profiles/container_learn_post.md index 5fef2e31e..2c1d08af1 100644 --- a/openapi-specs/compute/32-04/desc/profiles/container_learn_post.md +++ b/openapi-specs/compute/32-04/desc/profiles/container_learn_post.md @@ -7,7 +7,7 @@ For more information, refer to [Learning mode](https://docs.prismacloud.io/en/cl Refer to the following example cURL command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/profiles/host_download_get.md b/openapi-specs/compute/32-04/desc/profiles/host_download_get.md index ace270a32..2dfb51ec0 100644 --- a/openapi-specs/compute/32-04/desc/profiles/host_download_get.md +++ b/openapi-specs/compute/32-04/desc/profiles/host_download_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of each host service runtime model in CSV format Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/profiles/host_get.md b/openapi-specs/compute/32-04/desc/profiles/host_get.md index 208a24de3..55d8bf8ff 100644 --- a/openapi-specs/compute/32-04/desc/profiles/host_get.md +++ b/openapi-specs/compute/32-04/desc/profiles/host_get.md @@ -15,7 +15,7 @@ The returned JSON object has the following structure: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/profiles/host_id_rule_get.md b/openapi-specs/compute/32-04/desc/profiles/host_id_rule_get.md index 672cb4c62..8be668fca 100644 --- a/openapi-specs/compute/32-04/desc/profiles/host_id_rule_get.md +++ b/openapi-specs/compute/32-04/desc/profiles/host_id_rule_get.md @@ -10,7 +10,7 @@ This is the `PROFILE_ID`. The following example command uses curl and basic auth to specify the learning mode for a profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/profiles/service_download_get.md b/openapi-specs/compute/32-04/desc/profiles/service_download_get.md index 63dff3354..4c1c431c1 100644 --- a/openapi-specs/compute/32-04/desc/profiles/service_download_get.md +++ b/openapi-specs/compute/32-04/desc/profiles/service_download_get.md @@ -1,7 +1,7 @@ Retrieves the details and state of all host service runtime models in CSV format ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/profiles/service_get.md b/openapi-specs/compute/32-04/desc/profiles/service_get.md index a4f8c348d..5d786d919 100644 --- a/openapi-specs/compute/32-04/desc/profiles/service_get.md +++ b/openapi-specs/compute/32-04/desc/profiles/service_get.md @@ -10,7 +10,7 @@ The returned JSON object has the following structure: Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/profiles/service_id_learn_post.md b/openapi-specs/compute/32-04/desc/profiles/service_id_learn_post.md index fb338b80d..fa85fc3a2 100644 --- a/openapi-specs/compute/32-04/desc/profiles/service_id_learn_post.md +++ b/openapi-specs/compute/32-04/desc/profiles/service_id_learn_post.md @@ -11,7 +11,7 @@ The `PROFILE_ID` is typically the service's name, such as `sshd` or `ntpd`. The following example command uses curl and basic auth to specify the learning mode for a host service profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/profiles/service_learn_post.md b/openapi-specs/compute/32-04/desc/profiles/service_learn_post.md index 02a1f299e..ceff8e5a5 100644 --- a/openapi-specs/compute/32-04/desc/profiles/service_learn_post.md +++ b/openapi-specs/compute/32-04/desc/profiles/service_learn_post.md @@ -3,7 +3,7 @@ Specify the learning mode for all host service profiles. The following example command uses curl and basic auth to specify the learning mode for all host service profiles. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/profiles/service_names_get.md b/openapi-specs/compute/32-04/desc/profiles/service_names_get.md index 7da863545..afae56f0d 100644 --- a/openapi-specs/compute/32-04/desc/profiles/service_names_get.md +++ b/openapi-specs/compute/32-04/desc/profiles/service_names_get.md @@ -3,7 +3,7 @@ Retrieves the name of all host service runtime models from within the app at **M The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/projects/get.md b/openapi-specs/compute/32-04/desc/projects/get.md index 05485c24c..1ac04d2c0 100644 --- a/openapi-specs/compute/32-04/desc/projects/get.md +++ b/openapi-specs/compute/32-04/desc/projects/get.md @@ -3,7 +3,7 @@ Lists all projects visible to the given user. Assuming the given user is an admin, the following example curl command would list all projects: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/projects/name_delete.md b/openapi-specs/compute/32-04/desc/projects/name_delete.md index fba889f7e..0a34e72a2 100644 --- a/openapi-specs/compute/32-04/desc/projects/name_delete.md +++ b/openapi-specs/compute/32-04/desc/projects/name_delete.md @@ -6,7 +6,7 @@ The value for `` can be retrieved from the `_id` field in the resp The DELETE method returns the decommissioned supervisor's admin username and password. ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/compute/32-04/desc/projects/name_put.md b/openapi-specs/compute/32-04/desc/projects/name_put.md index b5a83a67d..1bde9b0c7 100644 --- a/openapi-specs/compute/32-04/desc/projects/name_put.md +++ b/openapi-specs/compute/32-04/desc/projects/name_put.md @@ -4,7 +4,7 @@ The following example curl command updates a project named ``. The value for `` can be retrieved from the `_id` field in the response object from `GET /api/v1/projects`. ```bash -$ curl -k \ +$ curl \ -u \ -X PUT \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/compute/32-04/desc/projects/post.md b/openapi-specs/compute/32-04/desc/projects/post.md index 8862c0fd4..38c574173 100644 --- a/openapi-specs/compute/32-04/desc/projects/post.md +++ b/openapi-specs/compute/32-04/desc/projects/post.md @@ -3,7 +3,7 @@ Provisions a new project. The following example curl command provisions a new project named `my-project`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ $ curl -k \ If you have installed a new instance of Console, and you have already created an initial admin user for it, then you can specify the admin username name and password when you provision the project. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/projects/projects.md b/openapi-specs/compute/32-04/desc/projects/projects.md index 7e7dcff66..19c904e9e 100644 --- a/openapi-specs/compute/32-04/desc/projects/projects.md +++ b/openapi-specs/compute/32-04/desc/projects/projects.md @@ -20,7 +20,7 @@ If `project` is not specified, it is set to `Central+Console`. For example, to retrieve the compliance policies for a tenant project named `mobile_payments_division`, use the following curl command: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/radar/container_clean_post.md b/openapi-specs/compute/32-04/desc/radar/container_clean_post.md index 662b6d53f..d4f87e91e 100644 --- a/openapi-specs/compute/32-04/desc/radar/container_clean_post.md +++ b/openapi-specs/compute/32-04/desc/radar/container_clean_post.md @@ -1,7 +1,7 @@ Cleans the container runtime profiles and Radar entities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/radar/container_delete.md b/openapi-specs/compute/32-04/desc/radar/container_delete.md index 4eabe337f..b6cc69cf2 100644 --- a/openapi-specs/compute/32-04/desc/radar/container_delete.md +++ b/openapi-specs/compute/32-04/desc/radar/container_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-04/desc/radar/container_export_get.md b/openapi-specs/compute/32-04/desc/radar/container_export_get.md index 7f577568f..f776c7e6c 100644 --- a/openapi-specs/compute/32-04/desc/radar/container_export_get.md +++ b/openapi-specs/compute/32-04/desc/radar/container_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for containers) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/radar/container_filters_get.md b/openapi-specs/compute/32-04/desc/radar/container_filters_get.md index f66463da1..8d7cd6df3 100644 --- a/openapi-specs/compute/32-04/desc/radar/container_filters_get.md +++ b/openapi-specs/compute/32-04/desc/radar/container_filters_get.md @@ -1,7 +1,7 @@ Returns the namespaces from the container view on the Radar page. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/radar/container_get.md b/openapi-specs/compute/32-04/desc/radar/container_get.md index 280d683d9..404629a25 100644 --- a/openapi-specs/compute/32-04/desc/radar/container_get.md +++ b/openapi-specs/compute/32-04/desc/radar/container_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (container view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/radar/host_delete.md b/openapi-specs/compute/32-04/desc/radar/host_delete.md index 738fa7a7c..b4910a8b7 100644 --- a/openapi-specs/compute/32-04/desc/radar/host_delete.md +++ b/openapi-specs/compute/32-04/desc/radar/host_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two apps in CNNF for hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-04/desc/radar/host_export_get.md b/openapi-specs/compute/32-04/desc/radar/host_export_get.md index dd91b5335..851d6f40f 100644 --- a/openapi-specs/compute/32-04/desc/radar/host_export_get.md +++ b/openapi-specs/compute/32-04/desc/radar/host_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for hosts) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/radar/host_get.md b/openapi-specs/compute/32-04/desc/radar/host_get.md index a12025856..222d075aa 100644 --- a/openapi-specs/compute/32-04/desc/radar/host_get.md +++ b/openapi-specs/compute/32-04/desc/radar/host_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (host view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/radar/serverless_get.md b/openapi-specs/compute/32-04/desc/radar/serverless_get.md index b2f329149..170cfb48d 100644 --- a/openapi-specs/compute/32-04/desc/radar/serverless_get.md +++ b/openapi-specs/compute/32-04/desc/radar/serverless_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/radar/serverless_progress_get.md b/openapi-specs/compute/32-04/desc/radar/serverless_progress_get.md index a11c1ae20..0808dfbf4 100644 --- a/openapi-specs/compute/32-04/desc/radar/serverless_progress_get.md +++ b/openapi-specs/compute/32-04/desc/radar/serverless_progress_get.md @@ -1,7 +1,7 @@ Returns the scan progress from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/radar/serverless_scan_post.md b/openapi-specs/compute/32-04/desc/radar/serverless_scan_post.md index 0d519ba88..2d444ac88 100644 --- a/openapi-specs/compute/32-04/desc/radar/serverless_scan_post.md +++ b/openapi-specs/compute/32-04/desc/radar/serverless_scan_post.md @@ -1,7 +1,7 @@ Initiates a serverless scan of your environments. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/radar/serverless_stop_post.md b/openapi-specs/compute/32-04/desc/radar/serverless_stop_post.md index 5c0bdf186..f15bef34d 100644 --- a/openapi-specs/compute/32-04/desc/radar/serverless_stop_post.md +++ b/openapi-specs/compute/32-04/desc/radar/serverless_stop_post.md @@ -1,7 +1,7 @@ Stops an in-progress serverless scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/rbac/role_delete.md b/openapi-specs/compute/32-04/desc/rbac/role_delete.md index 87015b6e8..46efcf9c9 100644 --- a/openapi-specs/compute/32-04/desc/rbac/role_delete.md +++ b/openapi-specs/compute/32-04/desc/rbac/role_delete.md @@ -4,7 +4,7 @@ System roles and roles assigned to users/groups cannot be deleted. The following example curl command uses basic auth to delete role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-04/desc/rbac/roles_get.md b/openapi-specs/compute/32-04/desc/rbac/roles_get.md index 4cd1d9bc7..112026937 100644 --- a/openapi-specs/compute/32-04/desc/rbac/roles_get.md +++ b/openapi-specs/compute/32-04/desc/rbac/roles_get.md @@ -3,7 +3,7 @@ This endpoint will return a list in JSON format of the roles can be found under The following example curl command uses basic auth to return: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/rbac/roles_post.md b/openapi-specs/compute/32-04/desc/rbac/roles_post.md index 1f20772ce..6988766e8 100644 --- a/openapi-specs/compute/32-04/desc/rbac/roles_post.md +++ b/openapi-specs/compute/32-04/desc/rbac/roles_post.md @@ -37,7 +37,7 @@ The added role must contain the "user" permission with read-write access. This p The following example curl command uses basic auth to create the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/rbac/roles_put.md b/openapi-specs/compute/32-04/desc/rbac/roles_put.md index 34d7b41a7..f62e34ccb 100644 --- a/openapi-specs/compute/32-04/desc/rbac/roles_put.md +++ b/openapi-specs/compute/32-04/desc/rbac/roles_put.md @@ -38,7 +38,7 @@ The updated role must contain the "user" permission with read-write access. This The following example curl command uses basic auth to update the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-04/desc/recovery/backup_get.md b/openapi-specs/compute/32-04/desc/recovery/backup_get.md index 4da46f356..bf735905a 100644 --- a/openapi-specs/compute/32-04/desc/recovery/backup_get.md +++ b/openapi-specs/compute/32-04/desc/recovery/backup_get.md @@ -3,7 +3,7 @@ Returns a list of available backups. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/recovery/backup_id_delete.md b/openapi-specs/compute/32-04/desc/recovery/backup_id_delete.md index ae9c33e90..80cd4c3f6 100644 --- a/openapi-specs/compute/32-04/desc/recovery/backup_id_delete.md +++ b/openapi-specs/compute/32-04/desc/recovery/backup_id_delete.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-04/desc/recovery/backup_id_patch.md b/openapi-specs/compute/32-04/desc/recovery/backup_id_patch.md index 4a78cd67d..b3699972f 100644 --- a/openapi-specs/compute/32-04/desc/recovery/backup_id_patch.md +++ b/openapi-specs/compute/32-04/desc/recovery/backup_id_patch.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/compute/32-04/desc/recovery/backup_post.md b/openapi-specs/compute/32-04/desc/recovery/backup_post.md index f45161712..41436fe5f 100644 --- a/openapi-specs/compute/32-04/desc/recovery/backup_post.md +++ b/openapi-specs/compute/32-04/desc/recovery/backup_post.md @@ -3,7 +3,7 @@ Creates a backup named `backup_name` by invoking the MongoDB dump process. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/recovery/restore_id_post.md b/openapi-specs/compute/32-04/desc/recovery/restore_id_post.md index 850fceeaa..e424641cc 100644 --- a/openapi-specs/compute/32-04/desc/recovery/restore_id_post.md +++ b/openapi-specs/compute/32-04/desc/recovery/restore_id_post.md @@ -5,7 +5,7 @@ Restores Prisma Cloud Compute from the given backup. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/registry/download_get.md b/openapi-specs/compute/32-04/desc/registry/download_get.md index 5a3eb0141..3eef8d50e 100644 --- a/openapi-specs/compute/32-04/desc/registry/download_get.md +++ b/openapi-specs/compute/32-04/desc/registry/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Compliance > Images > Reg Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/registry/get.md b/openapi-specs/compute/32-04/desc/registry/get.md index 96b46382e..7474b119a 100644 --- a/openapi-specs/compute/32-04/desc/registry/get.md +++ b/openapi-specs/compute/32-04/desc/registry/get.md @@ -20,7 +20,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that retrieves a scan report for all images in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -32,7 +32,7 @@ The compact query can be used to get a general overview of the number of Vulnera Refer to the following cURL command that retrieves a compact scan report for the Ubuntu image in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -43,7 +43,7 @@ The name query is synonymous with the filter registry text field in the Console Refer to the following cURL that retrieves the scan report for the image in the registry with the matching **sha256** hash: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -53,7 +53,7 @@ $ curl -k \ Refer to the following cURL command that retrieves the images in the first 10 registries: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/registry/get_registry_progress.md b/openapi-specs/compute/32-04/desc/registry/get_registry_progress.md index 03c5d0896..c08331d5b 100644 --- a/openapi-specs/compute/32-04/desc/registry/get_registry_progress.md +++ b/openapi-specs/compute/32-04/desc/registry/get_registry_progress.md @@ -9,7 +9,7 @@ For a regular scan, use the API path only without any query parameters. Refer to the following example cURL request that retrieves the ongoing scan details for a regular registry scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -63,7 +63,7 @@ For an on-demand scan that is started using the `/registry/scan` endpoint with t Refer to the following example cURL request that retrieves the ongoing scan details for an on-demand registry scan that is started using the `/registry/scan` endpoint for the repository `alpine` with tag `3.16`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/registry/names_get.md b/openapi-specs/compute/32-04/desc/registry/names_get.md index 1e5bed727..f3b8676a8 100644 --- a/openapi-specs/compute/32-04/desc/registry/names_get.md +++ b/openapi-specs/compute/32-04/desc/registry/names_get.md @@ -5,7 +5,7 @@ Retrieves a list of image names from current scanned registry images. The base ` Refer to the following example cURL command that retrieves a list of image names from your scanned registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/registry/scan_post.md b/openapi-specs/compute/32-04/desc/registry/scan_post.md index ce7e19533..96bfd5f16 100644 --- a/openapi-specs/compute/32-04/desc/registry/scan_post.md +++ b/openapi-specs/compute/32-04/desc/registry/scan_post.md @@ -17,7 +17,7 @@ For information on scan result, see [Get Registry Scan Report](https://prisma.pa Refer to the following example cURL command that forces Prisma Cloud Compute to rescan all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -27,7 +27,7 @@ $ curl -k \ Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan a specific image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -52,7 +52,7 @@ For information on scan result, see [Get Registry Scan Report](https://pan.dev/p Refer to the following example cURL command to trigger an on-demand scan for an image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/registry/stop_post.md b/openapi-specs/compute/32-04/desc/registry/stop_post.md index 29e103ac1..05ac2f436 100644 --- a/openapi-specs/compute/32-04/desc/registry/stop_post.md +++ b/openapi-specs/compute/32-04/desc/registry/stop_post.md @@ -5,7 +5,7 @@ Stops current registry scan immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to stop scanning all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/scans/download_get.md b/openapi-specs/compute/32-04/desc/scans/download_get.md index 61a0ccc2d..3785bf562 100644 --- a/openapi-specs/compute/32-04/desc/scans/download_get.md +++ b/openapi-specs/compute/32-04/desc/scans/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Images The following cURL command retrieves and saves your Jenkins and twistcli scan reports to a CSV file called `scans_report.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/scans/filter_get.md b/openapi-specs/compute/32-04/desc/scans/filter_get.md index 58550ad35..df3e9cdb0 100644 --- a/openapi-specs/compute/32-04/desc/scans/filter_get.md +++ b/openapi-specs/compute/32-04/desc/scans/filter_get.md @@ -3,7 +3,7 @@ Retrieves the list of Jenkins projects that have been scanned by the Jenkins plu The following example curl command uses basic auth to retrieve the list of Jenkins project names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/scans/get.md b/openapi-specs/compute/32-04/desc/scans/get.md index 9bc06317f..775d9934f 100644 --- a/openapi-specs/compute/32-04/desc/scans/get.md +++ b/openapi-specs/compute/32-04/desc/scans/get.md @@ -10,7 +10,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command that retrieves the scan reports for all images scanned using the Jenkins CI plugin or the twistcli tool: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -22,7 +22,7 @@ To get the report of a specific scan, add query parameters to narrow the scope o The following cURL command retrieves the scan report for an image with a SHA256 ID of `sha256:f756e84300d8e53006090573dd33abe5b8cfac3e42d104fc4be37f435fe512f3`. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/scans/id_get.md b/openapi-specs/compute/32-04/desc/scans/id_get.md index 7a342ef60..1557b1905 100644 --- a/openapi-specs/compute/32-04/desc/scans/id_get.md +++ b/openapi-specs/compute/32-04/desc/scans/id_get.md @@ -3,7 +3,7 @@ Retrieves all scan reports for images scanned by the Jenkins plugin or twistcli The following example curl command uses basic auth to retrieve the scan report for just an image with a SHA256 ID of `5c3385fd2e76c5c16124c077`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/scripts/console_sh_get.md b/openapi-specs/compute/32-04/desc/scripts/console_sh_get.md index d8f02038f..1622321ca 100644 --- a/openapi-specs/compute/32-04/desc/scripts/console_sh_get.md +++ b/openapi-specs/compute/32-04/desc/scripts/console_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/scripts/defender_ps1_get.md b/openapi-specs/compute/32-04/desc/scripts/defender_ps1_get.md index a47616983..45e4a6133 100644 --- a/openapi-specs/compute/32-04/desc/scripts/defender_ps1_get.md +++ b/openapi-specs/compute/32-04/desc/scripts/defender_ps1_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/scripts/defender_sh_get.md b/openapi-specs/compute/32-04/desc/scripts/defender_sh_get.md index 98ad6cf62..a8a302426 100644 --- a/openapi-specs/compute/32-04/desc/scripts/defender_sh_get.md +++ b/openapi-specs/compute/32-04/desc/scripts/defender_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/serverless/download_get.md b/openapi-specs/compute/32-04/desc/serverless/download_get.md index a8e49ff25..4d7d3adc1 100644 --- a/openapi-specs/compute/32-04/desc/serverless/download_get.md +++ b/openapi-specs/compute/32-04/desc/serverless/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Functio The following cURL command retrieves a list of all serverless resources monitored by Prisma Cloud Compute and saves the results in a CSV file called `serverless.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/serverless/download' \ diff --git a/openapi-specs/compute/32-04/desc/serverless/embed_post.md b/openapi-specs/compute/32-04/desc/serverless/embed_post.md index 6cce784b8..353b5721c 100644 --- a/openapi-specs/compute/32-04/desc/serverless/embed_post.md +++ b/openapi-specs/compute/32-04/desc/serverless/embed_post.md @@ -1,7 +1,7 @@ The following curl command uses basic auth to retrieve a list of all Serverless resources that monitored by Prisma Cloud Compute, and save the results to a CSV file: ```bash -$ curl -k \ +$ curl \ -X POST \ -H "Content-Type: application/octet-stream" \ -u \ diff --git a/openapi-specs/compute/32-04/desc/serverless/get.md b/openapi-specs/compute/32-04/desc/serverless/get.md index 77a0d8a4e..c6c75c480 100644 --- a/openapi-specs/compute/32-04/desc/serverless/get.md +++ b/openapi-specs/compute/32-04/desc/serverless/get.md @@ -10,7 +10,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Functions > Scanned function Refer to the following example cURL command that retrieves the scan reports for serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/serverless/names_get.md b/openapi-specs/compute/32-04/desc/serverless/names_get.md index 62cbcd53b..ab229e0f8 100644 --- a/openapi-specs/compute/32-04/desc/serverless/names_get.md +++ b/openapi-specs/compute/32-04/desc/serverless/names_get.md @@ -1,7 +1,7 @@ The following curl command uses basic auth to retrieve a list of names of all Serverless resources monitored by Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -X GET \ -H "Content-Type: application/json" \ -u \ diff --git a/openapi-specs/compute/32-04/desc/serverless/scan_post.md b/openapi-specs/compute/32-04/desc/serverless/scan_post.md index 159285349..70a3a3b4e 100644 --- a/openapi-specs/compute/32-04/desc/serverless/scan_post.md +++ b/openapi-specs/compute/32-04/desc/serverless/scan_post.md @@ -5,7 +5,7 @@ Re-scan all serverless functions immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/scan diff --git a/openapi-specs/compute/32-04/desc/serverless/stop_post.md b/openapi-specs/compute/32-04/desc/serverless/stop_post.md index 763710842..67c0d2239 100644 --- a/openapi-specs/compute/32-04/desc/serverless/stop_post.md +++ b/openapi-specs/compute/32-04/desc/serverless/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing serverless scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/stop diff --git a/openapi-specs/compute/32-04/desc/settings/alerts_get.md b/openapi-specs/compute/32-04/desc/settings/alerts_get.md index 060114c39..2b25dc6c9 100644 --- a/openapi-specs/compute/32-04/desc/settings/alerts_get.md +++ b/openapi-specs/compute/32-04/desc/settings/alerts_get.md @@ -1,7 +1,7 @@ Retrieves a list of your alert settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/settings/alerts_options_get.md b/openapi-specs/compute/32-04/desc/settings/alerts_options_get.md index 095c1f1b7..aa7a1d250 100644 --- a/openapi-specs/compute/32-04/desc/settings/alerts_options_get.md +++ b/openapi-specs/compute/32-04/desc/settings/alerts_options_get.md @@ -3,7 +3,7 @@ This endpoint will return the alert profile configuration options that can be fo The following example curl command uses basic auth to retrieve all alert profile configuration options: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/settings/alerts_post.md b/openapi-specs/compute/32-04/desc/settings/alerts_post.md index 3acb8d543..cd303f880 100644 --- a/openapi-specs/compute/32-04/desc/settings/alerts_post.md +++ b/openapi-specs/compute/32-04/desc/settings/alerts_post.md @@ -3,7 +3,7 @@ Configure alerts. The following example curl command sets the aggregation period for alerts to one hour. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/settings/certificates_post.md b/openapi-specs/compute/32-04/desc/settings/certificates_post.md index fbdc8a5a9..bd30ea399 100644 --- a/openapi-specs/compute/32-04/desc/settings/certificates_post.md +++ b/openapi-specs/compute/32-04/desc/settings/certificates_post.md @@ -9,7 +9,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to set the validity period for client certificates to seven days: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/32-04/desc/settings/certs_get.md b/openapi-specs/compute/32-04/desc/settings/certs_get.md index ba6674a3c..dbf1d3790 100644 --- a/openapi-specs/compute/32-04/desc/settings/certs_get.md +++ b/openapi-specs/compute/32-04/desc/settings/certs_get.md @@ -6,7 +6,7 @@ Defenders use these names to connect to Console. Refer to the following example cURL request that uses basic auth to retrieve the SANs in Console's cert: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/settings/certs_post.md b/openapi-specs/compute/32-04/desc/settings/certs_post.md index a6e429006..fb2cedee5 100644 --- a/openapi-specs/compute/32-04/desc/settings/certs_post.md +++ b/openapi-specs/compute/32-04/desc/settings/certs_post.md @@ -12,7 +12,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to add `node-01.example.com` to the `subjectAltName` field in the certificate: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/32-04/desc/settings/coderepos_get.md b/openapi-specs/compute/32-04/desc/settings/coderepos_get.md index 6cbfb78cb..286a8d905 100644 --- a/openapi-specs/compute/32-04/desc/settings/coderepos_get.md +++ b/openapi-specs/compute/32-04/desc/settings/coderepos_get.md @@ -20,7 +20,7 @@ Construct the full webhook using Console's publicly accessible DNS name or IP ad Refer to the following example cURL command that retrieves all code repositories to scan, as well as the webhook URL suffix: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/settings/console-certificate_post.md b/openapi-specs/compute/32-04/desc/settings/console-certificate_post.md index 5673af840..392061c8f 100644 --- a/openapi-specs/compute/32-04/desc/settings/console-certificate_post.md +++ b/openapi-specs/compute/32-04/desc/settings/console-certificate_post.md @@ -9,7 +9,7 @@ For the custom TLS certificate for securing browser access, this file must be in Refer to the following example cURL request that uses basic auth and configures the custom certificate to use for securing browser access to the console: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/settings/custom-labels_get.md b/openapi-specs/compute/32-04/desc/settings/custom-labels_get.md index a849dd8a8..19c1cadde 100644 --- a/openapi-specs/compute/32-04/desc/settings/custom-labels_get.md +++ b/openapi-specs/compute/32-04/desc/settings/custom-labels_get.md @@ -5,7 +5,7 @@ Returns the list of alert labels configured in Prisma Cloud Compute. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/settings/custom-labels_post.md b/openapi-specs/compute/32-04/desc/settings/custom-labels_post.md index 6bb66e706..9b0702fe8 100644 --- a/openapi-specs/compute/32-04/desc/settings/custom-labels_post.md +++ b/openapi-specs/compute/32-04/desc/settings/custom-labels_post.md @@ -5,7 +5,7 @@ Creates a custom alert label to augment audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/settings/defender_get.md b/openapi-specs/compute/32-04/desc/settings/defender_get.md index ecb8b6989..cf43bb304 100644 --- a/openapi-specs/compute/32-04/desc/settings/defender_get.md +++ b/openapi-specs/compute/32-04/desc/settings/defender_get.md @@ -5,7 +5,7 @@ Returns the advanced settings for Defenders. Refer to the following example cURL command that gets all advanced settings for Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/settings/forensic_get.md b/openapi-specs/compute/32-04/desc/settings/forensic_get.md index 9c16b70b9..3486b2bf9 100644 --- a/openapi-specs/compute/32-04/desc/settings/forensic_get.md +++ b/openapi-specs/compute/32-04/desc/settings/forensic_get.md @@ -1,7 +1,7 @@ Retrieves the settings for the forensics system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/settings/forensic_post.md b/openapi-specs/compute/32-04/desc/settings/forensic_post.md index 31f809d39..8943842fb 100644 --- a/openapi-specs/compute/32-04/desc/settings/forensic_post.md +++ b/openapi-specs/compute/32-04/desc/settings/forensic_post.md @@ -3,7 +3,7 @@ Configures the forensics system. The following example curl command allocates 100 MB of local disk space for container forensic data and 10 MB for host forensics data. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/settings/initialized_get.md b/openapi-specs/compute/32-04/desc/settings/initialized_get.md index 3134912d1..2af8462f1 100644 --- a/openapi-specs/compute/32-04/desc/settings/initialized_get.md +++ b/openapi-specs/compute/32-04/desc/settings/initialized_get.md @@ -4,7 +4,7 @@ After first installing Console, the first thing you must do is create an admin a Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/settings/intelligence-windows_post.md b/openapi-specs/compute/32-04/desc/settings/intelligence-windows_post.md index c39e256d2..0721dab3b 100644 --- a/openapi-specs/compute/32-04/desc/settings/intelligence-windows_post.md +++ b/openapi-specs/compute/32-04/desc/settings/intelligence-windows_post.md @@ -3,7 +3,7 @@ This endpoint will enable or disable the Windows Intelligence Service from **Man The following example curl command uses basic auth to enable online updates of Windows vulnerabilities from the intelligence stream: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/settings/intelligence_get.md b/openapi-specs/compute/32-04/desc/settings/intelligence_get.md index 26c694246..15e9f24ae 100644 --- a/openapi-specs/compute/32-04/desc/settings/intelligence_get.md +++ b/openapi-specs/compute/32-04/desc/settings/intelligence_get.md @@ -5,7 +5,7 @@ Returns the details about the Intelligence Stream configuration. Refer to the following example cURL command that uses basic auth to retrieve your Intelligence Stream configuration settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/settings/intelligence_post.md b/openapi-specs/compute/32-04/desc/settings/intelligence_post.md index 74b06a3a0..2dbbd0168 100644 --- a/openapi-specs/compute/32-04/desc/settings/intelligence_post.md +++ b/openapi-specs/compute/32-04/desc/settings/intelligence_post.md @@ -7,7 +7,7 @@ For more information, see [Intelligence Stream](https://docs.paloaltonetworks.co Refer to the following example cURL command that uses basic auth to configure settings of your Intelligence Stream. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/settings/latest-version_get.md b/openapi-specs/compute/32-04/desc/settings/latest-version_get.md index c443fa7b5..16601fb5b 100644 --- a/openapi-specs/compute/32-04/desc/settings/latest-version_get.md +++ b/openapi-specs/compute/32-04/desc/settings/latest-version_get.md @@ -3,7 +3,7 @@ Retrieves the version number of the latest available Prisma Cloud Compute releas Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/settings/latest_version_get.md b/openapi-specs/compute/32-04/desc/settings/latest_version_get.md index 18e436668..5c64edff1 100644 --- a/openapi-specs/compute/32-04/desc/settings/latest_version_get.md +++ b/openapi-specs/compute/32-04/desc/settings/latest_version_get.md @@ -1,7 +1,7 @@ This endpoint will return the latest version of the product. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/settings/ldap_get.md b/openapi-specs/compute/32-04/desc/settings/ldap_get.md index 4ad0ad0c9..7d803ba1c 100644 --- a/openapi-specs/compute/32-04/desc/settings/ldap_get.md +++ b/openapi-specs/compute/32-04/desc/settings/ldap_get.md @@ -5,7 +5,7 @@ Returns the LDAP integration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/settings/ldap_post.md b/openapi-specs/compute/32-04/desc/settings/ldap_post.md index c152c7dc5..34bc06ef4 100644 --- a/openapi-specs/compute/32-04/desc/settings/ldap_post.md +++ b/openapi-specs/compute/32-04/desc/settings/ldap_post.md @@ -7,7 +7,7 @@ For more information, see [Active Directory](https://docs.paloaltonetworks.com/p Refer to the following example cURL command that enables the LDAP integration and specifies the parameters required to integrate with an Active Directory service. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/settings/license_get.md b/openapi-specs/compute/32-04/desc/settings/license_get.md index 5c792cae8..2b4b548e3 100644 --- a/openapi-specs/compute/32-04/desc/settings/license_get.md +++ b/openapi-specs/compute/32-04/desc/settings/license_get.md @@ -5,7 +5,7 @@ Returns the details about the installed license. Refer to the following example cURL request that retrieves the license details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/settings/license_post.md b/openapi-specs/compute/32-04/desc/settings/license_post.md index b77800a5f..ce74b0d0f 100644 --- a/openapi-specs/compute/32-04/desc/settings/license_post.md +++ b/openapi-specs/compute/32-04/desc/settings/license_post.md @@ -8,7 +8,7 @@ For more information, see [Licensing](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to set your license: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/settings/logging_get.md b/openapi-specs/compute/32-04/desc/settings/logging_get.md index 6eda3e484..012be5def 100644 --- a/openapi-specs/compute/32-04/desc/settings/logging_get.md +++ b/openapi-specs/compute/32-04/desc/settings/logging_get.md @@ -5,7 +5,7 @@ Returns the logging settings. Refer to the following example cURL request that uses basic auth to retrieve your logging details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/settings/logging_post.md b/openapi-specs/compute/32-04/desc/settings/logging_post.md index 3619d9c0f..8d27ee1b3 100644 --- a/openapi-specs/compute/32-04/desc/settings/logging_post.md +++ b/openapi-specs/compute/32-04/desc/settings/logging_post.md @@ -8,7 +8,7 @@ For more information, see [Logging](https://docs.paloaltonetworks.com/prisma/pri Refer to the following example cURL request that enables verbose scan output for syslog and stdout: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/settings/logon_get.md b/openapi-specs/compute/32-04/desc/settings/logon_get.md index 1559f2405..b1e9164f2 100644 --- a/openapi-specs/compute/32-04/desc/settings/logon_get.md +++ b/openapi-specs/compute/32-04/desc/settings/logon_get.md @@ -5,7 +5,7 @@ Configures the logon settings. Refer to the following example cURL request that uses basic auth to retrieve all current logon settings. ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/settings/logon_post.md b/openapi-specs/compute/32-04/desc/settings/logon_post.md index 5c2b60c9f..691e082fe 100644 --- a/openapi-specs/compute/32-04/desc/settings/logon_post.md +++ b/openapi-specs/compute/32-04/desc/settings/logon_post.md @@ -7,7 +7,7 @@ For more information, see [Logon Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that uses basic auth to set the timeout to 900 seconds (15 minutes): ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/32-04/desc/settings/oauth_get.md b/openapi-specs/compute/32-04/desc/settings/oauth_get.md index 6dcf70fb5..5d997f016 100644 --- a/openapi-specs/compute/32-04/desc/settings/oauth_get.md +++ b/openapi-specs/compute/32-04/desc/settings/oauth_get.md @@ -5,7 +5,7 @@ Returns the OAuth configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/settings/oauth_post.md b/openapi-specs/compute/32-04/desc/settings/oauth_post.md index c593b9237..da3c83d2f 100644 --- a/openapi-specs/compute/32-04/desc/settings/oauth_post.md +++ b/openapi-specs/compute/32-04/desc/settings/oauth_post.md @@ -7,7 +7,7 @@ For more information, see [GitHub OAuth](https://docs.paloaltonetworks.com/prism Refer to the following example cURL response: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/settings/oidc_get.md b/openapi-specs/compute/32-04/desc/settings/oidc_get.md index ee439622b..1f27f93ba 100644 --- a/openapi-specs/compute/32-04/desc/settings/oidc_get.md +++ b/openapi-specs/compute/32-04/desc/settings/oidc_get.md @@ -5,7 +5,7 @@ Returns the OpenID Connect configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/settings/oidc_post.md b/openapi-specs/compute/32-04/desc/settings/oidc_post.md index e0270247e..5bd3a9192 100644 --- a/openapi-specs/compute/32-04/desc/settings/oidc_post.md +++ b/openapi-specs/compute/32-04/desc/settings/oidc_post.md @@ -7,7 +7,7 @@ For more information, see [OIDC](https://docs.paloaltonetworks.com/prisma/prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/settings/pcf_get.md b/openapi-specs/compute/32-04/desc/settings/pcf_get.md index 5dc21eb17..c5e42a823 100644 --- a/openapi-specs/compute/32-04/desc/settings/pcf_get.md +++ b/openapi-specs/compute/32-04/desc/settings/pcf_get.md @@ -3,7 +3,7 @@ This endpoint will return settings for PCF (Pivotal Cloud Foundry)Blobstore scan The following example curl command uses basic auth to retrieve the current PCF Blobstore scanning settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/settings/pcf_post.md b/openapi-specs/compute/32-04/desc/settings/pcf_post.md index 139e947cb..657e14f27 100644 --- a/openapi-specs/compute/32-04/desc/settings/pcf_post.md +++ b/openapi-specs/compute/32-04/desc/settings/pcf_post.md @@ -3,7 +3,7 @@ This endpoint will allow for updating settings for PCF (Pivotal Cloud Foundry) B The following example curl command uses basic auth to set up a PCF Blobstore scanner that scans the last `5` droplets for every droplet in the PCF Blobstore: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/settings/projects_get.md b/openapi-specs/compute/32-04/desc/settings/projects_get.md index f5dd20395..bc95414a1 100644 --- a/openapi-specs/compute/32-04/desc/settings/projects_get.md +++ b/openapi-specs/compute/32-04/desc/settings/projects_get.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command retrieves the state of the Projects feature from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ All API calls must be proxied through Central Console, where the request is auto To retrieve the Projects settings from a supervisor Console, append the `project` query parameter to your request. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/settings/projects_post.md b/openapi-specs/compute/32-04/desc/settings/projects_post.md index d29f8e9d5..b3472e6b9 100644 --- a/openapi-specs/compute/32-04/desc/settings/projects_post.md +++ b/openapi-specs/compute/32-04/desc/settings/projects_post.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command designates `` as master. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/settings/proxy_get.md b/openapi-specs/compute/32-04/desc/settings/proxy_get.md index 9a4922d59..477563069 100644 --- a/openapi-specs/compute/32-04/desc/settings/proxy_get.md +++ b/openapi-specs/compute/32-04/desc/settings/proxy_get.md @@ -5,7 +5,7 @@ Returns the proxy settings for Prisma Cloud Compute containers to access the Int Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/settings/proxy_post.md b/openapi-specs/compute/32-04/desc/settings/proxy_post.md index a1bdc07ed..df926524e 100644 --- a/openapi-specs/compute/32-04/desc/settings/proxy_post.md +++ b/openapi-specs/compute/32-04/desc/settings/proxy_post.md @@ -7,7 +7,7 @@ For more information, see [Proxy Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that specifies the proxy to use to access the Internet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/settings/registry_get.md b/openapi-specs/compute/32-04/desc/settings/registry_get.md index 12745005d..64e70b698 100644 --- a/openapi-specs/compute/32-04/desc/settings/registry_get.md +++ b/openapi-specs/compute/32-04/desc/settings/registry_get.md @@ -17,7 +17,7 @@ Construct the full webhook using the publicly accessible DNS name or IP address, The following cURL command retrieves all the registries to scan and the URL suffix for the registry's webhook URL suffix. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/settings/registry_post.md b/openapi-specs/compute/32-04/desc/settings/registry_post.md index 0fae2c481..f9ff1b8e6 100644 --- a/openapi-specs/compute/32-04/desc/settings/registry_post.md +++ b/openapi-specs/compute/32-04/desc/settings/registry_post.md @@ -30,7 +30,7 @@ The API response returns an HTTP 400 error, if the number of registry specificat Refer to the following example cURL command that configures Prisma Cloud Compute to scan the Ubuntu 16.04 repository on Docker Hub: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -64,7 +64,7 @@ To add settings for a GitLab Container Registry, you must specify the following Refer to the following example cURL command: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/settings/registry_put.md b/openapi-specs/compute/32-04/desc/settings/registry_put.md index 3768914f6..75d6c79a2 100644 --- a/openapi-specs/compute/32-04/desc/settings/registry_put.md +++ b/openapi-specs/compute/32-04/desc/settings/registry_put.md @@ -127,7 +127,7 @@ To remove a registry from the list: To delete all entries, submit an empty `specifications` array. For example: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-04/desc/settings/saml_get.md b/openapi-specs/compute/32-04/desc/settings/saml_get.md index f2228a440..4fb940e80 100644 --- a/openapi-specs/compute/32-04/desc/settings/saml_get.md +++ b/openapi-specs/compute/32-04/desc/settings/saml_get.md @@ -5,7 +5,7 @@ Returns the configured SAML settings that is used to authenticate to the Prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/settings/saml_post.md b/openapi-specs/compute/32-04/desc/settings/saml_post.md index 0bd9c4a25..dfe8d380f 100644 --- a/openapi-specs/compute/32-04/desc/settings/saml_post.md +++ b/openapi-specs/compute/32-04/desc/settings/saml_post.md @@ -7,7 +7,7 @@ For more information, see [Okta via SAML 2.0](https://docs.paloaltonetworks.com/ Refer to the following example cURL request that uses the basic auth to set up and enable the SAML integration with Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/settings/scan_get.md b/openapi-specs/compute/32-04/desc/settings/scan_get.md index 5c1df30a2..543ea7662 100644 --- a/openapi-specs/compute/32-04/desc/settings/scan_get.md +++ b/openapi-specs/compute/32-04/desc/settings/scan_get.md @@ -5,7 +5,7 @@ Returns the global settings for image, host, container, and registry scanning. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/settings/scan_post.md b/openapi-specs/compute/32-04/desc/settings/scan_post.md index f043d1c9f..9ddb521a2 100644 --- a/openapi-specs/compute/32-04/desc/settings/scan_post.md +++ b/openapi-specs/compute/32-04/desc/settings/scan_post.md @@ -9,7 +9,7 @@ Refer to the following example cURL request that configures the following scan i * Scan images, containers, and hosts once per day. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/settings/secrets_get.md b/openapi-specs/compute/32-04/desc/settings/secrets_get.md index 75e2b32c7..339009641 100644 --- a/openapi-specs/compute/32-04/desc/settings/secrets_get.md +++ b/openapi-specs/compute/32-04/desc/settings/secrets_get.md @@ -3,7 +3,7 @@ This endpoint will return configured secret store already configured in the cons The following example curl command retrieves any configured secret stores, as well as the refresh period in hours: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/settings/secrets_post.md b/openapi-specs/compute/32-04/desc/settings/secrets_post.md index d302ecdf8..730d031bf 100644 --- a/openapi-specs/compute/32-04/desc/settings/secrets_post.md +++ b/openapi-specs/compute/32-04/desc/settings/secrets_post.md @@ -5,7 +5,7 @@ Please note the data structure returned from endpoint /settings/secrets GET to s Refer to the following example curl command that adds a CyberArk secret store to the console with the appID set to `Prisma_Cloud_Compute_Console` and set the URL to `https://services-myca.twistlock.com:10882`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/settings/serverless-scan_get.md b/openapi-specs/compute/32-04/desc/settings/serverless-scan_get.md index bb8ce06ba..eb42e4a12 100644 --- a/openapi-specs/compute/32-04/desc/settings/serverless-scan_get.md +++ b/openapi-specs/compute/32-04/desc/settings/serverless-scan_get.md @@ -8,7 +8,7 @@ This endpoint maps to the **Function scope** table data in the **Defend > Vulner Refer to the following example cURL command that retrieves a list of serverless scan scopes: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/settings/serverless_get.md b/openapi-specs/compute/32-04/desc/settings/serverless_get.md index b6122c460..8c654807c 100644 --- a/openapi-specs/compute/32-04/desc/settings/serverless_get.md +++ b/openapi-specs/compute/32-04/desc/settings/serverless_get.md @@ -3,7 +3,7 @@ This endpoint will return any configured serverless function scanners found in * The following example curl command uses basic auth to retrieve serverless settings in an array, sorted by Cloud Provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/settings/serverless_post.md b/openapi-specs/compute/32-04/desc/settings/serverless_post.md index 6e26ea1d3..c0e0f3225 100644 --- a/openapi-specs/compute/32-04/desc/settings/serverless_post.md +++ b/openapi-specs/compute/32-04/desc/settings/serverless_post.md @@ -3,7 +3,7 @@ This endpoint will add serverless function providers to scan for vulnerabilities The following example curl command uses basic auth to add a serverless account to scan for serverless functions. This is assuming that you already have the [credential](https://docs.twistlock.com/docs/latest/configure/credentials_store.html) added to the console that is needed to scan that provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/settings/system_get.md b/openapi-specs/compute/32-04/desc/settings/system_get.md index 6f893abf0..0e8a3cba3 100644 --- a/openapi-specs/compute/32-04/desc/settings/system_get.md +++ b/openapi-specs/compute/32-04/desc/settings/system_get.md @@ -3,7 +3,7 @@ This endpoint will return all system settings in JSON format. The following example curl command does exactly that: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/settings/tas_get.md b/openapi-specs/compute/32-04/desc/settings/tas_get.md index 52f392433..d2d0017f0 100644 --- a/openapi-specs/compute/32-04/desc/settings/tas_get.md +++ b/openapi-specs/compute/32-04/desc/settings/tas_get.md @@ -5,7 +5,7 @@ Retrieves Tanzu Application Service (TAS) settings. Refer to the following example cURL command that retrieves all TAS settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/settings/telemetry_get.md b/openapi-specs/compute/32-04/desc/settings/telemetry_get.md index 6460c3fc3..46a807e77 100644 --- a/openapi-specs/compute/32-04/desc/settings/telemetry_get.md +++ b/openapi-specs/compute/32-04/desc/settings/telemetry_get.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that retrieves the settings if telemetry is enabled or not: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/settings/telemetry_post.md b/openapi-specs/compute/32-04/desc/settings/telemetry_post.md index bc97a6d0f..662846f33 100644 --- a/openapi-specs/compute/32-04/desc/settings/telemetry_post.md +++ b/openapi-specs/compute/32-04/desc/settings/telemetry_post.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to turn off telemetry: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/settings/trusted_certificate_post.md b/openapi-specs/compute/32-04/desc/settings/trusted_certificate_post.md index 5a2a30bda..c54b96fa5 100644 --- a/openapi-specs/compute/32-04/desc/settings/trusted_certificate_post.md +++ b/openapi-specs/compute/32-04/desc/settings/trusted_certificate_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/trusted-certificates` endpoint. Refer to the following example cURL request that uses basic auth to add a certificate to the list: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/32-04/desc/settings/trusted_certificates_post.md b/openapi-specs/compute/32-04/desc/settings/trusted_certificates_post.md index 78c07982b..e9bdc72a1 100644 --- a/openapi-specs/compute/32-04/desc/settings/trusted_certificates_post.md +++ b/openapi-specs/compute/32-04/desc/settings/trusted_certificates_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/certificates` endpoint. Refer to the following example cURL request that uses basic auth to enable this feature: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/32-04/desc/settings/vm_get.md b/openapi-specs/compute/32-04/desc/settings/vm_get.md index 8043742f5..b98b94240 100644 --- a/openapi-specs/compute/32-04/desc/settings/vm_get.md +++ b/openapi-specs/compute/32-04/desc/settings/vm_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **VM images scope** table data in the **Defend > Vulne Refer to the following example cURL command that retrieves all the scopes used for pattern matching on VM functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/signup/post.md b/openapi-specs/compute/32-04/desc/signup/post.md index 1db21df29..67344a0b1 100644 --- a/openapi-specs/compute/32-04/desc/signup/post.md +++ b/openapi-specs/compute/32-04/desc/signup/post.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i The following cURL command creates the initial admin user with the username `admin` and password `password`. ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -X POST \ -d '{"username": "admin", "password": "password"}' \ diff --git a/openapi-specs/compute/32-04/desc/static/capabilities_get.md b/openapi-specs/compute/32-04/desc/static/capabilities_get.md index ea119d2a9..f9b60278c 100644 --- a/openapi-specs/compute/32-04/desc/static/capabilities_get.md +++ b/openapi-specs/compute/32-04/desc/static/capabilities_get.md @@ -1,7 +1,7 @@ Returns a list of capabilities used in host models. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/static/regions_get.md b/openapi-specs/compute/32-04/desc/static/regions_get.md index 4a07097ee..3b1adb5f1 100644 --- a/openapi-specs/compute/32-04/desc/static/regions_get.md +++ b/openapi-specs/compute/32-04/desc/static/regions_get.md @@ -1,7 +1,7 @@ Returns a list of regions used in cloud radar. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/static/syscalls_get.md b/openapi-specs/compute/32-04/desc/static/syscalls_get.md index 9e2ddcde7..09505ba39 100644 --- a/openapi-specs/compute/32-04/desc/static/syscalls_get.md +++ b/openapi-specs/compute/32-04/desc/static/syscalls_get.md @@ -2,7 +2,7 @@ Returns a list of the Linux kernel system calls. Runtime rules for containers can allow-list and deny-list specific system calls. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/static/vulnerabilities_get.md b/openapi-specs/compute/32-04/desc/static/vulnerabilities_get.md index cb6acab28..19809472b 100644 --- a/openapi-specs/compute/32-04/desc/static/vulnerabilities_get.md +++ b/openapi-specs/compute/32-04/desc/static/vulnerabilities_get.md @@ -3,7 +3,7 @@ This data can be used for building out reports with the API. This data can be correlated with the `/api/v1/images` endpoint, specifically the the `complianceVulnerabilities` and `cveVulnerabilities` objects, to generate more thorough reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/stats/compliance.md b/openapi-specs/compute/32-04/desc/stats/compliance.md index 5c5be3991..4f4c90071 100644 --- a/openapi-specs/compute/32-04/desc/stats/compliance.md +++ b/openapi-specs/compute/32-04/desc/stats/compliance.md @@ -5,7 +5,7 @@ For the current day, the response will also include detailed compliance stats fo The following example command that uses curl and basic auth to retrieve compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/stats/compliance_get.md b/openapi-specs/compute/32-04/desc/stats/compliance_get.md index 314f6a179..2ef2f9f75 100644 --- a/openapi-specs/compute/32-04/desc/stats/compliance_get.md +++ b/openapi-specs/compute/32-04/desc/stats/compliance_get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Compliance > Compliance explorer* Refer to the following example cURL command that retrieves compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/stats/compliance_refresh.md b/openapi-specs/compute/32-04/desc/stats/compliance_refresh.md index b75491a69..d8ce211a8 100644 --- a/openapi-specs/compute/32-04/desc/stats/compliance_refresh.md +++ b/openapi-specs/compute/32-04/desc/stats/compliance_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/compliance endpoint return The following example command that uses curl and basic auth to refresh compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/stats/compliance_refresh_post.md b/openapi-specs/compute/32-04/desc/stats/compliance_refresh_post.md index 541a54d16..0f329d1db 100644 --- a/openapi-specs/compute/32-04/desc/stats/compliance_refresh_post.md +++ b/openapi-specs/compute/32-04/desc/stats/compliance_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/compliance`, b Refer to the following example cURL command that refreshes compliance statistics for the current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/stats/daily.md b/openapi-specs/compute/32-04/desc/stats/daily.md index 082f58a27..9fd4c6138 100644 --- a/openapi-specs/compute/32-04/desc/stats/daily.md +++ b/openapi-specs/compute/32-04/desc/stats/daily.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/stats/daily_get.md b/openapi-specs/compute/32-04/desc/stats/daily_get.md index 0db89bdc3..fe852126c 100644 --- a/openapi-specs/compute/32-04/desc/stats/daily_get.md +++ b/openapi-specs/compute/32-04/desc/stats/daily_get.md @@ -3,7 +3,7 @@ Returns a historical list of per-day statistics for the resources protected by P The following example command uses curl and basic auth to retrieve the daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/stats/dashboard.md b/openapi-specs/compute/32-04/desc/stats/dashboard.md index be90a2d32..1e5fabf08 100644 --- a/openapi-specs/compute/32-04/desc/stats/dashboard.md +++ b/openapi-specs/compute/32-04/desc/stats/dashboard.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/stats/dashboard_get.md b/openapi-specs/compute/32-04/desc/stats/dashboard_get.md index 601769645..8f0bc827c 100644 --- a/openapi-specs/compute/32-04/desc/stats/dashboard_get.md +++ b/openapi-specs/compute/32-04/desc/stats/dashboard_get.md @@ -5,7 +5,7 @@ Returns statistics about the resources protected by Prisma Cloud Compute, includ Refer to the following example cURL command that retrieves dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/stats/events_get.md b/openapi-specs/compute/32-04/desc/stats/events_get.md index 3be5eb4e7..e64f98e57 100644 --- a/openapi-specs/compute/32-04/desc/stats/events_get.md +++ b/openapi-specs/compute/32-04/desc/stats/events_get.md @@ -5,7 +5,7 @@ Returns events statistics for your environment. Refer to the following example cURL command retrieves event stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/stats/vulnerabilities.md b/openapi-specs/compute/32-04/desc/stats/vulnerabilities.md index 40c4dd1f1..199cfab62 100644 --- a/openapi-specs/compute/32-04/desc/stats/vulnerabilities.md +++ b/openapi-specs/compute/32-04/desc/stats/vulnerabilities.md @@ -5,7 +5,7 @@ For the current day, the response will also include descriptions of the CVEs cur The following example command that uses curl and basic auth to retrieve vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/stats/vulnerabilities_download_get.md b/openapi-specs/compute/32-04/desc/stats/vulnerabilities_download_get.md index 753af8c7f..9930a636b 100644 --- a/openapi-specs/compute/32-04/desc/stats/vulnerabilities_download_get.md +++ b/openapi-specs/compute/32-04/desc/stats/vulnerabilities_download_get.md @@ -17,7 +17,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a summary count of the CVEs and detailed descriptions for each CVE in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/stats/vulnerabilities_get.md b/openapi-specs/compute/32-04/desc/stats/vulnerabilities_get.md index 1a6f1c152..aaa5a907b 100644 --- a/openapi-specs/compute/32-04/desc/stats/vulnerabilities_get.md +++ b/openapi-specs/compute/32-04/desc/stats/vulnerabilities_get.md @@ -19,7 +19,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a summary count of the CVEs and detailed descriptions for each CVE: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/stats/vulnerabilities_impacted_resources_download_get.md b/openapi-specs/compute/32-04/desc/stats/vulnerabilities_impacted_resources_download_get.md index 0821d6a9f..502c09a6c 100644 --- a/openapi-specs/compute/32-04/desc/stats/vulnerabilities_impacted_resources_download_get.md +++ b/openapi-specs/compute/32-04/desc/stats/vulnerabilities_impacted_resources_download_get.md @@ -15,7 +15,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a list of impacted resources for `CVE-2015-0313` in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/stats/vulnerabilities_impacted_resources_get.md b/openapi-specs/compute/32-04/desc/stats/vulnerabilities_impacted_resources_get.md index c1e6d0ba2..014a5f4a2 100644 --- a/openapi-specs/compute/32-04/desc/stats/vulnerabilities_impacted_resources_get.md +++ b/openapi-specs/compute/32-04/desc/stats/vulnerabilities_impacted_resources_get.md @@ -18,7 +18,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a list of impacted resources for `CVE-2022-28391`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -95,7 +95,7 @@ Refer to the following example JSON response that shows the risk tree for the im Refer to the following example cURL command that retrieves a the impacted registry images `CVE-2015-0313` by using an optional query parameter `resourceType`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -108,7 +108,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a paginated list of impacted resources for `CVE-2015-0313` by using optional query parameters `limit` and `offset`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/stats/vulnerabilities_refresh.md b/openapi-specs/compute/32-04/desc/stats/vulnerabilities_refresh.md index 505a99d98..2aa7da8a1 100644 --- a/openapi-specs/compute/32-04/desc/stats/vulnerabilities_refresh.md +++ b/openapi-specs/compute/32-04/desc/stats/vulnerabilities_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/vulnerabilities endpoint r The following example command that uses curl and basic auth to refresh vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/stats/vulnerabilities_refresh_post.md b/openapi-specs/compute/32-04/desc/stats/vulnerabilities_refresh_post.md index 1e3210e18..85e3ddd7a 100644 --- a/openapi-specs/compute/32-04/desc/stats/vulnerabilities_refresh_post.md +++ b/openapi-specs/compute/32-04/desc/stats/vulnerabilities_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/vulnerabilitie Refer to the following example cURL command that refreshes the vulnerability statistics for current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/stats/workload_get.md b/openapi-specs/compute/32-04/desc/stats/workload_get.md index a25deed5c..940a835ee 100644 --- a/openapi-specs/compute/32-04/desc/stats/workload_get.md +++ b/openapi-specs/compute/32-04/desc/stats/workload_get.md @@ -1,7 +1,7 @@ Returns the workload statistics from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/statuses/intelligence.md b/openapi-specs/compute/32-04/desc/statuses/intelligence.md index 74da8c7ff..ac102e81f 100644 --- a/openapi-specs/compute/32-04/desc/statuses/intelligence.md +++ b/openapi-specs/compute/32-04/desc/statuses/intelligence.md @@ -3,7 +3,7 @@ Returns the connection status of the intelligence stream and the last intelligen The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/statuses/intelligence_get.md b/openapi-specs/compute/32-04/desc/statuses/intelligence_get.md index c18dd9611..b5f620ad9 100644 --- a/openapi-specs/compute/32-04/desc/statuses/intelligence_get.md +++ b/openapi-specs/compute/32-04/desc/statuses/intelligence_get.md @@ -3,7 +3,7 @@ Returns the connection status for the Intelligence Stream, along with the time o The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/statuses/registry_get.md b/openapi-specs/compute/32-04/desc/statuses/registry_get.md index 427c4915c..e4fd09fe9 100644 --- a/openapi-specs/compute/32-04/desc/statuses/registry_get.md +++ b/openapi-specs/compute/32-04/desc/statuses/registry_get.md @@ -13,7 +13,7 @@ To view the more details about the progress of a regular or on-demand registry s Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/statuses/secrets_get.md b/openapi-specs/compute/32-04/desc/statuses/secrets_get.md index 510f15161..e77c5ed70 100644 --- a/openapi-specs/compute/32-04/desc/statuses/secrets_get.md +++ b/openapi-specs/compute/32-04/desc/statuses/secrets_get.md @@ -3,7 +3,7 @@ Returns the connection status of any secret stores you have configured, as well The following is an example curl using basic auth to find the secret store status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/statuses/serverless-radar_get.md b/openapi-specs/compute/32-04/desc/statuses/serverless-radar_get.md index 3bfdbb5bf..4ab5d0c1d 100644 --- a/openapi-specs/compute/32-04/desc/statuses/serverless-radar_get.md +++ b/openapi-specs/compute/32-04/desc/statuses/serverless-radar_get.md @@ -1,7 +1,7 @@ Returns the status of the serverless scans. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/tags/get.md b/openapi-specs/compute/32-04/desc/tags/get.md index 6da7ad135..604eee98e 100644 --- a/openapi-specs/compute/32-04/desc/tags/get.md +++ b/openapi-specs/compute/32-04/desc/tags/get.md @@ -5,7 +5,7 @@ Retrieves a list of tags. Refer to the following example cURL command that retrieves a list of tags: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/tags/name_delete.md b/openapi-specs/compute/32-04/desc/tags/name_delete.md index 2ed010e57..6dedfce8f 100644 --- a/openapi-specs/compute/32-04/desc/tags/name_delete.md +++ b/openapi-specs/compute/32-04/desc/tags/name_delete.md @@ -5,7 +5,7 @@ Deletes a tag from the system. Refer to the following example cURL command that deletes a tag named *my tag*: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-04/desc/tags/name_put.md b/openapi-specs/compute/32-04/desc/tags/name_put.md index cbaea40d3..a5923b8ef 100644 --- a/openapi-specs/compute/32-04/desc/tags/name_put.md +++ b/openapi-specs/compute/32-04/desc/tags/name_put.md @@ -9,7 +9,7 @@ You must define all parameters in your PUT request. Refer to the following example cURL command that updates the parameters in a tag named `my_tag`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-04/desc/tags/post.md b/openapi-specs/compute/32-04/desc/tags/post.md index d55ae8b96..8e1a493d6 100644 --- a/openapi-specs/compute/32-04/desc/tags/post.md +++ b/openapi-specs/compute/32-04/desc/tags/post.md @@ -8,7 +8,7 @@ You can use tags as policy exceptions or assign them to vulnerabilities for acti Refer to the following example cURL command that creates a tag named "my-tag": ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/tags/tag_cve_delete.md b/openapi-specs/compute/32-04/desc/tags/tag_cve_delete.md index 8caed79cf..3031029b9 100644 --- a/openapi-specs/compute/32-04/desc/tags/tag_cve_delete.md +++ b/openapi-specs/compute/32-04/desc/tags/tag_cve_delete.md @@ -6,7 +6,7 @@ When you delete a tag, the tag is deleted from a wider scope. All the packages a Refer to the following example cURL command that removes the tag named `ignored` from the CVE `CVE-2017-15088`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-04/desc/tags/tag_cve_post.md b/openapi-specs/compute/32-04/desc/tags/tag_cve_post.md index 966a80bd8..1b4ead89b 100644 --- a/openapi-specs/compute/32-04/desc/tags/tag_cve_post.md +++ b/openapi-specs/compute/32-04/desc/tags/tag_cve_post.md @@ -45,7 +45,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the source package `perl`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -72,7 +72,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2021-20305` on the binary package `gnutls`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -98,7 +98,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -120,7 +120,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `image` and to all the packages and resources. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -140,7 +140,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `host`, resource `servo-vmware71`, and to all the packages. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/tas-droplets/download_get.md b/openapi-specs/compute/32-04/desc/tas-droplets/download_get.md index 6372f0b35..f9d82820d 100644 --- a/openapi-specs/compute/32-04/desc/tas-droplets/download_get.md +++ b/openapi-specs/compute/32-04/desc/tas-droplets/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > VMware The following cURL command downloads all TAS droplets to a CSV file called `tas_droplets.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/tas-droplets/get.md b/openapi-specs/compute/32-04/desc/tas-droplets/get.md index dd2b44993..a0a97e8ca 100644 --- a/openapi-specs/compute/32-04/desc/tas-droplets/get.md +++ b/openapi-specs/compute/32-04/desc/tas-droplets/get.md @@ -10,7 +10,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > VMware Tanzu bl The following cURL command retrieves all TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/tas-droplets/get_tas_addresses.md b/openapi-specs/compute/32-04/desc/tas-droplets/get_tas_addresses.md index 91ebb2e50..04c6dccb0 100644 --- a/openapi-specs/compute/32-04/desc/tas-droplets/get_tas_addresses.md +++ b/openapi-specs/compute/32-04/desc/tas-droplets/get_tas_addresses.md @@ -9,7 +9,7 @@ You get an HTTP error response 429 if the limit exceeds. The following cURL command retrieves the Cloud Controller Addresses of scanned TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/tas-droplets/progress_get.md b/openapi-specs/compute/32-04/desc/tas-droplets/progress_get.md index 504a21e84..507d001bf 100644 --- a/openapi-specs/compute/32-04/desc/tas-droplets/progress_get.md +++ b/openapi-specs/compute/32-04/desc/tas-droplets/progress_get.md @@ -5,7 +5,7 @@ Returns the details of the TAS Droplets ongoing scan. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/tas-droplets/scan_post.md b/openapi-specs/compute/32-04/desc/tas-droplets/scan_post.md index aad2174af..13c4eeeb9 100644 --- a/openapi-specs/compute/32-04/desc/tas-droplets/scan_post.md +++ b/openapi-specs/compute/32-04/desc/tas-droplets/scan_post.md @@ -5,7 +5,7 @@ Scans the TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/tas-droplets/stop_post.md b/openapi-specs/compute/32-04/desc/tas-droplets/stop_post.md index 5f5a019b1..53d709ec7 100644 --- a/openapi-specs/compute/32-04/desc/tas-droplets/stop_post.md +++ b/openapi-specs/compute/32-04/desc/tas-droplets/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing scan of TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/trust/data_get.md b/openapi-specs/compute/32-04/desc/trust/data_get.md index dd55d47a3..88983f139 100644 --- a/openapi-specs/compute/32-04/desc/trust/data_get.md +++ b/openapi-specs/compute/32-04/desc/trust/data_get.md @@ -5,7 +5,7 @@ Returns the trusted registries, repositories, and images. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/trust/data_put.md b/openapi-specs/compute/32-04/desc/trust/data_put.md index 0e6a0ba49..733514505 100644 --- a/openapi-specs/compute/32-04/desc/trust/data_put.md +++ b/openapi-specs/compute/32-04/desc/trust/data_put.md @@ -6,7 +6,7 @@ Specify trusted images using either the image name or layers properties. Refer to the following example cURL command that uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -19,7 +19,7 @@ To edit a trust group based on image base layers, use PUT to specify a list of S Refer to the following example that specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-04/desc/trust/get.md b/openapi-specs/compute/32-04/desc/trust/get.md index 1226cd0a3..57ff5bdb5 100644 --- a/openapi-specs/compute/32-04/desc/trust/get.md +++ b/openapi-specs/compute/32-04/desc/trust/get.md @@ -3,7 +3,7 @@ Retrieves a list of all trusted images. The following example curl command uses basic auth to retrieve all trusted images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/trust/id_delete.md b/openapi-specs/compute/32-04/desc/trust/id_delete.md index b3114775f..d63cdf71a 100644 --- a/openapi-specs/compute/32-04/desc/trust/id_delete.md +++ b/openapi-specs/compute/32-04/desc/trust/id_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to specify a image trust grou ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-04/desc/trust/id_put.md b/openapi-specs/compute/32-04/desc/trust/id_put.md index 44d2c8b8b..c98617bcd 100644 --- a/openapi-specs/compute/32-04/desc/trust/id_put.md +++ b/openapi-specs/compute/32-04/desc/trust/id_put.md @@ -9,7 +9,7 @@ For more information about handles, see the `_id` in the response body for the G The following example curl command uses basic auth to modify the image property for an existing trusted image entry, where the handle for the entry is `docker-ubuntu-group`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-04/desc/trust/learn_get.md b/openapi-specs/compute/32-04/desc/trust/learn_get.md index d8a3414d0..004b16b02 100644 --- a/openapi-specs/compute/32-04/desc/trust/learn_get.md +++ b/openapi-specs/compute/32-04/desc/trust/learn_get.md @@ -1,7 +1,7 @@ Returns the state of the trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/trust/learn_post.md b/openapi-specs/compute/32-04/desc/trust/learn_post.md index 094817738..008657fa2 100644 --- a/openapi-specs/compute/32-04/desc/trust/learn_post.md +++ b/openapi-specs/compute/32-04/desc/trust/learn_post.md @@ -1,7 +1,7 @@ Sets the state of trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/trust/post.md b/openapi-specs/compute/32-04/desc/trust/post.md index 1072275a1..23a324c6c 100644 --- a/openapi-specs/compute/32-04/desc/trust/post.md +++ b/openapi-specs/compute/32-04/desc/trust/post.md @@ -7,7 +7,7 @@ For more information about handles, see the `_id` key in the response body for t The following example curl command uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ To create a trust group based on image base layers, POST a list of SHA256 hashes The following example specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/users/get.md b/openapi-specs/compute/32-04/desc/users/get.md index e4e6966ec..cd5a661ba 100644 --- a/openapi-specs/compute/32-04/desc/users/get.md +++ b/openapi-specs/compute/32-04/desc/users/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Manage > Authentication > Users** in the Console UI. The following cURL command retrieves all users. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/users/id_delete.md b/openapi-specs/compute/32-04/desc/users/id_delete.md index 1cfa5642d..66a1102f9 100644 --- a/openapi-specs/compute/32-04/desc/users/id_delete.md +++ b/openapi-specs/compute/32-04/desc/users/id_delete.md @@ -17,7 +17,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes user `ID` from the system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-04/desc/util/osx_twistcli_arm64_get.md b/openapi-specs/compute/32-04/desc/util/osx_twistcli_arm64_get.md index b385d0d3b..a30686374 100644 --- a/openapi-specs/compute/32-04/desc/util/osx_twistcli_arm64_get.md +++ b/openapi-specs/compute/32-04/desc/util/osx_twistcli_arm64_get.md @@ -7,7 +7,7 @@ Downloads the twistcli binary executable for MacOS platforms based on ARM64 arch Refer to the following example cURL command that downloads and saves the “twistcli” binary executable for ARM64 bit MacOS platforms to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/compute/32-04/desc/util/osx_twistcli_get.md b/openapi-specs/compute/32-04/desc/util/osx_twistcli_get.md index c49f96c41..2353ea338 100644 --- a/openapi-specs/compute/32-04/desc/util/osx_twistcli_get.md +++ b/openapi-specs/compute/32-04/desc/util/osx_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **MacOS platform** hyperlink in **Manage > System > Ut The following cURL command downloads the twistcli binary executable for MacOS platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli \ diff --git a/openapi-specs/compute/32-04/desc/util/twistcli_arm64_get.md b/openapi-specs/compute/32-04/desc/util/twistcli_arm64_get.md index 7ec36d3f5..a3d7318ab 100644 --- a/openapi-specs/compute/32-04/desc/util/twistcli_arm64_get.md +++ b/openapi-specs/compute/32-04/desc/util/twistcli_arm64_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/compute/32-04/desc/util/twistcli_get.md b/openapi-specs/compute/32-04/desc/util/twistcli_get.md index f9d2d295c..08a3ae8aa 100644 --- a/openapi-specs/compute/32-04/desc/util/twistcli_get.md +++ b/openapi-specs/compute/32-04/desc/util/twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -X GET -o \ 'https:///api/v/util/twistcli' diff --git a/openapi-specs/compute/32-04/desc/util/twistlock_jenkins_plugin_get.md b/openapi-specs/compute/32-04/desc/util/twistlock_jenkins_plugin_get.md index 9fb8d4a02..c9f180e5e 100644 --- a/openapi-specs/compute/32-04/desc/util/twistlock_jenkins_plugin_get.md +++ b/openapi-specs/compute/32-04/desc/util/twistlock_jenkins_plugin_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-jenkins-plugin.hpi \ diff --git a/openapi-specs/compute/32-04/desc/util/twistlock_tas_tile_get.md b/openapi-specs/compute/32-04/desc/util/twistlock_tas_tile_get.md index fea28aaad..3fd114e2d 100644 --- a/openapi-specs/compute/32-04/desc/util/twistlock_tas_tile_get.md +++ b/openapi-specs/compute/32-04/desc/util/twistlock_tas_tile_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-tile.pivotal \ diff --git a/openapi-specs/compute/32-04/desc/util/windows_twistcli_get.md b/openapi-specs/compute/32-04/desc/util/windows_twistcli_get.md index 1c545dbbb..38c609b08 100644 --- a/openapi-specs/compute/32-04/desc/util/windows_twistcli_get.md +++ b/openapi-specs/compute/32-04/desc/util/windows_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Windows platform** hyperlink in **Manage > System > The following cURL command downloads the twistcli binary executable for Windows platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli.exe \ diff --git a/openapi-specs/compute/32-04/desc/version/get.md b/openapi-specs/compute/32-04/desc/version/get.md index 28be315e0..5787e90fd 100644 --- a/openapi-specs/compute/32-04/desc/version/get.md +++ b/openapi-specs/compute/32-04/desc/version/get.md @@ -5,7 +5,7 @@ Retrieves the version number for Console. The following cURL command retrieves the version number for Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/vms/download_get.md b/openapi-specs/compute/32-04/desc/vms/download_get.md index e65e4efc9..3cc813bc5 100644 --- a/openapi-specs/compute/32-04/desc/vms/download_get.md +++ b/openapi-specs/compute/32-04/desc/vms/download_get.md @@ -7,7 +7,7 @@ Returns all VM image scan reports in CSV format. Refer to the following example cURL command that retrieves all VM image scan reports and saves the results in a CSV file called `vm_images_scan.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/vms/get.md b/openapi-specs/compute/32-04/desc/vms/get.md index d44d9d801..ad9938124 100644 --- a/openapi-specs/compute/32-04/desc/vms/get.md +++ b/openapi-specs/compute/32-04/desc/vms/get.md @@ -10,7 +10,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > Hosts > VM imag Refer to the following example cURL command that retrieves all VM image scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/vms/labels_get.md b/openapi-specs/compute/32-04/desc/vms/labels_get.md index ad678b30d..eb2674bf6 100644 --- a/openapi-specs/compute/32-04/desc/vms/labels_get.md +++ b/openapi-specs/compute/32-04/desc/vms/labels_get.md @@ -5,7 +5,7 @@ Returns an array of strings containing all AWS tags of the scanned VM images. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-04/desc/vms/names_get.md b/openapi-specs/compute/32-04/desc/vms/names_get.md index 0283ed28e..0b905c37b 100644 --- a/openapi-specs/compute/32-04/desc/vms/names_get.md +++ b/openapi-specs/compute/32-04/desc/vms/names_get.md @@ -6,7 +6,7 @@ Returns an array of strings containing VM image names. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-04/desc/vms/scan_post.md b/openapi-specs/compute/32-04/desc/vms/scan_post.md index 1caa2dcaf..4d4de3ab1 100644 --- a/openapi-specs/compute/32-04/desc/vms/scan_post.md +++ b/openapi-specs/compute/32-04/desc/vms/scan_post.md @@ -5,7 +5,7 @@ Re-scans all VM images immediately. This endpoint returns the time that the scan Refer to the following example cURL command that forces Prisma Cloud to re-scan all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-04/desc/vms/stop_post.md b/openapi-specs/compute/32-04/desc/vms/stop_post.md index 4a74743eb..49b2b26f9 100644 --- a/openapi-specs/compute/32-04/desc/vms/stop_post.md +++ b/openapi-specs/compute/32-04/desc/vms/stop_post.md @@ -7,7 +7,7 @@ Note: It might take a few minutes for the scan to stop completely. Refer to the following example cURL command that forces Prisma Cloud to stop scanning all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/SCAP/get.md b/openapi-specs/compute/32-05/desc/SCAP/get.md index a25abe94e..f5870d822 100644 --- a/openapi-specs/compute/32-05/desc/SCAP/get.md +++ b/openapi-specs/compute/32-05/desc/SCAP/get.md @@ -3,7 +3,7 @@ This endpoint will return any SCAP datastreams uploaded to the console. This end The following is an example curl command that uses basic auth to retrieve any uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/SCAP/id_delete.md b/openapi-specs/compute/32-05/desc/SCAP/id_delete.md index 39f1b0132..52923f20a 100644 --- a/openapi-specs/compute/32-05/desc/SCAP/id_delete.md +++ b/openapi-specs/compute/32-05/desc/SCAP/id_delete.md @@ -3,7 +3,7 @@ This endpoint will delete any SCAP datastreams uploaded to the console. You can The following is an example curl command that uses basic auth to delete an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-05/desc/SCAP/post.md b/openapi-specs/compute/32-05/desc/SCAP/post.md index d459a0e97..c45fd6b4e 100644 --- a/openapi-specs/compute/32-05/desc/SCAP/post.md +++ b/openapi-specs/compute/32-05/desc/SCAP/post.md @@ -3,7 +3,7 @@ This endpoint will allow you to add a SCAP datastream to the console. The following is an example curl command that uses basic auth to add an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/_ping/get.md b/openapi-specs/compute/32-05/desc/_ping/get.md index 8e143ef67..b7ffdc653 100644 --- a/openapi-specs/compute/32-05/desc/_ping/get.md +++ b/openapi-specs/compute/32-05/desc/_ping/get.md @@ -5,7 +5,7 @@ Checks if Console is reachable from your network host. Refer to the following cURL example command that pings Console and prints the HTTP response code: ```bash -$ curl -k \ +$ curl \ -s \ -o /dev/null \ -w "%{http_code}\n" \ diff --git a/openapi-specs/compute/32-05/desc/agentless/get_agentless_progress.md b/openapi-specs/compute/32-05/desc/agentless/get_agentless_progress.md index b98ed9da5..78396eec6 100644 --- a/openapi-specs/compute/32-05/desc/agentless/get_agentless_progress.md +++ b/openapi-specs/compute/32-05/desc/agentless/get_agentless_progress.md @@ -5,7 +5,7 @@ Shows the progress of an ongoing scan on hosts or containers for vulnerabilities Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/agentless/post_agentless_scan.md b/openapi-specs/compute/32-05/desc/agentless/post_agentless_scan.md index f1295cdc4..e2f8a4e11 100644 --- a/openapi-specs/compute/32-05/desc/agentless/post_agentless_scan.md +++ b/openapi-specs/compute/32-05/desc/agentless/post_agentless_scan.md @@ -9,7 +9,7 @@ Make sure that you download (use the agentless/templates API) and apply the perm Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/agentless/post_agentless_stop.md b/openapi-specs/compute/32-05/desc/agentless/post_agentless_stop.md index ab83960cc..ddee6ec7a 100644 --- a/openapi-specs/compute/32-05/desc/agentless/post_agentless_stop.md +++ b/openapi-specs/compute/32-05/desc/agentless/post_agentless_stop.md @@ -5,7 +5,7 @@ Stops an ongoing scan on hosts or containers for vulnerabilities and compliance. Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/agentless/post_agentless_templates.md b/openapi-specs/compute/32-05/desc/agentless/post_agentless_templates.md index 96be32555..5159c439a 100644 --- a/openapi-specs/compute/32-05/desc/agentless/post_agentless_templates.md +++ b/openapi-specs/compute/32-05/desc/agentless/post_agentless_templates.md @@ -31,7 +31,7 @@ Add the supported cloud accounts (AWS, Azure, GCP, and OCI) in Prisma Cloud Comp Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/alert-profiles/get.md b/openapi-specs/compute/32-05/desc/alert-profiles/get.md index 82647e248..f17191ac4 100644 --- a/openapi-specs/compute/32-05/desc/alert-profiles/get.md +++ b/openapi-specs/compute/32-05/desc/alert-profiles/get.md @@ -3,7 +3,7 @@ Retrieve a list of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/alert-profiles/id_delete.md b/openapi-specs/compute/32-05/desc/alert-profiles/id_delete.md index 1a67fe20e..2cf21b57e 100644 --- a/openapi-specs/compute/32-05/desc/alert-profiles/id_delete.md +++ b/openapi-specs/compute/32-05/desc/alert-profiles/id_delete.md @@ -5,7 +5,7 @@ This method has no response data. The following example curl command deletes an existing alert profile named `PROFILE-NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-05/desc/alert-profiles/names_get.md b/openapi-specs/compute/32-05/desc/alert-profiles/names_get.md index cac14437b..38a1f78ca 100644 --- a/openapi-specs/compute/32-05/desc/alert-profiles/names_get.md +++ b/openapi-specs/compute/32-05/desc/alert-profiles/names_get.md @@ -3,7 +3,7 @@ Retrieve a list of only the names of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles' names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/alert-profiles/post.md b/openapi-specs/compute/32-05/desc/alert-profiles/post.md index 9fa643429..19db863d5 100644 --- a/openapi-specs/compute/32-05/desc/alert-profiles/post.md +++ b/openapi-specs/compute/32-05/desc/alert-profiles/post.md @@ -3,7 +3,7 @@ Update an existing alert profile created in the system. The following example curl command uses basic auth to add a Jira Alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/alert-profiles/test_post.md b/openapi-specs/compute/32-05/desc/alert-profiles/test_post.md index 1fc745efa..2205a6e73 100644 --- a/openapi-specs/compute/32-05/desc/alert-profiles/test_post.md +++ b/openapi-specs/compute/32-05/desc/alert-profiles/test_post.md @@ -3,7 +3,7 @@ Sends a test alert to verify successful configuration of the alert profile setti The following example curl command uses basic auth to send test alert for an email alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/application-control/get.md b/openapi-specs/compute/32-05/desc/application-control/get.md index 5bd600beb..535584284 100644 --- a/openapi-specs/compute/32-05/desc/application-control/get.md +++ b/openapi-specs/compute/32-05/desc/application-control/get.md @@ -3,7 +3,7 @@ Retrieves the host application control rules. The following example curl command uses basic auth to retrieve the control rules: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/access_delete.md b/openapi-specs/compute/32-05/desc/audits/access_delete.md index 37f33ca64..0450b534c 100644 --- a/openapi-specs/compute/32-05/desc/audits/access_delete.md +++ b/openapi-specs/compute/32-05/desc/audits/access_delete.md @@ -2,7 +2,7 @@ Deletes **all** access audits. This deletion cannot be undone. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-05/desc/audits/access_download_get.md b/openapi-specs/compute/32-05/desc/audits/access_download_get.md index 1700deb8d..8d8fee259 100644 --- a/openapi-specs/compute/32-05/desc/audits/access_download_get.md +++ b/openapi-specs/compute/32-05/desc/audits/access_download_get.md @@ -3,7 +3,7 @@ Returns the docker access audit events data in CSV format that are logged and ag **Note**: You can download the access events from Console under **Monitor > Events > Docker audits > Download CSV**. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/access_filters_get.md b/openapi-specs/compute/32-05/desc/audits/access_filters_get.md index 00ac061c1..4b8e9cd9b 100644 --- a/openapi-specs/compute/32-05/desc/audits/access_filters_get.md +++ b/openapi-specs/compute/32-05/desc/audits/access_filters_get.md @@ -5,7 +5,7 @@ The following example uses basic auth to list history of commands that are run o ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ The following command gives list of sudo events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -27,7 +27,7 @@ $ curl -k \ The following command gives list of SSHD events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/access_get.md b/openapi-specs/compute/32-05/desc/audits/access_get.md index 2401391c7..56e53fe12 100644 --- a/openapi-specs/compute/32-05/desc/audits/access_get.md +++ b/openapi-specs/compute/32-05/desc/audits/access_get.md @@ -8,7 +8,7 @@ You can configure Prisma Cloud Compute to log and aggregate events such as sudo Refer to the following example cURL command that gives a list of all access audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/admission_download_get.md b/openapi-specs/compute/32-05/desc/audits/admission_download_get.md index 9571c483f..d45f47c4e 100644 --- a/openapi-specs/compute/32-05/desc/audits/admission_download_get.md +++ b/openapi-specs/compute/32-05/desc/audits/admission_download_get.md @@ -4,7 +4,7 @@ Returns the access admission events data in CSV format that were alerted or bloc Refer to the following example cURL command that downloads the admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/admission_get.md b/openapi-specs/compute/32-05/desc/audits/admission_get.md index 84414496c..3640c737c 100644 --- a/openapi-specs/compute/32-05/desc/audits/admission_get.md +++ b/openapi-specs/compute/32-05/desc/audits/admission_get.md @@ -4,7 +4,7 @@ Returns all activities that were alerted or blocked by Defender functioning as O Refer to the following example cURL command that gives a list of all admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/firewall_network_container_download_get.md b/openapi-specs/compute/32-05/desc/audits/firewall_network_container_download_get.md index 29029ac6d..434e09acd 100644 --- a/openapi-specs/compute/32-05/desc/audits/firewall_network_container_download_get.md +++ b/openapi-specs/compute/32-05/desc/audits/firewall_network_container_download_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/firewall_network_container_get.md b/openapi-specs/compute/32-05/desc/audits/firewall_network_container_get.md index 454558a44..be03b2c45 100644 --- a/openapi-specs/compute/32-05/desc/audits/firewall_network_container_get.md +++ b/openapi-specs/compute/32-05/desc/audits/firewall_network_container_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/firewall_network_host_download_get.md b/openapi-specs/compute/32-05/desc/audits/firewall_network_host_download_get.md index 768dd00d7..e83e8e1c3 100644 --- a/openapi-specs/compute/32-05/desc/audits/firewall_network_host_download_get.md +++ b/openapi-specs/compute/32-05/desc/audits/firewall_network_host_download_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/firewall_network_host_get.md b/openapi-specs/compute/32-05/desc/audits/firewall_network_host_get.md index e5dc4c399..6cbda0d4b 100644 --- a/openapi-specs/compute/32-05/desc/audits/firewall_network_host_get.md +++ b/openapi-specs/compute/32-05/desc/audits/firewall_network_host_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/incidents_archive_patch.md b/openapi-specs/compute/32-05/desc/audits/incidents_archive_patch.md index a1127a001..d1f42eedd 100644 --- a/openapi-specs/compute/32-05/desc/audits/incidents_archive_patch.md +++ b/openapi-specs/compute/32-05/desc/audits/incidents_archive_patch.md @@ -7,7 +7,7 @@ You can get an incident ID from the list of incidents using the endpoint GET /ap Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/compute/32-05/desc/audits/incidents_download_get.md b/openapi-specs/compute/32-05/desc/audits/incidents_download_get.md index 2266c3471..5958756bf 100644 --- a/openapi-specs/compute/32-05/desc/audits/incidents_download_get.md +++ b/openapi-specs/compute/32-05/desc/audits/incidents_download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the **CSV** hyperlink in **Monitor > Runtime > Incident ex The following cURL command downloads all incidents and saves the result in a CSV file called `incidents.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/incidents_filters_get.md b/openapi-specs/compute/32-05/desc/audits/incidents_filters_get.md index 7d1c6f303..856881c90 100644 --- a/openapi-specs/compute/32-05/desc/audits/incidents_filters_get.md +++ b/openapi-specs/compute/32-05/desc/audits/incidents_filters_get.md @@ -3,7 +3,7 @@ This endpoint lists the incident categories found in your environment. The following example lists incident filters. ```bash -$ curl -k \ +$ curl \ -u \ https://console:8083/api/v1/audits/incidents/filters ``` diff --git a/openapi-specs/compute/32-05/desc/audits/incidents_get.md b/openapi-specs/compute/32-05/desc/audits/incidents_get.md index 7724a08c1..9b9451821 100644 --- a/openapi-specs/compute/32-05/desc/audits/incidents_get.md +++ b/openapi-specs/compute/32-05/desc/audits/incidents_get.md @@ -9,7 +9,7 @@ This endpoint maps to the table in **Monitor > Runtime > Incident explorer** in Refer to the following example cURL command that retrieves a list of unacknowledged incidents (not in the archived state): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/kubernetes_download_get.md b/openapi-specs/compute/32-05/desc/audits/kubernetes_download_get.md index 6008bd92a..62992095c 100644 --- a/openapi-specs/compute/32-05/desc/audits/kubernetes_download_get.md +++ b/openapi-specs/compute/32-05/desc/audits/kubernetes_download_get.md @@ -7,7 +7,7 @@ Returns the audit events data that occur in an integrated Kubernetes cluster tha Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/kubernetes_get.md b/openapi-specs/compute/32-05/desc/audits/kubernetes_get.md index e1ecb8a88..2e3f51b71 100644 --- a/openapi-specs/compute/32-05/desc/audits/kubernetes_get.md +++ b/openapi-specs/compute/32-05/desc/audits/kubernetes_get.md @@ -7,7 +7,7 @@ Retrieves events that occur in an integrated Kubernetes cluster that you configu Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/mgmt_download_get.md b/openapi-specs/compute/32-05/desc/audits/mgmt_download_get.md index ae3ef45b6..bcee17342 100644 --- a/openapi-specs/compute/32-05/desc/audits/mgmt_download_get.md +++ b/openapi-specs/compute/32-05/desc/audits/mgmt_download_get.md @@ -10,7 +10,7 @@ Management audits are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/mgmt_filters_get.md b/openapi-specs/compute/32-05/desc/audits/mgmt_filters_get.md index 854977b99..f910a4c2a 100644 --- a/openapi-specs/compute/32-05/desc/audits/mgmt_filters_get.md +++ b/openapi-specs/compute/32-05/desc/audits/mgmt_filters_get.md @@ -6,7 +6,7 @@ Use these filters to query management audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/mgmt_get.md b/openapi-specs/compute/32-05/desc/audits/mgmt_get.md index 5b586cb5e..abe802348 100644 --- a/openapi-specs/compute/32-05/desc/audits/mgmt_get.md +++ b/openapi-specs/compute/32-05/desc/audits/mgmt_get.md @@ -10,7 +10,7 @@ Management audit events are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/runtime_app_embedded_download_get.md b/openapi-specs/compute/32-05/desc/audits/runtime_app_embedded_download_get.md index f3d844ead..ec5ae0f2a 100644 --- a/openapi-specs/compute/32-05/desc/audits/runtime_app_embedded_download_get.md +++ b/openapi-specs/compute/32-05/desc/audits/runtime_app_embedded_download_get.md @@ -5,7 +5,7 @@ Returns the app-embedded runtime audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/runtime_app_embedded_get.md b/openapi-specs/compute/32-05/desc/audits/runtime_app_embedded_get.md index c1d72acfa..51a43b7f5 100644 --- a/openapi-specs/compute/32-05/desc/audits/runtime_app_embedded_get.md +++ b/openapi-specs/compute/32-05/desc/audits/runtime_app_embedded_get.md @@ -5,7 +5,7 @@ Retrieves all app-embedded runtime audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/runtime_container_delete.md b/openapi-specs/compute/32-05/desc/audits/runtime_container_delete.md index ddc8e82d6..62050c71f 100644 --- a/openapi-specs/compute/32-05/desc/audits/runtime_container_delete.md +++ b/openapi-specs/compute/32-05/desc/audits/runtime_container_delete.md @@ -3,7 +3,7 @@ Deletes all container runtime audits. The following example curl command uses basic auth to delete all the audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-05/desc/audits/runtime_container_download_get.md b/openapi-specs/compute/32-05/desc/audits/runtime_container_download_get.md index 20e673b5e..81286d929 100644 --- a/openapi-specs/compute/32-05/desc/audits/runtime_container_download_get.md +++ b/openapi-specs/compute/32-05/desc/audits/runtime_container_download_get.md @@ -6,7 +6,7 @@ Returns the container audit events data in CSV format when a runtime sensor such Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o \ diff --git a/openapi-specs/compute/32-05/desc/audits/runtime_container_get.md b/openapi-specs/compute/32-05/desc/audits/runtime_container_get.md index 11beffb24..a6b6ba484 100644 --- a/openapi-specs/compute/32-05/desc/audits/runtime_container_get.md +++ b/openapi-specs/compute/32-05/desc/audits/runtime_container_get.md @@ -7,7 +7,7 @@ Retrieves all container audit events when a runtime sensor such as process, netw Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/runtime_container_timeslice_get.md b/openapi-specs/compute/32-05/desc/audits/runtime_container_timeslice_get.md index f65d477af..01df48f28 100644 --- a/openapi-specs/compute/32-05/desc/audits/runtime_container_timeslice_get.md +++ b/openapi-specs/compute/32-05/desc/audits/runtime_container_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/runtime_file-integrity_download_get.md b/openapi-specs/compute/32-05/desc/audits/runtime_file-integrity_download_get.md index 99ec70c52..234c3ce32 100644 --- a/openapi-specs/compute/32-05/desc/audits/runtime_file-integrity_download_get.md +++ b/openapi-specs/compute/32-05/desc/audits/runtime_file-integrity_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for file-integrity checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/runtime_file-integrity_get.md b/openapi-specs/compute/32-05/desc/audits/runtime_file-integrity_get.md index 53fec9f9f..c31904422 100644 --- a/openapi-specs/compute/32-05/desc/audits/runtime_file-integrity_get.md +++ b/openapi-specs/compute/32-05/desc/audits/runtime_file-integrity_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for file-integrity checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/runtime_host_delete.md b/openapi-specs/compute/32-05/desc/audits/runtime_host_delete.md index 0ab1c877e..2ada9b15a 100644 --- a/openapi-specs/compute/32-05/desc/audits/runtime_host_delete.md +++ b/openapi-specs/compute/32-05/desc/audits/runtime_host_delete.md @@ -3,7 +3,7 @@ Deletes all host audits from the database. The following example curl command uses basic auth to delete all host audits: ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/audits/runtime/host diff --git a/openapi-specs/compute/32-05/desc/audits/runtime_host_download_get.md b/openapi-specs/compute/32-05/desc/audits/runtime_host_download_get.md index 4d0454f56..d85cc39d0 100644 --- a/openapi-specs/compute/32-05/desc/audits/runtime_host_download_get.md +++ b/openapi-specs/compute/32-05/desc/audits/runtime_host_download_get.md @@ -5,7 +5,7 @@ Returns the runtime host audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/runtime_host_get.md b/openapi-specs/compute/32-05/desc/audits/runtime_host_get.md index 044b8b42d..e063550d6 100644 --- a/openapi-specs/compute/32-05/desc/audits/runtime_host_get.md +++ b/openapi-specs/compute/32-05/desc/audits/runtime_host_get.md @@ -5,7 +5,7 @@ Retrieves the runtime host audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/runtime_host_timeslice_get.md b/openapi-specs/compute/32-05/desc/audits/runtime_host_timeslice_get.md index 8933efa74..aafd869b8 100644 --- a/openapi-specs/compute/32-05/desc/audits/runtime_host_timeslice_get.md +++ b/openapi-specs/compute/32-05/desc/audits/runtime_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/runtime_log-inspection_download_get.md b/openapi-specs/compute/32-05/desc/audits/runtime_log-inspection_download_get.md index f047ed96f..0aa1a5710 100644 --- a/openapi-specs/compute/32-05/desc/audits/runtime_log-inspection_download_get.md +++ b/openapi-specs/compute/32-05/desc/audits/runtime_log-inspection_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for log inspection checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/runtime_log-inspection_get.md b/openapi-specs/compute/32-05/desc/audits/runtime_log-inspection_get.md index 49f0d7be4..8292b623e 100644 --- a/openapi-specs/compute/32-05/desc/audits/runtime_log-inspection_get.md +++ b/openapi-specs/compute/32-05/desc/audits/runtime_log-inspection_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for log inspection checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/runtime_rasp_delete.md b/openapi-specs/compute/32-05/desc/audits/runtime_rasp_delete.md index 688e04038..14315c55b 100644 --- a/openapi-specs/compute/32-05/desc/audits/runtime_rasp_delete.md +++ b/openapi-specs/compute/32-05/desc/audits/runtime_rasp_delete.md @@ -1,7 +1,7 @@ Deletes all RASP Defender runtime audits. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-05/desc/audits/runtime_rasp_download_get.md b/openapi-specs/compute/32-05/desc/audits/runtime_rasp_download_get.md index 303c75858..11a85100d 100644 --- a/openapi-specs/compute/32-05/desc/audits/runtime_rasp_download_get.md +++ b/openapi-specs/compute/32-05/desc/audits/runtime_rasp_download_get.md @@ -1,7 +1,7 @@ Returns CSV data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/runtime_rasp_get.md b/openapi-specs/compute/32-05/desc/audits/runtime_rasp_get.md index 229d908b1..0475cb149 100644 --- a/openapi-specs/compute/32-05/desc/audits/runtime_rasp_get.md +++ b/openapi-specs/compute/32-05/desc/audits/runtime_rasp_get.md @@ -1,7 +1,7 @@ Returns JSON data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/runtime_serverless_delete.md b/openapi-specs/compute/32-05/desc/audits/runtime_serverless_delete.md index 99ada0515..e27ebe858 100644 --- a/openapi-specs/compute/32-05/desc/audits/runtime_serverless_delete.md +++ b/openapi-specs/compute/32-05/desc/audits/runtime_serverless_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to delete the current audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-05/desc/audits/runtime_serverless_download_get.md b/openapi-specs/compute/32-05/desc/audits/runtime_serverless_download_get.md index f829d2342..91693c145 100644 --- a/openapi-specs/compute/32-05/desc/audits/runtime_serverless_download_get.md +++ b/openapi-specs/compute/32-05/desc/audits/runtime_serverless_download_get.md @@ -5,7 +5,7 @@ Returns the scan audit events data in CSV format for any configured serverless f Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/runtime_serverless_filters_get.md b/openapi-specs/compute/32-05/desc/audits/runtime_serverless_filters_get.md index b9bf38610..babda78dd 100644 --- a/openapi-specs/compute/32-05/desc/audits/runtime_serverless_filters_get.md +++ b/openapi-specs/compute/32-05/desc/audits/runtime_serverless_filters_get.md @@ -2,7 +2,7 @@ Returns all serverless filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/runtime_serverless_get.md b/openapi-specs/compute/32-05/desc/audits/runtime_serverless_get.md index 045946886..f6aeb748e 100644 --- a/openapi-specs/compute/32-05/desc/audits/runtime_serverless_get.md +++ b/openapi-specs/compute/32-05/desc/audits/runtime_serverless_get.md @@ -5,7 +5,7 @@ Retrieves all scan events for any configured serverless functions in Prisma Clou Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/runtime_serverless_timeslice_get.md b/openapi-specs/compute/32-05/desc/audits/runtime_serverless_timeslice_get.md index 863890174..a2456cec0 100644 --- a/openapi-specs/compute/32-05/desc/audits/runtime_serverless_timeslice_get.md +++ b/openapi-specs/compute/32-05/desc/audits/runtime_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/trust_delete.md b/openapi-specs/compute/32-05/desc/audits/trust_delete.md index 0bfb2bd81..4aaeef3fe 100644 --- a/openapi-specs/compute/32-05/desc/audits/trust_delete.md +++ b/openapi-specs/compute/32-05/desc/audits/trust_delete.md @@ -1,7 +1,7 @@ Deletes all the trust audits from the events page in Console. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-05/desc/audits/trust_download_get.md b/openapi-specs/compute/32-05/desc/audits/trust_download_get.md index 21c0e55a2..234089449 100644 --- a/openapi-specs/compute/32-05/desc/audits/trust_download_get.md +++ b/openapi-specs/compute/32-05/desc/audits/trust_download_get.md @@ -5,7 +5,7 @@ Returns the trust audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/trust_get.md b/openapi-specs/compute/32-05/desc/audits/trust_get.md index 8fb3a341d..de7d47e96 100644 --- a/openapi-specs/compute/32-05/desc/audits/trust_get.md +++ b/openapi-specs/compute/32-05/desc/audits/trust_get.md @@ -4,7 +4,7 @@ Retrieves all the trust audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/waas_agentless_download_get.md b/openapi-specs/compute/32-05/desc/audits/waas_agentless_download_get.md index bbfcd12f5..f930ef6b3 100644 --- a/openapi-specs/compute/32-05/desc/audits/waas_agentless_download_get.md +++ b/openapi-specs/compute/32-05/desc/audits/waas_agentless_download_get.md @@ -7,7 +7,7 @@ Returns the agentless Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/waas_agentless_get.md b/openapi-specs/compute/32-05/desc/audits/waas_agentless_get.md index ad40ae497..b257b0385 100644 --- a/openapi-specs/compute/32-05/desc/audits/waas_agentless_get.md +++ b/openapi-specs/compute/32-05/desc/audits/waas_agentless_get.md @@ -7,7 +7,7 @@ Retrieves all agentless Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/waas_agentless_timeslice_get.md b/openapi-specs/compute/32-05/desc/audits/waas_agentless_timeslice_get.md index 007c6dba3..3eaf34b25 100644 --- a/openapi-specs/compute/32-05/desc/audits/waas_agentless_timeslice_get.md +++ b/openapi-specs/compute/32-05/desc/audits/waas_agentless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/waas_app_embedded_download_get.md b/openapi-specs/compute/32-05/desc/audits/waas_app_embedded_download_get.md index 149c10376..c94aa87b0 100644 --- a/openapi-specs/compute/32-05/desc/audits/waas_app_embedded_download_get.md +++ b/openapi-specs/compute/32-05/desc/audits/waas_app_embedded_download_get.md @@ -6,7 +6,7 @@ Returns the app-embedded WAAS audit events data in CSV format for the specified Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/waas_app_embedded_get.md b/openapi-specs/compute/32-05/desc/audits/waas_app_embedded_get.md index 400fa447d..6318fb299 100644 --- a/openapi-specs/compute/32-05/desc/audits/waas_app_embedded_get.md +++ b/openapi-specs/compute/32-05/desc/audits/waas_app_embedded_get.md @@ -6,7 +6,7 @@ Returns all app-embedded WAAS audit events for the specified query parameters. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/waas_app_embedded_timeslice_get.md b/openapi-specs/compute/32-05/desc/audits/waas_app_embedded_timeslice_get.md index 79a60038e..42a76d08c 100644 --- a/openapi-specs/compute/32-05/desc/audits/waas_app_embedded_timeslice_get.md +++ b/openapi-specs/compute/32-05/desc/audits/waas_app_embedded_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the app-embedded WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/waas_container_download_get.md b/openapi-specs/compute/32-05/desc/audits/waas_container_download_get.md index 9a5e04fad..7d26c34f4 100644 --- a/openapi-specs/compute/32-05/desc/audits/waas_container_download_get.md +++ b/openapi-specs/compute/32-05/desc/audits/waas_container_download_get.md @@ -6,7 +6,7 @@ Returns the container Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that downloads the WAAS container audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/waas_container_get.md b/openapi-specs/compute/32-05/desc/audits/waas_container_get.md index ac0df80fd..c1ad08f3c 100644 --- a/openapi-specs/compute/32-05/desc/audits/waas_container_get.md +++ b/openapi-specs/compute/32-05/desc/audits/waas_container_get.md @@ -6,7 +6,7 @@ Retrieves all container Web-Application and API Security (WAAS) audits. Refer to the following example cURL command that retrieves all container WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/waas_container_timeslice_get.md b/openapi-specs/compute/32-05/desc/audits/waas_container_timeslice_get.md index a56b4c48f..be56260d6 100644 --- a/openapi-specs/compute/32-05/desc/audits/waas_container_timeslice_get.md +++ b/openapi-specs/compute/32-05/desc/audits/waas_container_timeslice_get.md @@ -11,7 +11,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the container WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s):: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/waas_host_download_get.md b/openapi-specs/compute/32-05/desc/audits/waas_host_download_get.md index 4bc66202b..71692e682 100644 --- a/openapi-specs/compute/32-05/desc/audits/waas_host_download_get.md +++ b/openapi-specs/compute/32-05/desc/audits/waas_host_download_get.md @@ -7,7 +7,7 @@ Returns the host Web-Application and API Security (WAAS) audit events data in CS Refer to the following example cURL command that downloads the host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/waas_host_get.md b/openapi-specs/compute/32-05/desc/audits/waas_host_get.md index 14c967594..f6e3df050 100644 --- a/openapi-specs/compute/32-05/desc/audits/waas_host_get.md +++ b/openapi-specs/compute/32-05/desc/audits/waas_host_get.md @@ -7,7 +7,7 @@ Retrieves all host Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/waas_host_timeslice_get.md b/openapi-specs/compute/32-05/desc/audits/waas_host_timeslice_get.md index e28ed7b7a..67b3a54c3 100644 --- a/openapi-specs/compute/32-05/desc/audits/waas_host_timeslice_get.md +++ b/openapi-specs/compute/32-05/desc/audits/waas_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves host WAAS audit events for a specific time frame: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/waas_serverless_download_get.md b/openapi-specs/compute/32-05/desc/audits/waas_serverless_download_get.md index da05504df..0c0dbe698 100644 --- a/openapi-specs/compute/32-05/desc/audits/waas_serverless_download_get.md +++ b/openapi-specs/compute/32-05/desc/audits/waas_serverless_download_get.md @@ -7,7 +7,7 @@ Returns the serverless function Web-Application and API Security (WAAS) audit ev Refer to the following example cURL command that downloads the serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/waas_serverless_get.md b/openapi-specs/compute/32-05/desc/audits/waas_serverless_get.md index fe482a3f3..82488f7ee 100644 --- a/openapi-specs/compute/32-05/desc/audits/waas_serverless_get.md +++ b/openapi-specs/compute/32-05/desc/audits/waas_serverless_get.md @@ -7,7 +7,7 @@ Retrieves all serverless function Web-Application and API Security (WAAS) audit Refer to the following example cURL command that retrieves all serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/audits/waas_serverless_timeslice_get.md b/openapi-specs/compute/32-05/desc/audits/waas_serverless_timeslice_get.md index ec9ff3df1..a0a9a1368 100644 --- a/openapi-specs/compute/32-05/desc/audits/waas_serverless_timeslice_get.md +++ b/openapi-specs/compute/32-05/desc/audits/waas_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the serverless WAAS audit events for a : ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/authenticate-client/post.md b/openapi-specs/compute/32-05/desc/authenticate-client/post.md index bc493d04e..ce6f00afe 100644 --- a/openapi-specs/compute/32-05/desc/authenticate-client/post.md +++ b/openapi-specs/compute/32-05/desc/authenticate-client/post.md @@ -8,7 +8,7 @@ This endpoint checks the supplied client certificate and authorizes the user bas Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X POST \ --cert \ https:///api/v/authenticate-client diff --git a/openapi-specs/compute/32-05/desc/authenticate/post.md b/openapi-specs/compute/32-05/desc/authenticate/post.md index cb018de64..4f85c5d34 100644 --- a/openapi-specs/compute/32-05/desc/authenticate/post.md +++ b/openapi-specs/compute/32-05/desc/authenticate/post.md @@ -9,7 +9,7 @@ You can set the validity period in Console under **Manage > Authentication > Log Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H "Content-Type: application/json" \ -X POST \ -d \ diff --git a/openapi-specs/compute/32-05/desc/authenticate/renew_get.md b/openapi-specs/compute/32-05/desc/authenticate/renew_get.md index 6040d58e1..3458b500a 100644 --- a/openapi-specs/compute/32-05/desc/authenticate/renew_get.md +++ b/openapi-specs/compute/32-05/desc/authenticate/renew_get.md @@ -5,7 +5,7 @@ Renews an old (unexpired) access token and returns a new token. The following cURL command retrieves a new access token using an old access token. ```bash -$ curl -k \ +$ curl \ -H "Authorization: Bearer " \ https:///api/v1/authenticate/renew ``` diff --git a/openapi-specs/compute/32-05/desc/certs/capem_get.md b/openapi-specs/compute/32-05/desc/certs/capem_get.md index f0f0f1bf3..945476c9b 100644 --- a/openapi-specs/compute/32-05/desc/certs/capem_get.md +++ b/openapi-specs/compute/32-05/desc/certs/capem_get.md @@ -5,7 +5,7 @@ Retrieves the Base64-encoded SSL root certificate self-signed by primary certifi Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/certs/client-certs_get.md b/openapi-specs/compute/32-05/desc/certs/client-certs_get.md index d099b3e3d..279d196b1 100644 --- a/openapi-specs/compute/32-05/desc/certs/client-certs_get.md +++ b/openapi-specs/compute/32-05/desc/certs/client-certs_get.md @@ -3,7 +3,7 @@ Downloads a script that installs a client certificate, client private key, and c The following example curl command uses basic auth to download and run the install script for your client certs: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/certs/client-certs.sh | sh diff --git a/openapi-specs/compute/32-05/desc/certs/server-certs_get.md b/openapi-specs/compute/32-05/desc/certs/server-certs_get.md index 0bb13f51d..118a4d9b0 100644 --- a/openapi-specs/compute/32-05/desc/certs/server-certs_get.md +++ b/openapi-specs/compute/32-05/desc/certs/server-certs_get.md @@ -12,7 +12,7 @@ Retrieves the server certificate bundle from Prisma Cloud Compute that contains Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -u \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/cloud/compliance_download_get.md b/openapi-specs/compute/32-05/desc/cloud/compliance_download_get.md index 7b1ec9fea..14f2725b1 100644 --- a/openapi-specs/compute/32-05/desc/cloud/compliance_download_get.md +++ b/openapi-specs/compute/32-05/desc/cloud/compliance_download_get.md @@ -2,7 +2,7 @@ Download all cloud scan data in CSV format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/cloud/compliance_get.md b/openapi-specs/compute/32-05/desc/cloud/compliance_get.md index 48c2fe5bb..ad47e0998 100644 --- a/openapi-specs/compute/32-05/desc/cloud/compliance_get.md +++ b/openapi-specs/compute/32-05/desc/cloud/compliance_get.md @@ -2,7 +2,7 @@ Returns a list of all cloud compliance scan results. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/cloud/compliance_scan_post.md b/openapi-specs/compute/32-05/desc/cloud/compliance_scan_post.md index 7f87bf1f4..7321c3b9d 100644 --- a/openapi-specs/compute/32-05/desc/cloud/compliance_scan_post.md +++ b/openapi-specs/compute/32-05/desc/cloud/compliance_scan_post.md @@ -2,7 +2,7 @@ Initiates a new cloud compliance scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/cloud/compliance_stop_post.md b/openapi-specs/compute/32-05/desc/cloud/compliance_stop_post.md index df0febb56..60c31dc51 100644 --- a/openapi-specs/compute/32-05/desc/cloud/compliance_stop_post.md +++ b/openapi-specs/compute/32-05/desc/cloud/compliance_stop_post.md @@ -2,7 +2,7 @@ Terminates a cloud compliance scan that's in progress.. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/cloud/discovery_download_get.md b/openapi-specs/compute/32-05/desc/cloud/discovery_download_get.md index 44d60a113..a667c8471 100644 --- a/openapi-specs/compute/32-05/desc/cloud/discovery_download_get.md +++ b/openapi-specs/compute/32-05/desc/cloud/discovery_download_get.md @@ -5,7 +5,7 @@ Downloads all cloud scan data in a CSV file. Refer to the following cURL example command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/cloud/discovery_entities_get.md b/openapi-specs/compute/32-05/desc/cloud/discovery_entities_get.md index a7abbdfb6..85f1be971 100644 --- a/openapi-specs/compute/32-05/desc/cloud/discovery_entities_get.md +++ b/openapi-specs/compute/32-05/desc/cloud/discovery_entities_get.md @@ -7,7 +7,7 @@ Use this API endpoint along with the `GET, api/vVERSION/cloud/discovery` to get Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/cloud/discovery_get.md b/openapi-specs/compute/32-05/desc/cloud/discovery_get.md index 28025f140..c2b4c6e3c 100644 --- a/openapi-specs/compute/32-05/desc/cloud/discovery_get.md +++ b/openapi-specs/compute/32-05/desc/cloud/discovery_get.md @@ -8,7 +8,7 @@ Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/cloud/discovery_scan_post.md b/openapi-specs/compute/32-05/desc/cloud/discovery_scan_post.md index 51799ebdb..0717096f8 100644 --- a/openapi-specs/compute/32-05/desc/cloud/discovery_scan_post.md +++ b/openapi-specs/compute/32-05/desc/cloud/discovery_scan_post.md @@ -5,7 +5,7 @@ Initiates a new cloud discovery scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/cloud/discovery_stop_post.md b/openapi-specs/compute/32-05/desc/cloud/discovery_stop_post.md index 6a6c7a5a5..73dbf46e7 100644 --- a/openapi-specs/compute/32-05/desc/cloud/discovery_stop_post.md +++ b/openapi-specs/compute/32-05/desc/cloud/discovery_stop_post.md @@ -5,7 +5,7 @@ Terminates a cloud discovery scan that's in progress. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/cloud/discovery_vms_get.md b/openapi-specs/compute/32-05/desc/cloud/discovery_vms_get.md index 6766f4e5a..2264a27fe 100644 --- a/openapi-specs/compute/32-05/desc/cloud/discovery_vms_get.md +++ b/openapi-specs/compute/32-05/desc/cloud/discovery_vms_get.md @@ -5,7 +5,7 @@ Returns the discovered cloud VM instances. Refer to the following example cURL command that retrieves all the discovered cloud VM instances: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/coderepos/download_get.md b/openapi-specs/compute/32-05/desc/coderepos/download_get.md index 4ec0197bb..b06dd9f17 100644 --- a/openapi-specs/compute/32-05/desc/coderepos/download_get.md +++ b/openapi-specs/compute/32-05/desc/coderepos/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Code re The following cURL command generates a CSV file containing the reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/coderepos/get.md b/openapi-specs/compute/32-05/desc/coderepos/get.md index 54c4e99bf..42dc16fb6 100644 --- a/openapi-specs/compute/32-05/desc/coderepos/get.md +++ b/openapi-specs/compute/32-05/desc/coderepos/get.md @@ -10,7 +10,7 @@ This endpoint maps to the **Code repositories** table in **Monitor > Vulnerabili The following cURL command retrieves all code repository scan reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/collections/get.md b/openapi-specs/compute/32-05/desc/collections/get.md index 99120d17d..5a9e8a50c 100755 --- a/openapi-specs/compute/32-05/desc/collections/get.md +++ b/openapi-specs/compute/32-05/desc/collections/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table in **Manage > Collections and Tags > Collections Refer to the following example cURL command that returns a list of collections: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/collections/name_delete.md b/openapi-specs/compute/32-05/desc/collections/name_delete.md index 3e2debd01..033358000 100755 --- a/openapi-specs/compute/32-05/desc/collections/name_delete.md +++ b/openapi-specs/compute/32-05/desc/collections/name_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that deletes a collection with the name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-05/desc/collections/name_usages_get.md b/openapi-specs/compute/32-05/desc/collections/name_usages_get.md index 5c9c40424..89e383cce 100755 --- a/openapi-specs/compute/32-05/desc/collections/name_usages_get.md +++ b/openapi-specs/compute/32-05/desc/collections/name_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that retrieves all policies with name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/containers/count_get.md b/openapi-specs/compute/32-05/desc/containers/count_get.md index 4c6ecdcb4..aca59a913 100644 --- a/openapi-specs/compute/32-05/desc/containers/count_get.md +++ b/openapi-specs/compute/32-05/desc/containers/count_get.md @@ -5,7 +5,7 @@ Returns an integer representing the number of containers in your environment. Refer to the following example cURL command that returns the number of containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/containers/download_get.md b/openapi-specs/compute/32-05/desc/containers/download_get.md index 8f581aabe..d76a8de25 100644 --- a/openapi-specs/compute/32-05/desc/containers/download_get.md +++ b/openapi-specs/compute/32-05/desc/containers/download_get.md @@ -9,7 +9,7 @@ You can download the container scan reports in CSV format in Console under **Mon Refer to the following example cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/containers/filters_get.md b/openapi-specs/compute/32-05/desc/containers/filters_get.md index c8a1dfca4..6c2777819 100644 --- a/openapi-specs/compute/32-05/desc/containers/filters_get.md +++ b/openapi-specs/compute/32-05/desc/containers/filters_get.md @@ -1,7 +1,7 @@ Returns all container filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/containers/get.md b/openapi-specs/compute/32-05/desc/containers/get.md index 4cacdde60..3de9dd4af 100644 --- a/openapi-specs/compute/32-05/desc/containers/get.md +++ b/openapi-specs/compute/32-05/desc/containers/get.md @@ -16,7 +16,7 @@ Refer to the following available options for the `fields` query parameters: Refer to the following example cURL command that retrieves a scan report for all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -26,7 +26,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a scan report for a container with the collection ``: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/containers/labels_get.md b/openapi-specs/compute/32-05/desc/containers/labels_get.md index eb40a748d..7a63ab6fb 100644 --- a/openapi-specs/compute/32-05/desc/containers/labels_get.md +++ b/openapi-specs/compute/32-05/desc/containers/labels_get.md @@ -1,7 +1,7 @@ Returns an array of strings containing all of the labels. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/containers/names_get.md b/openapi-specs/compute/32-05/desc/containers/names_get.md index 8b32465d5..9025e2e10 100644 --- a/openapi-specs/compute/32-05/desc/containers/names_get.md +++ b/openapi-specs/compute/32-05/desc/containers/names_get.md @@ -5,7 +5,7 @@ Returns an array of strings containing all container names. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/containers/scan_post.md b/openapi-specs/compute/32-05/desc/containers/scan_post.md index 6b2bdaaba..56137cf64 100644 --- a/openapi-specs/compute/32-05/desc/containers/scan_post.md +++ b/openapi-specs/compute/32-05/desc/containers/scan_post.md @@ -4,7 +4,7 @@ This endpoint returns the time that the scans were initiated. The following example command uses curl and basic auth to force Prisma Cloud Compute to re-scan all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/credentials/get.md b/openapi-specs/compute/32-05/desc/credentials/get.md index ee4309dee..b807ce8f3 100644 --- a/openapi-specs/compute/32-05/desc/credentials/get.md +++ b/openapi-specs/compute/32-05/desc/credentials/get.md @@ -6,7 +6,7 @@ This endpoint maps to **Manage > Authentication > Credentials store** in the Con Refer to the following example cURL command that retrieves all credentials: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/credentials/id_delete.md b/openapi-specs/compute/32-05/desc/credentials/id_delete.md index e5c70259e..27f090158 100644 --- a/openapi-specs/compute/32-05/desc/credentials/id_delete.md +++ b/openapi-specs/compute/32-05/desc/credentials/id_delete.md @@ -14,7 +14,7 @@ To invoke this endpoint in the Prisma Cloud Compute user interface: Refer to the following example cURL command that deletes an existing credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-05/desc/credentials/id_usages_get.md b/openapi-specs/compute/32-05/desc/credentials/id_usages_get.md index 76c1099aa..ca2ce6216 100644 --- a/openapi-specs/compute/32-05/desc/credentials/id_usages_get.md +++ b/openapi-specs/compute/32-05/desc/credentials/id_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following cURL command that retrieves all usages for a credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/curl_examples.md b/openapi-specs/compute/32-05/desc/curl_examples.md index 3d4fcd468..745d21db3 100644 --- a/openapi-specs/compute/32-05/desc/curl_examples.md +++ b/openapi-specs/compute/32-05/desc/curl_examples.md @@ -6,7 +6,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -17,7 +17,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -29,7 +29,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/compute/32-05/desc/custom-compliance/get.md b/openapi-specs/compute/32-05/desc/custom-compliance/get.md index 9022a87b7..9dddcff4e 100644 --- a/openapi-specs/compute/32-05/desc/custom-compliance/get.md +++ b/openapi-specs/compute/32-05/desc/custom-compliance/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example curl command that gets the list of custom compliance checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/custom-compliance/id_delete.md b/openapi-specs/compute/32-05/desc/custom-compliance/id_delete.md index 72c7183ee..f6536e51d 100644 --- a/openapi-specs/compute/32-05/desc/custom-compliance/id_delete.md +++ b/openapi-specs/compute/32-05/desc/custom-compliance/id_delete.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example cURL command that uses basic auth to delete the compliance check with id 9000: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-05/desc/custom-compliance/put.md b/openapi-specs/compute/32-05/desc/custom-compliance/put.md index 480e41b54..b8760a11f 100644 --- a/openapi-specs/compute/32-05/desc/custom-compliance/put.md +++ b/openapi-specs/compute/32-05/desc/custom-compliance/put.md @@ -21,7 +21,7 @@ Create `custom_check.json` file (example): Refer to the following example curl command that uses basic auth to update the checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-05/desc/custom-rules/get.md b/openapi-specs/compute/32-05/desc/custom-rules/get.md index f0385f81a..f77924be8 100644 --- a/openapi-specs/compute/32-05/desc/custom-rules/get.md +++ b/openapi-specs/compute/32-05/desc/custom-rules/get.md @@ -7,7 +7,7 @@ This endpoint maps to the policy table in **Defend > Custom rules** in the Conso Refer to the following example cURL command that retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/custom-rules/id_delete.md b/openapi-specs/compute/32-05/desc/custom-rules/id_delete.md index c0d6dc8b0..01412abf3 100644 --- a/openapi-specs/compute/32-05/desc/custom-rules/id_delete.md +++ b/openapi-specs/compute/32-05/desc/custom-rules/id_delete.md @@ -5,7 +5,7 @@ Deletes a custom rule. Refer to the following example cURL command that deletes a custom rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-05/desc/cves/distribution_get.md b/openapi-specs/compute/32-05/desc/cves/distribution_get.md index aecddce23..7365e1a5e 100644 --- a/openapi-specs/compute/32-05/desc/cves/distribution_get.md +++ b/openapi-specs/compute/32-05/desc/cves/distribution_get.md @@ -3,7 +3,7 @@ Retrieves CVEs from the vulnerability database grouped into distribution where y The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/cves/get.md b/openapi-specs/compute/32-05/desc/cves/get.md index 469ea4b28..f81223298 100644 --- a/openapi-specs/compute/32-05/desc/cves/get.md +++ b/openapi-specs/compute/32-05/desc/cves/get.md @@ -6,7 +6,7 @@ A null response indicates that the CVE is not in our database. The following example curl command queries the Prisma Cloud Compute database for `CVE-2018-1102`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/defenders/app_embedded_post.md b/openapi-specs/compute/32-05/desc/defenders/app_embedded_post.md index 9167469d0..7999cbadb 100644 --- a/openapi-specs/compute/32-05/desc/defenders/app_embedded_post.md +++ b/openapi-specs/compute/32-05/desc/defenders/app_embedded_post.md @@ -5,7 +5,7 @@ Creates an augmented Dockerfile with Defender and dependencies included as a ZIP Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/defenders/daemonset_yaml_get.md b/openapi-specs/compute/32-05/desc/defenders/daemonset_yaml_get.md index 678901a8a..b68869081 100644 --- a/openapi-specs/compute/32-05/desc/defenders/daemonset_yaml_get.md +++ b/openapi-specs/compute/32-05/desc/defenders/daemonset_yaml_get.md @@ -10,7 +10,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https://:8083/api/v1/defenders/daemonset.yaml?consoleaddr=&listener=none&namespace=twistlock&orchestration=kubernetes' diff --git a/openapi-specs/compute/32-05/desc/defenders/daemonset_yaml_post.md b/openapi-specs/compute/32-05/desc/defenders/daemonset_yaml_post.md index 8dcf30639..91abe241f 100644 --- a/openapi-specs/compute/32-05/desc/defenders/daemonset_yaml_post.md +++ b/openapi-specs/compute/32-05/desc/defenders/daemonset_yaml_post.md @@ -5,7 +5,7 @@ Creates a DaemonSet deployment file in YAML format that you can use to deploy De Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/defenders/download_get.md b/openapi-specs/compute/32-05/desc/defenders/download_get.md index 2d9435506..67f08c0e5 100644 --- a/openapi-specs/compute/32-05/desc/defenders/download_get.md +++ b/openapi-specs/compute/32-05/desc/defenders/download_get.md @@ -8,7 +8,7 @@ Use the query parameters to filter what data is returned. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o \ diff --git a/openapi-specs/compute/32-05/desc/defenders/fargate_json_post.md b/openapi-specs/compute/32-05/desc/defenders/fargate_json_post.md index 5128e90a1..e2e4e85ab 100644 --- a/openapi-specs/compute/32-05/desc/defenders/fargate_json_post.md +++ b/openapi-specs/compute/32-05/desc/defenders/fargate_json_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command: Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -23,7 +23,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/defenders/fargate_yaml_post.md b/openapi-specs/compute/32-05/desc/defenders/fargate_yaml_post.md index 9a8306a1b..95560526a 100644 --- a/openapi-specs/compute/32-05/desc/defenders/fargate_yaml_post.md +++ b/openapi-specs/compute/32-05/desc/defenders/fargate_yaml_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.yaml` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/yaml' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/defenders/get.md b/openapi-specs/compute/32-05/desc/defenders/get.md index 471e7ef9d..8d2f5cd4c 100644 --- a/openapi-specs/compute/32-05/desc/defenders/get.md +++ b/openapi-specs/compute/32-05/desc/defenders/get.md @@ -7,7 +7,7 @@ This endpoint maps to the UI Console page in **Manage > Defenders > Defenders**. Refer to the following example cURL command that retrieves all deployed Defenders. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/defenders/helm_get.md b/openapi-specs/compute/32-05/desc/defenders/helm_get.md index b11f9c4b9..487c8b7e8 100644 --- a/openapi-specs/compute/32-05/desc/defenders/helm_get.md +++ b/openapi-specs/compute/32-05/desc/defenders/helm_get.md @@ -13,7 +13,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o twistlock-defender-helm.tar.gz \ diff --git a/openapi-specs/compute/32-05/desc/defenders/helm_post.md b/openapi-specs/compute/32-05/desc/defenders/helm_post.md index 2046e63eb..fb76807ae 100644 --- a/openapi-specs/compute/32-05/desc/defenders/helm_post.md +++ b/openapi-specs/compute/32-05/desc/defenders/helm_post.md @@ -5,7 +5,7 @@ Creates a Helm deployment file that you can use to deploy Defenders to your clus Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/defenders/id_delete.md b/openapi-specs/compute/32-05/desc/defenders/id_delete.md index f637ef850..e3ac52daf 100644 --- a/openapi-specs/compute/32-05/desc/defenders/id_delete.md +++ b/openapi-specs/compute/32-05/desc/defenders/id_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes an existing Defender on a host. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-05/desc/defenders/id_features_post.md b/openapi-specs/compute/32-05/desc/defenders/id_features_post.md index ec8e4c5f3..9b42f5fa0 100644 --- a/openapi-specs/compute/32-05/desc/defenders/id_features_post.md +++ b/openapi-specs/compute/32-05/desc/defenders/id_features_post.md @@ -3,7 +3,7 @@ Updates a deployed Defender's configuration. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/defenders/id_restart_post.md b/openapi-specs/compute/32-05/desc/defenders/id_restart_post.md index da0cc7811..7296a186b 100644 --- a/openapi-specs/compute/32-05/desc/defenders/id_restart_post.md +++ b/openapi-specs/compute/32-05/desc/defenders/id_restart_post.md @@ -3,7 +3,7 @@ Restarts Defender on a given host. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/defenders/id_upgrade_post.md b/openapi-specs/compute/32-05/desc/defenders/id_upgrade_post.md index f0d30d1e9..3e63c6414 100644 --- a/openapi-specs/compute/32-05/desc/defenders/id_upgrade_post.md +++ b/openapi-specs/compute/32-05/desc/defenders/id_upgrade_post.md @@ -7,7 +7,7 @@ Upgrades Defender on ``. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/defenders/image-name_get.md b/openapi-specs/compute/32-05/desc/defenders/image-name_get.md index e81ba3e19..19f360c07 100644 --- a/openapi-specs/compute/32-05/desc/defenders/image-name_get.md +++ b/openapi-specs/compute/32-05/desc/defenders/image-name_get.md @@ -5,7 +5,7 @@ Returns the full Docker image name for Defender. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/defenders/install-bundle_get.md b/openapi-specs/compute/32-05/desc/defenders/install-bundle_get.md index 882d0cd53..9b09e733f 100644 --- a/openapi-specs/compute/32-05/desc/defenders/install-bundle_get.md +++ b/openapi-specs/compute/32-05/desc/defenders/install-bundle_get.md @@ -5,7 +5,7 @@ Returns the certificate bundle that Defender needs to securely connect to Consol Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/defenders/names_get.md b/openapi-specs/compute/32-05/desc/defenders/names_get.md index 728eb6364..6339c1483 100644 --- a/openapi-specs/compute/32-05/desc/defenders/names_get.md +++ b/openapi-specs/compute/32-05/desc/defenders/names_get.md @@ -5,7 +5,7 @@ Retrieves a list of Defender hostnames that can be used as the `{id}` query para Refer to the following example cURL command that retrieves a list of all Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -15,7 +15,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of connected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -25,7 +25,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of disconnected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -37,7 +37,7 @@ The endpoint enlists all the connected and disconnected Defenders if do not spec Refer to the following example cURL command that retrieves a list of Defenders by type: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/defenders/rasp_post.md b/openapi-specs/compute/32-05/desc/defenders/rasp_post.md index 526a9e112..e110044dd 100644 --- a/openapi-specs/compute/32-05/desc/defenders/rasp_post.md +++ b/openapi-specs/compute/32-05/desc/defenders/rasp_post.md @@ -7,7 +7,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o rasp-defender.zip diff --git a/openapi-specs/compute/32-05/desc/defenders/serverless-bundle_post.md b/openapi-specs/compute/32-05/desc/defenders/serverless-bundle_post.md index df4f13e6a..7533e436b 100644 --- a/openapi-specs/compute/32-05/desc/defenders/serverless-bundle_post.md +++ b/openapi-specs/compute/32-05/desc/defenders/serverless-bundle_post.md @@ -5,7 +5,7 @@ Downloads a ZIP file with serverless Defender bundle. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/octet-stream' \ -o serverless_bundle.zip \ diff --git a/openapi-specs/compute/32-05/desc/defenders/summary_get.md b/openapi-specs/compute/32-05/desc/defenders/summary_get.md index 08be4ebc4..e308ef64b 100644 --- a/openapi-specs/compute/32-05/desc/defenders/summary_get.md +++ b/openapi-specs/compute/32-05/desc/defenders/summary_get.md @@ -6,7 +6,7 @@ Lists the number of Defenders in each defender category. Refer to the following example cURL command that retrieves a summary of Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/defenders/upgrade_post.md b/openapi-specs/compute/32-05/desc/defenders/upgrade_post.md index 2f0b4d39e..eacd6b779 100644 --- a/openapi-specs/compute/32-05/desc/defenders/upgrade_post.md +++ b/openapi-specs/compute/32-05/desc/defenders/upgrade_post.md @@ -9,7 +9,7 @@ To upgrade Serverless and Fargate Defenders, re-embed them. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/deployment/daemonsets_deploy_post.md b/openapi-specs/compute/32-05/desc/deployment/daemonsets_deploy_post.md index 94ec9386b..b60f28346 100644 --- a/openapi-specs/compute/32-05/desc/deployment/daemonsets_deploy_post.md +++ b/openapi-specs/compute/32-05/desc/deployment/daemonsets_deploy_post.md @@ -5,7 +5,7 @@ It identifies the cluster's API server, user, and credentials. Use the various request parameters to control the properties of the deployed DaemonSet. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/deployment/daemonsets_get.md b/openapi-specs/compute/32-05/desc/deployment/daemonsets_get.md index a0b7f3798..0385acf75 100644 --- a/openapi-specs/compute/32-05/desc/deployment/daemonsets_get.md +++ b/openapi-specs/compute/32-05/desc/deployment/daemonsets_get.md @@ -3,7 +3,7 @@ You must specify a `credentialID`, of type `kubeconfig`, which identifies your c Credentials are managed in Console's credentials store (`/api/v1/credentials`). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/feeds/custom-vulnerabilities_get.md b/openapi-specs/compute/32-05/desc/feeds/custom-vulnerabilities_get.md index 71834f19d..d661acf55 100644 --- a/openapi-specs/compute/32-05/desc/feeds/custom-vulnerabilities_get.md +++ b/openapi-specs/compute/32-05/desc/feeds/custom-vulnerabilities_get.md @@ -11,7 +11,7 @@ Vulnerability rules can be created using the Prisma Cloud Compute. Refer to the following cURL command that retrieves a list of all the custom vulnerabilities and associated rules. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/feeds/custom-vulnerabilities_put.md b/openapi-specs/compute/32-05/desc/feeds/custom-vulnerabilities_put.md index 4fe1c1898..149ada978 100644 --- a/openapi-specs/compute/32-05/desc/feeds/custom-vulnerabilities_put.md +++ b/openapi-specs/compute/32-05/desc/feeds/custom-vulnerabilities_put.md @@ -5,7 +5,7 @@ Updates all the custom vulnerabilities and associated rules simultaneously for h Refer to the following cURL command that updates a vulnerability for a library named `internal-lib`, and specifies that its versions `1.1` to `1.8` are known to be vulnerable. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -37,7 +37,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: **Note:** You will need `jq` to execute this command. ``` - $ curl -k \ + $ curl \ -u \ https:///api/v/feeds/custom/custom-vulnerabilities \ | jq '.' > custom_vulnerability_rules.json @@ -66,7 +66,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 3. Update the rules by pushing the new JSON payload. **Note:** Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -77,7 +77,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 4. Run the cURL command for the `GET /api/vVERSION/feeds/custom/custom-vulnerabilities` endpoint and you can see that the previously installed rules are now overwritten with your new rules. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/feeds/custom_vulnerabilities_digest_get.md b/openapi-specs/compute/32-05/desc/feeds/custom_vulnerabilities_digest_get.md index 0eb501d9b..02af9a3ab 100644 --- a/openapi-specs/compute/32-05/desc/feeds/custom_vulnerabilities_digest_get.md +++ b/openapi-specs/compute/32-05/desc/feeds/custom_vulnerabilities_digest_get.md @@ -5,7 +5,7 @@ Returns the unique digest for the custom vulnerabilities and associated rules fo The following cURL command retrieves the digest for the configured custom vulnerabilities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/feeds/cve_allow_list_digest_get.md b/openapi-specs/compute/32-05/desc/feeds/cve_allow_list_digest_get.md index e27f21251..911a07fd9 100644 --- a/openapi-specs/compute/32-05/desc/feeds/cve_allow_list_digest_get.md +++ b/openapi-specs/compute/32-05/desc/feeds/cve_allow_list_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the Common Vulnerabilities and Exposures (CVE) a The following cURL command retrieves the digest for the configured CVE allow list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/feeds/cve_allow_list_get.md b/openapi-specs/compute/32-05/desc/feeds/cve_allow_list_get.md index 34fb2c7f8..d73ce17c2 100644 --- a/openapi-specs/compute/32-05/desc/feeds/cve_allow_list_get.md +++ b/openapi-specs/compute/32-05/desc/feeds/cve_allow_list_get.md @@ -5,7 +5,7 @@ Retrieves the globally allow-listed Common Vulnerabilities and Exposures (CVE). The following cURL command retrieves the globally allow-listed CVEs. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/feeds/cve_allow_list_put.md b/openapi-specs/compute/32-05/desc/feeds/cve_allow_list_put.md index 850016965..c4e2ce0af 100644 --- a/openapi-specs/compute/32-05/desc/feeds/cve_allow_list_put.md +++ b/openapi-specs/compute/32-05/desc/feeds/cve_allow_list_put.md @@ -7,7 +7,7 @@ Globally allow-lists a set of Common Vulnerabilities and Exposures (CVE). The following cURL command installs a global CVE allow-list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-05/desc/feeds/ips_digest_get.md b/openapi-specs/compute/32-05/desc/feeds/ips_digest_get.md index d059271ea..ae2a09915 100644 --- a/openapi-specs/compute/32-05/desc/feeds/ips_digest_get.md +++ b/openapi-specs/compute/32-05/desc/feeds/ips_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the list of suspicious or high risk IP endpoints The following cURL command retrieves the digest for the banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/feeds/ips_get.md b/openapi-specs/compute/32-05/desc/feeds/ips_get.md index 381257d47..f51c577a7 100644 --- a/openapi-specs/compute/32-05/desc/feeds/ips_get.md +++ b/openapi-specs/compute/32-05/desc/feeds/ips_get.md @@ -5,7 +5,7 @@ Retrieves the customized list of block-listed suspicious or high-risk IP address The following cURL command retrieves the list of globally block-listed suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/feeds/ips_put.md b/openapi-specs/compute/32-05/desc/feeds/ips_put.md index 6f8fc2419..5bf791044 100644 --- a/openapi-specs/compute/32-05/desc/feeds/ips_put.md +++ b/openapi-specs/compute/32-05/desc/feeds/ips_put.md @@ -7,7 +7,7 @@ Bans a custom list of suspicious or high-risk IP addresses. The following cURL command installs a custom list of banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-05/desc/feeds/malware_digest_get.md b/openapi-specs/compute/32-05/desc/feeds/malware_digest_get.md index 005c476a2..522a59aef 100644 --- a/openapi-specs/compute/32-05/desc/feeds/malware_digest_get.md +++ b/openapi-specs/compute/32-05/desc/feeds/malware_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for all the MD5 signatures of malicious executables The following cURL command retrieves the digest for the configured list for the MD5 signatures of malicious executables. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/feeds/malware_get.md b/openapi-specs/compute/32-05/desc/feeds/malware_get.md index 2a7aa128b..72bee6594 100644 --- a/openapi-specs/compute/32-05/desc/feeds/malware_get.md +++ b/openapi-specs/compute/32-05/desc/feeds/malware_get.md @@ -5,7 +5,7 @@ Returns the customized list of MD5 signatures of malicious executables. Refer to the following cURL command that retrieves the list of MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/feeds/malware_put.md b/openapi-specs/compute/32-05/desc/feeds/malware_put.md index 7e6ec5da0..176304cb9 100644 --- a/openapi-specs/compute/32-05/desc/feeds/malware_put.md +++ b/openapi-specs/compute/32-05/desc/feeds/malware_put.md @@ -7,7 +7,7 @@ Creates a custom list of malware MD5 signatures of malicious executables. Refer to the following cURL command that installs a custom list of malware MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-05/desc/feeds/refresh_post.md b/openapi-specs/compute/32-05/desc/feeds/refresh_post.md index a83c40d10..1c756edae 100644 --- a/openapi-specs/compute/32-05/desc/feeds/refresh_post.md +++ b/openapi-specs/compute/32-05/desc/feeds/refresh_post.md @@ -1,7 +1,7 @@ Triggers Console to refresh its data from the **Intelligence Stream** ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/forensic/activities_download_get.md b/openapi-specs/compute/32-05/desc/forensic/activities_download_get.md index 8a2dbd926..1918e3790 100644 --- a/openapi-specs/compute/32-05/desc/forensic/activities_download_get.md +++ b/openapi-specs/compute/32-05/desc/forensic/activities_download_get.md @@ -3,7 +3,7 @@ Downloads all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/forensic/activities_get.md b/openapi-specs/compute/32-05/desc/forensic/activities_get.md index c8fb1d0cd..c0761aa60 100644 --- a/openapi-specs/compute/32-05/desc/forensic/activities_get.md +++ b/openapi-specs/compute/32-05/desc/forensic/activities_get.md @@ -3,7 +3,7 @@ Retrieves all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/groups/get.md b/openapi-specs/compute/32-05/desc/groups/get.md index 6a0daa2eb..34a2711e0 100644 --- a/openapi-specs/compute/32-05/desc/groups/get.md +++ b/openapi-specs/compute/32-05/desc/groups/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups. ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-05/desc/groups/id_delete.md b/openapi-specs/compute/32-05/desc/groups/id_delete.md index 5962a1135..0c3cfa1cd 100644 --- a/openapi-specs/compute/32-05/desc/groups/id_delete.md +++ b/openapi-specs/compute/32-05/desc/groups/id_delete.md @@ -13,7 +13,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes a collection with the name `{id}`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-05/desc/groups/names.md b/openapi-specs/compute/32-05/desc/groups/names.md index 80f34f536..9c2dd1089 100644 --- a/openapi-specs/compute/32-05/desc/groups/names.md +++ b/openapi-specs/compute/32-05/desc/groups/names.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-05/desc/groups/post.md b/openapi-specs/compute/32-05/desc/groups/post.md index d0fc23a6d..ebad011f4 100644 --- a/openapi-specs/compute/32-05/desc/groups/post.md +++ b/openapi-specs/compute/32-05/desc/groups/post.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that creates a new group named `my-group`: ```bash -$ curl -k \ +$ curl \ -X POST \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-05/desc/high-availability/get.md b/openapi-specs/compute/32-05/desc/high-availability/get.md index a988d47ef..83d5d9b46 100644 --- a/openapi-specs/compute/32-05/desc/high-availability/get.md +++ b/openapi-specs/compute/32-05/desc/high-availability/get.md @@ -3,7 +3,7 @@ Returns the status of high high availability. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-05/desc/hosts/download_get.md b/openapi-specs/compute/32-05/desc/hosts/download_get.md index ab691fb49..34e546573 100644 --- a/openapi-specs/compute/32-05/desc/hosts/download_get.md +++ b/openapi-specs/compute/32-05/desc/hosts/download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Hosts > Refer to the following example cURL command that downloads all host scan reports to a CSV file called `hosts_report.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o hosts_report.csv \ diff --git a/openapi-specs/compute/32-05/desc/hosts/filters_get.md b/openapi-specs/compute/32-05/desc/hosts/filters_get.md index 4bf6df5e6..a39ec8a97 100644 --- a/openapi-specs/compute/32-05/desc/hosts/filters_get.md +++ b/openapi-specs/compute/32-05/desc/hosts/filters_get.md @@ -3,7 +3,7 @@ Returns host filters such as distribution and host name. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/hosts/get.md b/openapi-specs/compute/32-05/desc/hosts/get.md index d125c9d7b..26df89cef 100644 --- a/openapi-specs/compute/32-05/desc/hosts/get.md +++ b/openapi-specs/compute/32-05/desc/hosts/get.md @@ -35,7 +35,7 @@ Refer to the following available options for the `fields` query parameters: Refer to the following cURL command that retrieves all host scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/hosts/info_get.md b/openapi-specs/compute/32-05/desc/hosts/info_get.md index be456b46b..b71c6be2f 100644 --- a/openapi-specs/compute/32-05/desc/hosts/info_get.md +++ b/openapi-specs/compute/32-05/desc/hosts/info_get.md @@ -3,7 +3,7 @@ Returns minimal information that includes hostname, distro, distro-release, coll A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/hosts/scan_post.md b/openapi-specs/compute/32-05/desc/hosts/scan_post.md index 6b72cbfa3..0e0e7b074 100644 --- a/openapi-specs/compute/32-05/desc/hosts/scan_post.md +++ b/openapi-specs/compute/32-05/desc/hosts/scan_post.md @@ -3,7 +3,7 @@ Re-scan all hosts immediately. Refer to the following example command that forces Prisma Cloud Compute to re-scan all hosts: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/hosts/scan diff --git a/openapi-specs/compute/32-05/desc/images/defender_layer_get.md b/openapi-specs/compute/32-05/desc/images/defender_layer_get.md index 1dfe3633d..4bb88d62c 100644 --- a/openapi-specs/compute/32-05/desc/images/defender_layer_get.md +++ b/openapi-specs/compute/32-05/desc/images/defender_layer_get.md @@ -5,7 +5,7 @@ Returns the the Prisma Cloud Compute Defender in as a layer that can be used in Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/compute/32-05/desc/images/defender_rasp_get.md b/openapi-specs/compute/32-05/desc/images/defender_rasp_get.md index a8e145ff7..260e271a1 100644 --- a/openapi-specs/compute/32-05/desc/images/defender_rasp_get.md +++ b/openapi-specs/compute/32-05/desc/images/defender_rasp_get.md @@ -3,7 +3,7 @@ Returns the the Prisma Cloud Compute Defender as the RASP Defender A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/compute/32-05/desc/images/download_get.md b/openapi-specs/compute/32-05/desc/images/download_get.md index 713114955..fcae06e3d 100644 --- a/openapi-specs/compute/32-05/desc/images/download_get.md +++ b/openapi-specs/compute/32-05/desc/images/download_get.md @@ -15,7 +15,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -26,7 +26,7 @@ $ curl -k \ Refer to the following example cURL command that might be useful for developers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/images/get.md b/openapi-specs/compute/32-05/desc/images/get.md index 6c82341b6..bb636e101 100644 --- a/openapi-specs/compute/32-05/desc/images/get.md +++ b/openapi-specs/compute/32-05/desc/images/get.md @@ -19,7 +19,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that retrieves a compact scan report for all images: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -29,7 +29,7 @@ $ curl -k \ Refer to the following cURL command that retrieves a compact scan report for an Ubuntu image: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -40,7 +40,7 @@ The name query is synonymous with the filter images text field in the Console UI Refer to the following cURL command that retrieves the scan report for an image with the matching SHA-256 hash: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/images/names_get.md b/openapi-specs/compute/32-05/desc/images/names_get.md index 3db6f5429..ad5fd25dc 100644 --- a/openapi-specs/compute/32-05/desc/images/names_get.md +++ b/openapi-specs/compute/32-05/desc/images/names_get.md @@ -5,7 +5,7 @@ Returns an array of strings containing image names. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-05/desc/images/scan_post.md b/openapi-specs/compute/32-05/desc/images/scan_post.md index 8d802727a..36278249b 100644 --- a/openapi-specs/compute/32-05/desc/images/scan_post.md +++ b/openapi-specs/compute/32-05/desc/images/scan_post.md @@ -5,7 +5,7 @@ Re-scan all images immediately. This endpoint returns the time that the scans we Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all images: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/images/scan diff --git a/openapi-specs/compute/32-05/desc/images/twistlock_defender_tar_gz_get.md b/openapi-specs/compute/32-05/desc/images/twistlock_defender_tar_gz_get.md index 7852e12ba..36fb66ae8 100644 --- a/openapi-specs/compute/32-05/desc/images/twistlock_defender_tar_gz_get.md +++ b/openapi-specs/compute/32-05/desc/images/twistlock_defender_tar_gz_get.md @@ -1,7 +1,7 @@ Download the Container Defender image for Linux platforms. ```bash -$ curl -k \ +$ curl \ -u \ -H "Content-Type: application/octet-stream" \ -o twistlock_defender.tar.gz \ diff --git a/openapi-specs/compute/32-05/desc/intro.md b/openapi-specs/compute/32-05/desc/intro.md index 9038a3734..5b4ed5864 100644 --- a/openapi-specs/compute/32-05/desc/intro.md +++ b/openapi-specs/compute/32-05/desc/intro.md @@ -47,7 +47,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -58,7 +58,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -70,7 +70,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/compute/32-05/desc/kubernetes/scan_post.md b/openapi-specs/compute/32-05/desc/kubernetes/scan_post.md index 15d614c1a..ab74d5d96 100644 --- a/openapi-specs/compute/32-05/desc/kubernetes/scan_post.md +++ b/openapi-specs/compute/32-05/desc/kubernetes/scan_post.md @@ -3,7 +3,7 @@ This endpoint will trigger a Kubernetes scan. The following example curl command uses basic auth to initiate this scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/logs/console_get.md b/openapi-specs/compute/32-05/desc/logs/console_get.md index 80ece6611..113543540 100644 --- a/openapi-specs/compute/32-05/desc/logs/console_get.md +++ b/openapi-specs/compute/32-05/desc/logs/console_get.md @@ -3,7 +3,7 @@ Retrieves the latest Console log messages. The following example curl command retrieves the 10 latest Console log messages: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/logs/defender_download_get.md b/openapi-specs/compute/32-05/desc/logs/defender_download_get.md index 5d6718db0..05bbc6a75 100644 --- a/openapi-specs/compute/32-05/desc/logs/defender_download_get.md +++ b/openapi-specs/compute/32-05/desc/logs/defender_download_get.md @@ -5,7 +5,7 @@ The hostname can be returned from the endpoint `/defenders/names` The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/logs/defender_get.md b/openapi-specs/compute/32-05/desc/logs/defender_get.md index 1e733a746..f2e3b25df 100644 --- a/openapi-specs/compute/32-05/desc/logs/defender_get.md +++ b/openapi-specs/compute/32-05/desc/logs/defender_get.md @@ -7,7 +7,7 @@ Note that you must quote the URL when running the following command. Otherwise the shell misinterprets the ampersand (`&`) as the end of the command, and puts the curl command in the background. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/logs/system_download_get.md b/openapi-specs/compute/32-05/desc/logs/system_download_get.md index 1e5b5b873..43bb0abce 100644 --- a/openapi-specs/compute/32-05/desc/logs/system_download_get.md +++ b/openapi-specs/compute/32-05/desc/logs/system_download_get.md @@ -4,7 +4,7 @@ This endpoint will return the system debug logs with `tar.gz` file extension. The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/pcf-droplets/addresses_get.md b/openapi-specs/compute/32-05/desc/pcf-droplets/addresses_get.md index 257a47455..bb3365015 100644 --- a/openapi-specs/compute/32-05/desc/pcf-droplets/addresses_get.md +++ b/openapi-specs/compute/32-05/desc/pcf-droplets/addresses_get.md @@ -5,7 +5,7 @@ You can also add optional query parameters to this API call, in this example `cl The following example curl command retrieves the list of addresses: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/pcf-droplets/download_get.md b/openapi-specs/compute/32-05/desc/pcf-droplets/download_get.md index ad761e744..ac8546a25 100644 --- a/openapi-specs/compute/32-05/desc/pcf-droplets/download_get.md +++ b/openapi-specs/compute/32-05/desc/pcf-droplets/download_get.md @@ -3,7 +3,7 @@ This endpoint will download the list of configured cloud controller addresses co The following example curl command retrieves the list of addresses and outputs it to a file call `PCF_blobstores.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/pcf-droplets/get.md b/openapi-specs/compute/32-05/desc/pcf-droplets/get.md index 930d16948..aad607cba 100644 --- a/openapi-specs/compute/32-05/desc/pcf-droplets/get.md +++ b/openapi-specs/compute/32-05/desc/pcf-droplets/get.md @@ -3,7 +3,7 @@ This endpoint will return the full metadata of PCF blobstore from page **Monitor The following example curl command will retrieve this: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/pcf-droplets/scan_post.md b/openapi-specs/compute/32-05/desc/pcf-droplets/scan_post.md index 34e75b26c..d9c9df4dd 100644 --- a/openapi-specs/compute/32-05/desc/pcf-droplets/scan_post.md +++ b/openapi-specs/compute/32-05/desc/pcf-droplets/scan_post.md @@ -3,7 +3,7 @@ This endpoint will kick off a scan of the any PCF Blobstores you have configured Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/pcf-droplets/stop_post.md b/openapi-specs/compute/32-05/desc/pcf-droplets/stop_post.md index 94c376972..2c4d5264a 100644 --- a/openapi-specs/compute/32-05/desc/pcf-droplets/stop_post.md +++ b/openapi-specs/compute/32-05/desc/pcf-droplets/stop_post.md @@ -3,7 +3,7 @@ This endpoint will instruct the PFC Defenders to stop scanning. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/policies/compliance_ci_images_get.md b/openapi-specs/compute/32-05/desc/policies/compliance_ci_images_get.md index f97130a97..9a2b2abf5 100644 --- a/openapi-specs/compute/32-05/desc/policies/compliance_ci_images_get.md +++ b/openapi-specs/compute/32-05/desc/policies/compliance_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > CI** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/policies/compliance_ci_serverless_get.md b/openapi-specs/compute/32-05/desc/policies/compliance_ci_serverless_get.md index 59195f070..2f30e2d74 100644 --- a/openapi-specs/compute/32-05/desc/policies/compliance_ci_serverless_get.md +++ b/openapi-specs/compute/32-05/desc/policies/compliance_ci_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Functions > CI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/policies/compliance_container_get.md b/openapi-specs/compute/32-05/desc/policies/compliance_container_get.md index 7f10245ea..657d4f2dd 100644 --- a/openapi-specs/compute/32-05/desc/policies/compliance_container_get.md +++ b/openapi-specs/compute/32-05/desc/policies/compliance_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > Deployed** Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/policies/compliance_container_impacted_get.md b/openapi-specs/compute/32-05/desc/policies/compliance_container_impacted_get.md index 607bfa3c8..de9e0ee77 100644 --- a/openapi-specs/compute/32-05/desc/policies/compliance_container_impacted_get.md +++ b/openapi-specs/compute/32-05/desc/policies/compliance_container_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of containers captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/compliance/container/impacted?ruleName=' diff --git a/openapi-specs/compute/32-05/desc/policies/compliance_host_get.md b/openapi-specs/compute/32-05/desc/policies/compliance_host_get.md index c029ecf7f..a5e429af5 100755 --- a/openapi-specs/compute/32-05/desc/policies/compliance_host_get.md +++ b/openapi-specs/compute/32-05/desc/policies/compliance_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Hosts > Running hosts** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/policies/compliance_serverless_get.md b/openapi-specs/compute/32-05/desc/policies/compliance_serverless_get.md index c7de886c1..f559179f6 100755 --- a/openapi-specs/compute/32-05/desc/policies/compliance_serverless_get.md +++ b/openapi-specs/compute/32-05/desc/policies/compliance_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Functions > Functions** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/policies/compliance_vms_get.md b/openapi-specs/compute/32-05/desc/policies/compliance_vms_get.md index f7d7e1a49..b61d20d9d 100755 --- a/openapi-specs/compute/32-05/desc/policies/compliance_vms_get.md +++ b/openapi-specs/compute/32-05/desc/policies/compliance_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Hosts > VM ima The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/policies/compliance_vms_impacted_get.md b/openapi-specs/compute/32-05/desc/policies/compliance_vms_impacted_get.md index 9cf5b9d03..4ac3f2832 100644 --- a/openapi-specs/compute/32-05/desc/policies/compliance_vms_impacted_get.md +++ b/openapi-specs/compute/32-05/desc/policies/compliance_vms_impacted_get.md @@ -8,7 +8,7 @@ Use query parameters to retrieve the list of impacted resources by *account ID*, Refer to the following example cURL command, which retrieves a list of impacted resources: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/policies/docker_get.md b/openapi-specs/compute/32-05/desc/policies/docker_get.md index f56872c67..e8ab3d5bb 100644 --- a/openapi-specs/compute/32-05/desc/policies/docker_get.md +++ b/openapi-specs/compute/32-05/desc/policies/docker_get.md @@ -3,7 +3,7 @@ Retrieves a list of all access control rules for Docker Engine commands. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/policies/docker_put.md b/openapi-specs/compute/32-05/desc/policies/docker_put.md index 860e2bb1e..a5d0c0230 100644 --- a/openapi-specs/compute/32-05/desc/policies/docker_put.md +++ b/openapi-specs/compute/32-05/desc/policies/docker_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove Docker access control rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/docker \ | jq '.' > docker_access_control_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove Docker access control rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/32-05/desc/policies/firewall_app-embedded_get.md b/openapi-specs/compute/32-05/desc/policies/firewall_app-embedded_get.md index 3da2a7cd6..4e59c4c21 100644 --- a/openapi-specs/compute/32-05/desc/policies/firewall_app-embedded_get.md +++ b/openapi-specs/compute/32-05/desc/policies/firewall_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > App-Embedded** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/policies/firewall_app_container_get.md b/openapi-specs/compute/32-05/desc/policies/firewall_app_container_get.md index 3b8c157fa..f0486aa4c 100644 --- a/openapi-specs/compute/32-05/desc/policies/firewall_app_container_get.md +++ b/openapi-specs/compute/32-05/desc/policies/firewall_app_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Container** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/container' diff --git a/openapi-specs/compute/32-05/desc/policies/firewall_app_host_get.md b/openapi-specs/compute/32-05/desc/policies/firewall_app_host_get.md index adb90128a..75c22add4 100644 --- a/openapi-specs/compute/32-05/desc/policies/firewall_app_host_get.md +++ b/openapi-specs/compute/32-05/desc/policies/firewall_app_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Host** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/policies/firewall_app_network_list_get.md b/openapi-specs/compute/32-05/desc/policies/firewall_app_network_list_get.md index 13f7fb450..5a1f87d85 100644 --- a/openapi-specs/compute/32-05/desc/policies/firewall_app_network_list_get.md +++ b/openapi-specs/compute/32-05/desc/policies/firewall_app_network_list_get.md @@ -11,7 +11,7 @@ This endpoint maps to **Defend > WAAS > Network lists** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/network-list' diff --git a/openapi-specs/compute/32-05/desc/policies/firewall_app_out-of-band_get.md b/openapi-specs/compute/32-05/desc/policies/firewall_app_out-of-band_get.md index d4f72d041..9ae662687 100644 --- a/openapi-specs/compute/32-05/desc/policies/firewall_app_out-of-band_get.md +++ b/openapi-specs/compute/32-05/desc/policies/firewall_app_out-of-band_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/policies/firewall_app_out-of-band_impacted_get.md b/openapi-specs/compute/32-05/desc/policies/firewall_app_out-of-band_impacted_get.md index 25d2c6691..96a427f94 100644 --- a/openapi-specs/compute/32-05/desc/policies/firewall_app_out-of-band_impacted_get.md +++ b/openapi-specs/compute/32-05/desc/policies/firewall_app_out-of-band_impacted_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/policies/firewall_app_rasp_get.md b/openapi-specs/compute/32-05/desc/policies/firewall_app_rasp_get.md index 15d481cf3..a201d3beb 100644 --- a/openapi-specs/compute/32-05/desc/policies/firewall_app_rasp_get.md +++ b/openapi-specs/compute/32-05/desc/policies/firewall_app_rasp_get.md @@ -1,7 +1,7 @@ Retrieves a list of all application firewall (CNAF) rules for RASP. ``` -$ curl -k \ +$ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp ``` diff --git a/openapi-specs/compute/32-05/desc/policies/firewall_app_rasp_put.md b/openapi-specs/compute/32-05/desc/policies/firewall_app_rasp_put.md index 04ba86483..1101c7690 100644 --- a/openapi-specs/compute/32-05/desc/policies/firewall_app_rasp_put.md +++ b/openapi-specs/compute/32-05/desc/policies/firewall_app_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp \ | jq '.' > app_firewall_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/32-05/desc/policies/firewall_app_serverless_get.md b/openapi-specs/compute/32-05/desc/policies/firewall_app_serverless_get.md index d19e909f3..90cac0015 100644 --- a/openapi-specs/compute/32-05/desc/policies/firewall_app_serverless_get.md +++ b/openapi-specs/compute/32-05/desc/policies/firewall_app_serverless_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Serverless** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/serverless' diff --git a/openapi-specs/compute/32-05/desc/policies/firewall_network_container_get.md b/openapi-specs/compute/32-05/desc/policies/firewall_network_container_get.md index 3f1343b53..82e656818 100644 --- a/openapi-specs/compute/32-05/desc/policies/firewall_network_container_get.md +++ b/openapi-specs/compute/32-05/desc/policies/firewall_network_container_get.md @@ -4,7 +4,7 @@ Retrieves a list of all CNNS container and host rules. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/policies/firewall_network_container_put.md b/openapi-specs/compute/32-05/desc/policies/firewall_network_container_put.md index fd9263430..cffb3f1c4 100644 --- a/openapi-specs/compute/32-05/desc/policies/firewall_network_container_put.md +++ b/openapi-specs/compute/32-05/desc/policies/firewall_network_container_put.md @@ -9,7 +9,7 @@ The procedure to add, edit, or remove rules is: Refer to the following example cURL command that retrieves a list of all rules, pretty-print the JSON response, and save the results to a file: ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -26,7 +26,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/32-05/desc/policies/firewall_network_entities_get.md b/openapi-specs/compute/32-05/desc/policies/firewall_network_entities_get.md index 757121f70..28ed8dbcb 100644 --- a/openapi-specs/compute/32-05/desc/policies/firewall_network_entities_get.md +++ b/openapi-specs/compute/32-05/desc/policies/firewall_network_entities_get.md @@ -1,7 +1,7 @@ Retrieves a list of all CNNF network objects. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/policies/firewall_network_entities_put.md b/openapi-specs/compute/32-05/desc/policies/firewall_network_entities_put.md index 83c023286..39044ee10 100644 --- a/openapi-specs/compute/32-05/desc/policies/firewall_network_entities_put.md +++ b/openapi-specs/compute/32-05/desc/policies/firewall_network_entities_put.md @@ -3,7 +3,7 @@ Updates the list of CNNF network objects. The following example curl command updates the network objects. There is an example of all three types (images,subnets, and applications ): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-05/desc/policies/policies.md b/openapi-specs/compute/32-05/desc/policies/policies.md index 69768c03d..97be7b616 100644 --- a/openapi-specs/compute/32-05/desc/policies/policies.md +++ b/openapi-specs/compute/32-05/desc/policies/policies.md @@ -21,7 +21,7 @@ To add, edit, or remove vulnerability rules from a policy: For example, the following cURL command uses basic auth to retrieve a list of all image vulnerability rules, pretty-prints the JSON response, and saves the results to a `vulnerability_rules.json` file. ```bash - $ curl -k \ + $ curl \ -u \ https:///api/v1/policies/runtime/host \ | jq '.' > vulnerability_rules.json @@ -36,7 +36,7 @@ To add, edit, or remove vulnerability rules from a policy: **Note:** Remember to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -107,7 +107,7 @@ Use the `PUT` method to delete all rules by submitting an empty JSON object. For example, to delete all host runtime rules: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-05/desc/policies/runtime_app-embedded_get.md b/openapi-specs/compute/32-05/desc/policies/runtime_app-embedded_get.md index fcf0ba8b9..517b741bb 100755 --- a/openapi-specs/compute/32-05/desc/policies/runtime_app-embedded_get.md +++ b/openapi-specs/compute/32-05/desc/policies/runtime_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > App-Embedded policy** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/policies/runtime_container_get.md b/openapi-specs/compute/32-05/desc/policies/runtime_container_get.md index f1b50b727..65cd10660 100644 --- a/openapi-specs/compute/32-05/desc/policies/runtime_container_get.md +++ b/openapi-specs/compute/32-05/desc/policies/runtime_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Container policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/policies/runtime_container_impacted_get.md b/openapi-specs/compute/32-05/desc/policies/runtime_container_impacted_get.md index 195f75547..e026d33b9 100644 --- a/openapi-specs/compute/32-05/desc/policies/runtime_container_impacted_get.md +++ b/openapi-specs/compute/32-05/desc/policies/runtime_container_impacted_get.md @@ -6,7 +6,7 @@ In the Console UI, you can see how it works by going to the **Defend > Runtime > Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ $ curl -k \ For additional help with your `ruleName`: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/policies/runtime_host_get.md b/openapi-specs/compute/32-05/desc/policies/runtime_host_get.md index 38800596c..559ef690a 100644 --- a/openapi-specs/compute/32-05/desc/policies/runtime_host_get.md +++ b/openapi-specs/compute/32-05/desc/policies/runtime_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Host policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/policies/runtime_rasp_get.md b/openapi-specs/compute/32-05/desc/policies/runtime_rasp_get.md index 5b7a76457..55a6ff05b 100644 --- a/openapi-specs/compute/32-05/desc/policies/runtime_rasp_get.md +++ b/openapi-specs/compute/32-05/desc/policies/runtime_rasp_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your RASP runtime policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/policies/runtime_rasp_put.md b/openapi-specs/compute/32-05/desc/policies/runtime_rasp_put.md index bba60ba81..f71fb4b93 100644 --- a/openapi-specs/compute/32-05/desc/policies/runtime_rasp_put.md +++ b/openapi-specs/compute/32-05/desc/policies/runtime_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve the rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET @@ -24,7 +24,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -H "Content-Type:application/json" \ -X PUT \ diff --git a/openapi-specs/compute/32-05/desc/policies/runtime_serverless_get.md b/openapi-specs/compute/32-05/desc/policies/runtime_serverless_get.md index 44326bbf6..c98489e16 100644 --- a/openapi-specs/compute/32-05/desc/policies/runtime_serverless_get.md +++ b/openapi-specs/compute/32-05/desc/policies/runtime_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Serverless policy** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/policies/secrets_get.md b/openapi-specs/compute/32-05/desc/policies/secrets_get.md index 89e6b9c0e..cb4ecb37c 100644 --- a/openapi-specs/compute/32-05/desc/policies/secrets_get.md +++ b/openapi-specs/compute/32-05/desc/policies/secrets_get.md @@ -3,7 +3,7 @@ Retrieves a list of all secrets rules. The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/policies/secrets diff --git a/openapi-specs/compute/32-05/desc/policies/secrets_put.md b/openapi-specs/compute/32-05/desc/policies/secrets_put.md index 1e8877ca1..04fd41f24 100644 --- a/openapi-specs/compute/32-05/desc/policies/secrets_put.md +++ b/openapi-specs/compute/32-05/desc/policies/secrets_put.md @@ -10,7 +10,7 @@ The procedure to add, edit, or remove secrets rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/secrets \ | jq '.' > secrets_rules.json @@ -24,7 +24,7 @@ The procedure to add, edit, or remove secrets rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/32-05/desc/policies/trust_get.md b/openapi-specs/compute/32-05/desc/policies/trust_get.md index 8de1ba409..0805d6777 100644 --- a/openapi-specs/compute/32-05/desc/policies/trust_get.md +++ b/openapi-specs/compute/32-05/desc/policies/trust_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/policies/trust_put.md b/openapi-specs/compute/32-05/desc/policies/trust_put.md index fccd4b91e..7fec72031 100644 --- a/openapi-specs/compute/32-05/desc/policies/trust_put.md +++ b/openapi-specs/compute/32-05/desc/policies/trust_put.md @@ -1,7 +1,7 @@ Updates the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-05/desc/policies/vulnerability_ci_images_get.md b/openapi-specs/compute/32-05/desc/policies/vulnerability_ci_images_get.md index abc3da8fa..ce0d50a29 100644 --- a/openapi-specs/compute/32-05/desc/policies/vulnerability_ci_images_get.md +++ b/openapi-specs/compute/32-05/desc/policies/vulnerability_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/policies/vulnerability_ci_serverless_get.md b/openapi-specs/compute/32-05/desc/policies/vulnerability_ci_serverless_get.md index 958c86495..6fb5f93ce 100644 --- a/openapi-specs/compute/32-05/desc/policies/vulnerability_ci_serverless_get.md +++ b/openapi-specs/compute/32-05/desc/policies/vulnerability_ci_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/policies/vulnerability_coderepos_get.md b/openapi-specs/compute/32-05/desc/policies/vulnerability_coderepos_get.md index 08dfed8e1..a4ac62f33 100644 --- a/openapi-specs/compute/32-05/desc/policies/vulnerability_coderepos_get.md +++ b/openapi-specs/compute/32-05/desc/policies/vulnerability_coderepos_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Code repositories** in the Co Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/vulnerability/coderepos' diff --git a/openapi-specs/compute/32-05/desc/policies/vulnerability_coderepos_impacted_get.md b/openapi-specs/compute/32-05/desc/policies/vulnerability_coderepos_impacted_get.md index a401a12c4..e64ef768e 100644 --- a/openapi-specs/compute/32-05/desc/policies/vulnerability_coderepos_impacted_get.md +++ b/openapi-specs/compute/32-05/desc/policies/vulnerability_coderepos_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/coderepos/impacted?project=&ruleName=' ``` diff --git a/openapi-specs/compute/32-05/desc/policies/vulnerability_coderepos_put.md b/openapi-specs/compute/32-05/desc/policies/vulnerability_coderepos_put.md index 514eec136..a002415b9 100644 --- a/openapi-specs/compute/32-05/desc/policies/vulnerability_coderepos_put.md +++ b/openapi-specs/compute/32-05/desc/policies/vulnerability_coderepos_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Code repo Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT 'https:///api/v/policies/vulnerability/coderepos' \ diff --git a/openapi-specs/compute/32-05/desc/policies/vulnerability_host_get.md b/openapi-specs/compute/32-05/desc/policies/vulnerability_host_get.md index 3b9b14b9c..260da7675 100644 --- a/openapi-specs/compute/32-05/desc/policies/vulnerability_host_get.md +++ b/openapi-specs/compute/32-05/desc/policies/vulnerability_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Hosts > Running hosts** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/policies/vulnerability_host_impacted_get.md b/openapi-specs/compute/32-05/desc/policies/vulnerability_host_impacted_get.md index 346368518..f44592830 100644 --- a/openapi-specs/compute/32-05/desc/policies/vulnerability_host_impacted_get.md +++ b/openapi-specs/compute/32-05/desc/policies/vulnerability_host_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by `RULE_NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/host/impacted?project={PROJECT_NAME}&ruleName={RULE_NAME}' ``` diff --git a/openapi-specs/compute/32-05/desc/policies/vulnerability_images_get.md b/openapi-specs/compute/32-05/desc/policies/vulnerability_images_get.md index 33581be37..57359bb8f 100644 --- a/openapi-specs/compute/32-05/desc/policies/vulnerability_images_get.md +++ b/openapi-specs/compute/32-05/desc/policies/vulnerability_images_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images?project=" diff --git a/openapi-specs/compute/32-05/desc/policies/vulnerability_images_impacted_get.md b/openapi-specs/compute/32-05/desc/policies/vulnerability_images_impacted_get.md index ae1d5e396..e2a4efa23 100644 --- a/openapi-specs/compute/32-05/desc/policies/vulnerability_images_impacted_get.md +++ b/openapi-specs/compute/32-05/desc/policies/vulnerability_images_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of images caught by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images/impacted?project=&ruleName=" diff --git a/openapi-specs/compute/32-05/desc/policies/vulnerability_images_put.md b/openapi-specs/compute/32-05/desc/policies/vulnerability_images_put.md index b3330dab7..8c3cc8af2 100644 --- a/openapi-specs/compute/32-05/desc/policies/vulnerability_images_put.md +++ b/openapi-specs/compute/32-05/desc/policies/vulnerability_images_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -X PUT 'https:///api/v/policies/vulnerability/images' \ --data '{ diff --git a/openapi-specs/compute/32-05/desc/policies/vulnerability_serverless_get.md b/openapi-specs/compute/32-05/desc/policies/vulnerability_serverless_get.md index c7a8e2ef5..41c7e75d8 100644 --- a/openapi-specs/compute/32-05/desc/policies/vulnerability_serverless_get.md +++ b/openapi-specs/compute/32-05/desc/policies/vulnerability_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Functions** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/policies/vulnerability_serverless_put.md b/openapi-specs/compute/32-05/desc/policies/vulnerability_serverless_put.md index 2b567b5b1..5199f0997 100644 --- a/openapi-specs/compute/32-05/desc/policies/vulnerability_serverless_put.md +++ b/openapi-specs/compute/32-05/desc/policies/vulnerability_serverless_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k 'https:///api/v/policies/vulnerability/serverless' \ +$ curl 'https:///api/v/policies/vulnerability/serverless' \ -X PUT \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-05/desc/policies/vulnerability_vms_get.md b/openapi-specs/compute/32-05/desc/policies/vulnerability_vms_get.md index 117d2cc4a..e37c1520f 100644 --- a/openapi-specs/compute/32-05/desc/policies/vulnerability_vms_get.md +++ b/openapi-specs/compute/32-05/desc/policies/vulnerability_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Hosts > V The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/policies/vulnerability_vms_impacted_get.md b/openapi-specs/compute/32-05/desc/policies/vulnerability_vms_impacted_get.md index 29d9621ea..f1a7f7ef5 100644 --- a/openapi-specs/compute/32-05/desc/policies/vulnerability_vms_impacted_get.md +++ b/openapi-specs/compute/32-05/desc/policies/vulnerability_vms_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/vms?project=&ruleName=' ``` diff --git a/openapi-specs/compute/32-05/desc/profiles/app-embedded_download_get.md b/openapi-specs/compute/32-05/desc/profiles/app-embedded_download_get.md index 4b3f7ff8a..2e8cac56d 100644 --- a/openapi-specs/compute/32-05/desc/profiles/app-embedded_download_get.md +++ b/openapi-specs/compute/32-05/desc/profiles/app-embedded_download_get.md @@ -5,7 +5,7 @@ Downloads the app-embedded observations in a CSV format. Refer to the following example cURL command that downloads all the app-embedded runtime profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/profiles/app-embedded_get.md b/openapi-specs/compute/32-05/desc/profiles/app-embedded_get.md index f3ddb3125..c332061e5 100644 --- a/openapi-specs/compute/32-05/desc/profiles/app-embedded_get.md +++ b/openapi-specs/compute/32-05/desc/profiles/app-embedded_get.md @@ -5,7 +5,7 @@ Retrieves the app-embedded observations. Refer to the following example cURL command that lists all the app-embedded runtime: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/profiles/container_download_get.md b/openapi-specs/compute/32-05/desc/profiles/container_download_get.md index ad7a86101..ee9d5e9e4 100644 --- a/openapi-specs/compute/32-05/desc/profiles/container_download_get.md +++ b/openapi-specs/compute/32-05/desc/profiles/container_download_get.md @@ -6,7 +6,7 @@ Retrieves the details and state of all runtime models in CSV format. Refer to the following example cURL command that downloads a complete list in CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/profiles/container_filters_get.md b/openapi-specs/compute/32-05/desc/profiles/container_filters_get.md index 8b6122b80..13535b520 100644 --- a/openapi-specs/compute/32-05/desc/profiles/container_filters_get.md +++ b/openapi-specs/compute/32-05/desc/profiles/container_filters_get.md @@ -4,7 +4,7 @@ Returns a list of os and images from page monitor/runtime/container-models in Co Example curl command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/profiles/container_get.md b/openapi-specs/compute/32-05/desc/profiles/container_get.md index cdbc24c3e..59a3764fb 100644 --- a/openapi-specs/compute/32-05/desc/profiles/container_get.md +++ b/openapi-specs/compute/32-05/desc/profiles/container_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of all runtime models. Refer to the following example cURL command that lists all runtime models in a system: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/profiles/container_learn_post.md b/openapi-specs/compute/32-05/desc/profiles/container_learn_post.md index 5fef2e31e..2c1d08af1 100644 --- a/openapi-specs/compute/32-05/desc/profiles/container_learn_post.md +++ b/openapi-specs/compute/32-05/desc/profiles/container_learn_post.md @@ -7,7 +7,7 @@ For more information, refer to [Learning mode](https://docs.prismacloud.io/en/cl Refer to the following example cURL command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/profiles/host_download_get.md b/openapi-specs/compute/32-05/desc/profiles/host_download_get.md index ace270a32..2dfb51ec0 100644 --- a/openapi-specs/compute/32-05/desc/profiles/host_download_get.md +++ b/openapi-specs/compute/32-05/desc/profiles/host_download_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of each host service runtime model in CSV format Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/profiles/host_get.md b/openapi-specs/compute/32-05/desc/profiles/host_get.md index 208a24de3..55d8bf8ff 100644 --- a/openapi-specs/compute/32-05/desc/profiles/host_get.md +++ b/openapi-specs/compute/32-05/desc/profiles/host_get.md @@ -15,7 +15,7 @@ The returned JSON object has the following structure: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/profiles/host_id_rule_get.md b/openapi-specs/compute/32-05/desc/profiles/host_id_rule_get.md index 672cb4c62..8be668fca 100644 --- a/openapi-specs/compute/32-05/desc/profiles/host_id_rule_get.md +++ b/openapi-specs/compute/32-05/desc/profiles/host_id_rule_get.md @@ -10,7 +10,7 @@ This is the `PROFILE_ID`. The following example command uses curl and basic auth to specify the learning mode for a profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/profiles/service_download_get.md b/openapi-specs/compute/32-05/desc/profiles/service_download_get.md index 63dff3354..4c1c431c1 100644 --- a/openapi-specs/compute/32-05/desc/profiles/service_download_get.md +++ b/openapi-specs/compute/32-05/desc/profiles/service_download_get.md @@ -1,7 +1,7 @@ Retrieves the details and state of all host service runtime models in CSV format ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/profiles/service_get.md b/openapi-specs/compute/32-05/desc/profiles/service_get.md index a4f8c348d..5d786d919 100644 --- a/openapi-specs/compute/32-05/desc/profiles/service_get.md +++ b/openapi-specs/compute/32-05/desc/profiles/service_get.md @@ -10,7 +10,7 @@ The returned JSON object has the following structure: Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/profiles/service_id_learn_post.md b/openapi-specs/compute/32-05/desc/profiles/service_id_learn_post.md index fb338b80d..fa85fc3a2 100644 --- a/openapi-specs/compute/32-05/desc/profiles/service_id_learn_post.md +++ b/openapi-specs/compute/32-05/desc/profiles/service_id_learn_post.md @@ -11,7 +11,7 @@ The `PROFILE_ID` is typically the service's name, such as `sshd` or `ntpd`. The following example command uses curl and basic auth to specify the learning mode for a host service profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/profiles/service_learn_post.md b/openapi-specs/compute/32-05/desc/profiles/service_learn_post.md index 02a1f299e..ceff8e5a5 100644 --- a/openapi-specs/compute/32-05/desc/profiles/service_learn_post.md +++ b/openapi-specs/compute/32-05/desc/profiles/service_learn_post.md @@ -3,7 +3,7 @@ Specify the learning mode for all host service profiles. The following example command uses curl and basic auth to specify the learning mode for all host service profiles. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/profiles/service_names_get.md b/openapi-specs/compute/32-05/desc/profiles/service_names_get.md index 7da863545..afae56f0d 100644 --- a/openapi-specs/compute/32-05/desc/profiles/service_names_get.md +++ b/openapi-specs/compute/32-05/desc/profiles/service_names_get.md @@ -3,7 +3,7 @@ Retrieves the name of all host service runtime models from within the app at **M The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/projects/get.md b/openapi-specs/compute/32-05/desc/projects/get.md index 05485c24c..1ac04d2c0 100644 --- a/openapi-specs/compute/32-05/desc/projects/get.md +++ b/openapi-specs/compute/32-05/desc/projects/get.md @@ -3,7 +3,7 @@ Lists all projects visible to the given user. Assuming the given user is an admin, the following example curl command would list all projects: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/projects/name_delete.md b/openapi-specs/compute/32-05/desc/projects/name_delete.md index fba889f7e..0a34e72a2 100644 --- a/openapi-specs/compute/32-05/desc/projects/name_delete.md +++ b/openapi-specs/compute/32-05/desc/projects/name_delete.md @@ -6,7 +6,7 @@ The value for `` can be retrieved from the `_id` field in the resp The DELETE method returns the decommissioned supervisor's admin username and password. ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/compute/32-05/desc/projects/name_put.md b/openapi-specs/compute/32-05/desc/projects/name_put.md index b5a83a67d..1bde9b0c7 100644 --- a/openapi-specs/compute/32-05/desc/projects/name_put.md +++ b/openapi-specs/compute/32-05/desc/projects/name_put.md @@ -4,7 +4,7 @@ The following example curl command updates a project named ``. The value for `` can be retrieved from the `_id` field in the response object from `GET /api/v1/projects`. ```bash -$ curl -k \ +$ curl \ -u \ -X PUT \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/compute/32-05/desc/projects/post.md b/openapi-specs/compute/32-05/desc/projects/post.md index 8862c0fd4..38c574173 100644 --- a/openapi-specs/compute/32-05/desc/projects/post.md +++ b/openapi-specs/compute/32-05/desc/projects/post.md @@ -3,7 +3,7 @@ Provisions a new project. The following example curl command provisions a new project named `my-project`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ $ curl -k \ If you have installed a new instance of Console, and you have already created an initial admin user for it, then you can specify the admin username name and password when you provision the project. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/projects/projects.md b/openapi-specs/compute/32-05/desc/projects/projects.md index 7e7dcff66..19c904e9e 100644 --- a/openapi-specs/compute/32-05/desc/projects/projects.md +++ b/openapi-specs/compute/32-05/desc/projects/projects.md @@ -20,7 +20,7 @@ If `project` is not specified, it is set to `Central+Console`. For example, to retrieve the compliance policies for a tenant project named `mobile_payments_division`, use the following curl command: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/radar/container_clean_post.md b/openapi-specs/compute/32-05/desc/radar/container_clean_post.md index 662b6d53f..d4f87e91e 100644 --- a/openapi-specs/compute/32-05/desc/radar/container_clean_post.md +++ b/openapi-specs/compute/32-05/desc/radar/container_clean_post.md @@ -1,7 +1,7 @@ Cleans the container runtime profiles and Radar entities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/radar/container_delete.md b/openapi-specs/compute/32-05/desc/radar/container_delete.md index 4eabe337f..b6cc69cf2 100644 --- a/openapi-specs/compute/32-05/desc/radar/container_delete.md +++ b/openapi-specs/compute/32-05/desc/radar/container_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-05/desc/radar/container_export_get.md b/openapi-specs/compute/32-05/desc/radar/container_export_get.md index 7f577568f..f776c7e6c 100644 --- a/openapi-specs/compute/32-05/desc/radar/container_export_get.md +++ b/openapi-specs/compute/32-05/desc/radar/container_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for containers) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/radar/container_filters_get.md b/openapi-specs/compute/32-05/desc/radar/container_filters_get.md index f66463da1..8d7cd6df3 100644 --- a/openapi-specs/compute/32-05/desc/radar/container_filters_get.md +++ b/openapi-specs/compute/32-05/desc/radar/container_filters_get.md @@ -1,7 +1,7 @@ Returns the namespaces from the container view on the Radar page. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/radar/container_get.md b/openapi-specs/compute/32-05/desc/radar/container_get.md index 280d683d9..404629a25 100644 --- a/openapi-specs/compute/32-05/desc/radar/container_get.md +++ b/openapi-specs/compute/32-05/desc/radar/container_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (container view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/radar/host_delete.md b/openapi-specs/compute/32-05/desc/radar/host_delete.md index 738fa7a7c..b4910a8b7 100644 --- a/openapi-specs/compute/32-05/desc/radar/host_delete.md +++ b/openapi-specs/compute/32-05/desc/radar/host_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two apps in CNNF for hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-05/desc/radar/host_export_get.md b/openapi-specs/compute/32-05/desc/radar/host_export_get.md index dd91b5335..851d6f40f 100644 --- a/openapi-specs/compute/32-05/desc/radar/host_export_get.md +++ b/openapi-specs/compute/32-05/desc/radar/host_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for hosts) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/radar/host_get.md b/openapi-specs/compute/32-05/desc/radar/host_get.md index a12025856..222d075aa 100644 --- a/openapi-specs/compute/32-05/desc/radar/host_get.md +++ b/openapi-specs/compute/32-05/desc/radar/host_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (host view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/radar/serverless_get.md b/openapi-specs/compute/32-05/desc/radar/serverless_get.md index b2f329149..170cfb48d 100644 --- a/openapi-specs/compute/32-05/desc/radar/serverless_get.md +++ b/openapi-specs/compute/32-05/desc/radar/serverless_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/radar/serverless_progress_get.md b/openapi-specs/compute/32-05/desc/radar/serverless_progress_get.md index a11c1ae20..0808dfbf4 100644 --- a/openapi-specs/compute/32-05/desc/radar/serverless_progress_get.md +++ b/openapi-specs/compute/32-05/desc/radar/serverless_progress_get.md @@ -1,7 +1,7 @@ Returns the scan progress from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/radar/serverless_scan_post.md b/openapi-specs/compute/32-05/desc/radar/serverless_scan_post.md index 0d519ba88..2d444ac88 100644 --- a/openapi-specs/compute/32-05/desc/radar/serverless_scan_post.md +++ b/openapi-specs/compute/32-05/desc/radar/serverless_scan_post.md @@ -1,7 +1,7 @@ Initiates a serverless scan of your environments. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/radar/serverless_stop_post.md b/openapi-specs/compute/32-05/desc/radar/serverless_stop_post.md index 5c0bdf186..f15bef34d 100644 --- a/openapi-specs/compute/32-05/desc/radar/serverless_stop_post.md +++ b/openapi-specs/compute/32-05/desc/radar/serverless_stop_post.md @@ -1,7 +1,7 @@ Stops an in-progress serverless scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/rbac/role_delete.md b/openapi-specs/compute/32-05/desc/rbac/role_delete.md index 87015b6e8..46efcf9c9 100644 --- a/openapi-specs/compute/32-05/desc/rbac/role_delete.md +++ b/openapi-specs/compute/32-05/desc/rbac/role_delete.md @@ -4,7 +4,7 @@ System roles and roles assigned to users/groups cannot be deleted. The following example curl command uses basic auth to delete role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-05/desc/rbac/roles_get.md b/openapi-specs/compute/32-05/desc/rbac/roles_get.md index 4cd1d9bc7..112026937 100644 --- a/openapi-specs/compute/32-05/desc/rbac/roles_get.md +++ b/openapi-specs/compute/32-05/desc/rbac/roles_get.md @@ -3,7 +3,7 @@ This endpoint will return a list in JSON format of the roles can be found under The following example curl command uses basic auth to return: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/rbac/roles_post.md b/openapi-specs/compute/32-05/desc/rbac/roles_post.md index 1f20772ce..6988766e8 100644 --- a/openapi-specs/compute/32-05/desc/rbac/roles_post.md +++ b/openapi-specs/compute/32-05/desc/rbac/roles_post.md @@ -37,7 +37,7 @@ The added role must contain the "user" permission with read-write access. This p The following example curl command uses basic auth to create the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/rbac/roles_put.md b/openapi-specs/compute/32-05/desc/rbac/roles_put.md index 34d7b41a7..f62e34ccb 100644 --- a/openapi-specs/compute/32-05/desc/rbac/roles_put.md +++ b/openapi-specs/compute/32-05/desc/rbac/roles_put.md @@ -38,7 +38,7 @@ The updated role must contain the "user" permission with read-write access. This The following example curl command uses basic auth to update the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-05/desc/recovery/backup_get.md b/openapi-specs/compute/32-05/desc/recovery/backup_get.md index 4da46f356..bf735905a 100644 --- a/openapi-specs/compute/32-05/desc/recovery/backup_get.md +++ b/openapi-specs/compute/32-05/desc/recovery/backup_get.md @@ -3,7 +3,7 @@ Returns a list of available backups. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/recovery/backup_id_delete.md b/openapi-specs/compute/32-05/desc/recovery/backup_id_delete.md index ae9c33e90..80cd4c3f6 100644 --- a/openapi-specs/compute/32-05/desc/recovery/backup_id_delete.md +++ b/openapi-specs/compute/32-05/desc/recovery/backup_id_delete.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-05/desc/recovery/backup_id_patch.md b/openapi-specs/compute/32-05/desc/recovery/backup_id_patch.md index 4a78cd67d..b3699972f 100644 --- a/openapi-specs/compute/32-05/desc/recovery/backup_id_patch.md +++ b/openapi-specs/compute/32-05/desc/recovery/backup_id_patch.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/compute/32-05/desc/recovery/backup_post.md b/openapi-specs/compute/32-05/desc/recovery/backup_post.md index f45161712..41436fe5f 100644 --- a/openapi-specs/compute/32-05/desc/recovery/backup_post.md +++ b/openapi-specs/compute/32-05/desc/recovery/backup_post.md @@ -3,7 +3,7 @@ Creates a backup named `backup_name` by invoking the MongoDB dump process. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/recovery/restore_id_post.md b/openapi-specs/compute/32-05/desc/recovery/restore_id_post.md index 850fceeaa..e424641cc 100644 --- a/openapi-specs/compute/32-05/desc/recovery/restore_id_post.md +++ b/openapi-specs/compute/32-05/desc/recovery/restore_id_post.md @@ -5,7 +5,7 @@ Restores Prisma Cloud Compute from the given backup. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/registry/download_get.md b/openapi-specs/compute/32-05/desc/registry/download_get.md index 5a3eb0141..3eef8d50e 100644 --- a/openapi-specs/compute/32-05/desc/registry/download_get.md +++ b/openapi-specs/compute/32-05/desc/registry/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Compliance > Images > Reg Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/registry/get.md b/openapi-specs/compute/32-05/desc/registry/get.md index 96b46382e..7474b119a 100644 --- a/openapi-specs/compute/32-05/desc/registry/get.md +++ b/openapi-specs/compute/32-05/desc/registry/get.md @@ -20,7 +20,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that retrieves a scan report for all images in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -32,7 +32,7 @@ The compact query can be used to get a general overview of the number of Vulnera Refer to the following cURL command that retrieves a compact scan report for the Ubuntu image in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -43,7 +43,7 @@ The name query is synonymous with the filter registry text field in the Console Refer to the following cURL that retrieves the scan report for the image in the registry with the matching **sha256** hash: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -53,7 +53,7 @@ $ curl -k \ Refer to the following cURL command that retrieves the images in the first 10 registries: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/registry/get_registry_progress.md b/openapi-specs/compute/32-05/desc/registry/get_registry_progress.md index 03c5d0896..c08331d5b 100644 --- a/openapi-specs/compute/32-05/desc/registry/get_registry_progress.md +++ b/openapi-specs/compute/32-05/desc/registry/get_registry_progress.md @@ -9,7 +9,7 @@ For a regular scan, use the API path only without any query parameters. Refer to the following example cURL request that retrieves the ongoing scan details for a regular registry scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -63,7 +63,7 @@ For an on-demand scan that is started using the `/registry/scan` endpoint with t Refer to the following example cURL request that retrieves the ongoing scan details for an on-demand registry scan that is started using the `/registry/scan` endpoint for the repository `alpine` with tag `3.16`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/registry/names_get.md b/openapi-specs/compute/32-05/desc/registry/names_get.md index 1e5bed727..f3b8676a8 100644 --- a/openapi-specs/compute/32-05/desc/registry/names_get.md +++ b/openapi-specs/compute/32-05/desc/registry/names_get.md @@ -5,7 +5,7 @@ Retrieves a list of image names from current scanned registry images. The base ` Refer to the following example cURL command that retrieves a list of image names from your scanned registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/registry/scan_post.md b/openapi-specs/compute/32-05/desc/registry/scan_post.md index ce7e19533..96bfd5f16 100644 --- a/openapi-specs/compute/32-05/desc/registry/scan_post.md +++ b/openapi-specs/compute/32-05/desc/registry/scan_post.md @@ -17,7 +17,7 @@ For information on scan result, see [Get Registry Scan Report](https://prisma.pa Refer to the following example cURL command that forces Prisma Cloud Compute to rescan all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -27,7 +27,7 @@ $ curl -k \ Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan a specific image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -52,7 +52,7 @@ For information on scan result, see [Get Registry Scan Report](https://pan.dev/p Refer to the following example cURL command to trigger an on-demand scan for an image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/registry/stop_post.md b/openapi-specs/compute/32-05/desc/registry/stop_post.md index 29e103ac1..05ac2f436 100644 --- a/openapi-specs/compute/32-05/desc/registry/stop_post.md +++ b/openapi-specs/compute/32-05/desc/registry/stop_post.md @@ -5,7 +5,7 @@ Stops current registry scan immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to stop scanning all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/scans/download_get.md b/openapi-specs/compute/32-05/desc/scans/download_get.md index 61a0ccc2d..3785bf562 100644 --- a/openapi-specs/compute/32-05/desc/scans/download_get.md +++ b/openapi-specs/compute/32-05/desc/scans/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Images The following cURL command retrieves and saves your Jenkins and twistcli scan reports to a CSV file called `scans_report.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/scans/filter_get.md b/openapi-specs/compute/32-05/desc/scans/filter_get.md index 58550ad35..df3e9cdb0 100644 --- a/openapi-specs/compute/32-05/desc/scans/filter_get.md +++ b/openapi-specs/compute/32-05/desc/scans/filter_get.md @@ -3,7 +3,7 @@ Retrieves the list of Jenkins projects that have been scanned by the Jenkins plu The following example curl command uses basic auth to retrieve the list of Jenkins project names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/scans/get.md b/openapi-specs/compute/32-05/desc/scans/get.md index 9bc06317f..775d9934f 100644 --- a/openapi-specs/compute/32-05/desc/scans/get.md +++ b/openapi-specs/compute/32-05/desc/scans/get.md @@ -10,7 +10,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command that retrieves the scan reports for all images scanned using the Jenkins CI plugin or the twistcli tool: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -22,7 +22,7 @@ To get the report of a specific scan, add query parameters to narrow the scope o The following cURL command retrieves the scan report for an image with a SHA256 ID of `sha256:f756e84300d8e53006090573dd33abe5b8cfac3e42d104fc4be37f435fe512f3`. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/scans/id_get.md b/openapi-specs/compute/32-05/desc/scans/id_get.md index 7a342ef60..1557b1905 100644 --- a/openapi-specs/compute/32-05/desc/scans/id_get.md +++ b/openapi-specs/compute/32-05/desc/scans/id_get.md @@ -3,7 +3,7 @@ Retrieves all scan reports for images scanned by the Jenkins plugin or twistcli The following example curl command uses basic auth to retrieve the scan report for just an image with a SHA256 ID of `5c3385fd2e76c5c16124c077`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/scripts/console_sh_get.md b/openapi-specs/compute/32-05/desc/scripts/console_sh_get.md index d8f02038f..1622321ca 100644 --- a/openapi-specs/compute/32-05/desc/scripts/console_sh_get.md +++ b/openapi-specs/compute/32-05/desc/scripts/console_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/scripts/defender_ps1_get.md b/openapi-specs/compute/32-05/desc/scripts/defender_ps1_get.md index a47616983..45e4a6133 100644 --- a/openapi-specs/compute/32-05/desc/scripts/defender_ps1_get.md +++ b/openapi-specs/compute/32-05/desc/scripts/defender_ps1_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/scripts/defender_sh_get.md b/openapi-specs/compute/32-05/desc/scripts/defender_sh_get.md index 98ad6cf62..a8a302426 100644 --- a/openapi-specs/compute/32-05/desc/scripts/defender_sh_get.md +++ b/openapi-specs/compute/32-05/desc/scripts/defender_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/serverless/download_get.md b/openapi-specs/compute/32-05/desc/serverless/download_get.md index a8e49ff25..4d7d3adc1 100644 --- a/openapi-specs/compute/32-05/desc/serverless/download_get.md +++ b/openapi-specs/compute/32-05/desc/serverless/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Functio The following cURL command retrieves a list of all serverless resources monitored by Prisma Cloud Compute and saves the results in a CSV file called `serverless.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/serverless/download' \ diff --git a/openapi-specs/compute/32-05/desc/serverless/embed_post.md b/openapi-specs/compute/32-05/desc/serverless/embed_post.md index 6cce784b8..353b5721c 100644 --- a/openapi-specs/compute/32-05/desc/serverless/embed_post.md +++ b/openapi-specs/compute/32-05/desc/serverless/embed_post.md @@ -1,7 +1,7 @@ The following curl command uses basic auth to retrieve a list of all Serverless resources that monitored by Prisma Cloud Compute, and save the results to a CSV file: ```bash -$ curl -k \ +$ curl \ -X POST \ -H "Content-Type: application/octet-stream" \ -u \ diff --git a/openapi-specs/compute/32-05/desc/serverless/get.md b/openapi-specs/compute/32-05/desc/serverless/get.md index 77a0d8a4e..c6c75c480 100644 --- a/openapi-specs/compute/32-05/desc/serverless/get.md +++ b/openapi-specs/compute/32-05/desc/serverless/get.md @@ -10,7 +10,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Functions > Scanned function Refer to the following example cURL command that retrieves the scan reports for serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/serverless/names_get.md b/openapi-specs/compute/32-05/desc/serverless/names_get.md index 62cbcd53b..ab229e0f8 100644 --- a/openapi-specs/compute/32-05/desc/serverless/names_get.md +++ b/openapi-specs/compute/32-05/desc/serverless/names_get.md @@ -1,7 +1,7 @@ The following curl command uses basic auth to retrieve a list of names of all Serverless resources monitored by Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -X GET \ -H "Content-Type: application/json" \ -u \ diff --git a/openapi-specs/compute/32-05/desc/serverless/scan_post.md b/openapi-specs/compute/32-05/desc/serverless/scan_post.md index 159285349..70a3a3b4e 100644 --- a/openapi-specs/compute/32-05/desc/serverless/scan_post.md +++ b/openapi-specs/compute/32-05/desc/serverless/scan_post.md @@ -5,7 +5,7 @@ Re-scan all serverless functions immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/scan diff --git a/openapi-specs/compute/32-05/desc/serverless/stop_post.md b/openapi-specs/compute/32-05/desc/serverless/stop_post.md index 763710842..67c0d2239 100644 --- a/openapi-specs/compute/32-05/desc/serverless/stop_post.md +++ b/openapi-specs/compute/32-05/desc/serverless/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing serverless scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/stop diff --git a/openapi-specs/compute/32-05/desc/settings/alerts_get.md b/openapi-specs/compute/32-05/desc/settings/alerts_get.md index 060114c39..2b25dc6c9 100644 --- a/openapi-specs/compute/32-05/desc/settings/alerts_get.md +++ b/openapi-specs/compute/32-05/desc/settings/alerts_get.md @@ -1,7 +1,7 @@ Retrieves a list of your alert settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/settings/alerts_options_get.md b/openapi-specs/compute/32-05/desc/settings/alerts_options_get.md index 095c1f1b7..aa7a1d250 100644 --- a/openapi-specs/compute/32-05/desc/settings/alerts_options_get.md +++ b/openapi-specs/compute/32-05/desc/settings/alerts_options_get.md @@ -3,7 +3,7 @@ This endpoint will return the alert profile configuration options that can be fo The following example curl command uses basic auth to retrieve all alert profile configuration options: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/settings/alerts_post.md b/openapi-specs/compute/32-05/desc/settings/alerts_post.md index 3acb8d543..cd303f880 100644 --- a/openapi-specs/compute/32-05/desc/settings/alerts_post.md +++ b/openapi-specs/compute/32-05/desc/settings/alerts_post.md @@ -3,7 +3,7 @@ Configure alerts. The following example curl command sets the aggregation period for alerts to one hour. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/settings/certificates_post.md b/openapi-specs/compute/32-05/desc/settings/certificates_post.md index fbdc8a5a9..bd30ea399 100644 --- a/openapi-specs/compute/32-05/desc/settings/certificates_post.md +++ b/openapi-specs/compute/32-05/desc/settings/certificates_post.md @@ -9,7 +9,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to set the validity period for client certificates to seven days: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/32-05/desc/settings/certs_get.md b/openapi-specs/compute/32-05/desc/settings/certs_get.md index ba6674a3c..dbf1d3790 100644 --- a/openapi-specs/compute/32-05/desc/settings/certs_get.md +++ b/openapi-specs/compute/32-05/desc/settings/certs_get.md @@ -6,7 +6,7 @@ Defenders use these names to connect to Console. Refer to the following example cURL request that uses basic auth to retrieve the SANs in Console's cert: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/settings/certs_post.md b/openapi-specs/compute/32-05/desc/settings/certs_post.md index a6e429006..fb2cedee5 100644 --- a/openapi-specs/compute/32-05/desc/settings/certs_post.md +++ b/openapi-specs/compute/32-05/desc/settings/certs_post.md @@ -12,7 +12,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to add `node-01.example.com` to the `subjectAltName` field in the certificate: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/32-05/desc/settings/coderepos_get.md b/openapi-specs/compute/32-05/desc/settings/coderepos_get.md index 6cbfb78cb..286a8d905 100644 --- a/openapi-specs/compute/32-05/desc/settings/coderepos_get.md +++ b/openapi-specs/compute/32-05/desc/settings/coderepos_get.md @@ -20,7 +20,7 @@ Construct the full webhook using Console's publicly accessible DNS name or IP ad Refer to the following example cURL command that retrieves all code repositories to scan, as well as the webhook URL suffix: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/settings/console-certificates_post.md b/openapi-specs/compute/32-05/desc/settings/console-certificates_post.md index 5673af840..392061c8f 100644 --- a/openapi-specs/compute/32-05/desc/settings/console-certificates_post.md +++ b/openapi-specs/compute/32-05/desc/settings/console-certificates_post.md @@ -9,7 +9,7 @@ For the custom TLS certificate for securing browser access, this file must be in Refer to the following example cURL request that uses basic auth and configures the custom certificate to use for securing browser access to the console: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/settings/custom-labels_get.md b/openapi-specs/compute/32-05/desc/settings/custom-labels_get.md index a849dd8a8..19c1cadde 100644 --- a/openapi-specs/compute/32-05/desc/settings/custom-labels_get.md +++ b/openapi-specs/compute/32-05/desc/settings/custom-labels_get.md @@ -5,7 +5,7 @@ Returns the list of alert labels configured in Prisma Cloud Compute. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/settings/custom-labels_post.md b/openapi-specs/compute/32-05/desc/settings/custom-labels_post.md index 6bb66e706..9b0702fe8 100644 --- a/openapi-specs/compute/32-05/desc/settings/custom-labels_post.md +++ b/openapi-specs/compute/32-05/desc/settings/custom-labels_post.md @@ -5,7 +5,7 @@ Creates a custom alert label to augment audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/settings/defender_get.md b/openapi-specs/compute/32-05/desc/settings/defender_get.md index ecb8b6989..cf43bb304 100644 --- a/openapi-specs/compute/32-05/desc/settings/defender_get.md +++ b/openapi-specs/compute/32-05/desc/settings/defender_get.md @@ -5,7 +5,7 @@ Returns the advanced settings for Defenders. Refer to the following example cURL command that gets all advanced settings for Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/settings/forensic_get.md b/openapi-specs/compute/32-05/desc/settings/forensic_get.md index 9c16b70b9..3486b2bf9 100644 --- a/openapi-specs/compute/32-05/desc/settings/forensic_get.md +++ b/openapi-specs/compute/32-05/desc/settings/forensic_get.md @@ -1,7 +1,7 @@ Retrieves the settings for the forensics system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/settings/forensic_post.md b/openapi-specs/compute/32-05/desc/settings/forensic_post.md index 31f809d39..8943842fb 100644 --- a/openapi-specs/compute/32-05/desc/settings/forensic_post.md +++ b/openapi-specs/compute/32-05/desc/settings/forensic_post.md @@ -3,7 +3,7 @@ Configures the forensics system. The following example curl command allocates 100 MB of local disk space for container forensic data and 10 MB for host forensics data. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/settings/initialized_get.md b/openapi-specs/compute/32-05/desc/settings/initialized_get.md index 3134912d1..2af8462f1 100644 --- a/openapi-specs/compute/32-05/desc/settings/initialized_get.md +++ b/openapi-specs/compute/32-05/desc/settings/initialized_get.md @@ -4,7 +4,7 @@ After first installing Console, the first thing you must do is create an admin a Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/settings/intelligence-windows_post.md b/openapi-specs/compute/32-05/desc/settings/intelligence-windows_post.md index c39e256d2..0721dab3b 100644 --- a/openapi-specs/compute/32-05/desc/settings/intelligence-windows_post.md +++ b/openapi-specs/compute/32-05/desc/settings/intelligence-windows_post.md @@ -3,7 +3,7 @@ This endpoint will enable or disable the Windows Intelligence Service from **Man The following example curl command uses basic auth to enable online updates of Windows vulnerabilities from the intelligence stream: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/settings/intelligence_get.md b/openapi-specs/compute/32-05/desc/settings/intelligence_get.md index 26c694246..15e9f24ae 100644 --- a/openapi-specs/compute/32-05/desc/settings/intelligence_get.md +++ b/openapi-specs/compute/32-05/desc/settings/intelligence_get.md @@ -5,7 +5,7 @@ Returns the details about the Intelligence Stream configuration. Refer to the following example cURL command that uses basic auth to retrieve your Intelligence Stream configuration settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/settings/intelligence_post.md b/openapi-specs/compute/32-05/desc/settings/intelligence_post.md index 74b06a3a0..2dbbd0168 100644 --- a/openapi-specs/compute/32-05/desc/settings/intelligence_post.md +++ b/openapi-specs/compute/32-05/desc/settings/intelligence_post.md @@ -7,7 +7,7 @@ For more information, see [Intelligence Stream](https://docs.paloaltonetworks.co Refer to the following example cURL command that uses basic auth to configure settings of your Intelligence Stream. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/settings/latest-version_get.md b/openapi-specs/compute/32-05/desc/settings/latest-version_get.md index c443fa7b5..16601fb5b 100644 --- a/openapi-specs/compute/32-05/desc/settings/latest-version_get.md +++ b/openapi-specs/compute/32-05/desc/settings/latest-version_get.md @@ -3,7 +3,7 @@ Retrieves the version number of the latest available Prisma Cloud Compute releas Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/settings/latest_version_get.md b/openapi-specs/compute/32-05/desc/settings/latest_version_get.md index 18e436668..5c64edff1 100644 --- a/openapi-specs/compute/32-05/desc/settings/latest_version_get.md +++ b/openapi-specs/compute/32-05/desc/settings/latest_version_get.md @@ -1,7 +1,7 @@ This endpoint will return the latest version of the product. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/settings/ldap_get.md b/openapi-specs/compute/32-05/desc/settings/ldap_get.md index 4ad0ad0c9..7d803ba1c 100644 --- a/openapi-specs/compute/32-05/desc/settings/ldap_get.md +++ b/openapi-specs/compute/32-05/desc/settings/ldap_get.md @@ -5,7 +5,7 @@ Returns the LDAP integration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/settings/ldap_post.md b/openapi-specs/compute/32-05/desc/settings/ldap_post.md index c152c7dc5..34bc06ef4 100644 --- a/openapi-specs/compute/32-05/desc/settings/ldap_post.md +++ b/openapi-specs/compute/32-05/desc/settings/ldap_post.md @@ -7,7 +7,7 @@ For more information, see [Active Directory](https://docs.paloaltonetworks.com/p Refer to the following example cURL command that enables the LDAP integration and specifies the parameters required to integrate with an Active Directory service. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/settings/license_get.md b/openapi-specs/compute/32-05/desc/settings/license_get.md index 5c792cae8..2b4b548e3 100644 --- a/openapi-specs/compute/32-05/desc/settings/license_get.md +++ b/openapi-specs/compute/32-05/desc/settings/license_get.md @@ -5,7 +5,7 @@ Returns the details about the installed license. Refer to the following example cURL request that retrieves the license details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/settings/license_post.md b/openapi-specs/compute/32-05/desc/settings/license_post.md index b77800a5f..ce74b0d0f 100644 --- a/openapi-specs/compute/32-05/desc/settings/license_post.md +++ b/openapi-specs/compute/32-05/desc/settings/license_post.md @@ -8,7 +8,7 @@ For more information, see [Licensing](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to set your license: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/settings/logging_get.md b/openapi-specs/compute/32-05/desc/settings/logging_get.md index 6eda3e484..012be5def 100644 --- a/openapi-specs/compute/32-05/desc/settings/logging_get.md +++ b/openapi-specs/compute/32-05/desc/settings/logging_get.md @@ -5,7 +5,7 @@ Returns the logging settings. Refer to the following example cURL request that uses basic auth to retrieve your logging details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/settings/logging_post.md b/openapi-specs/compute/32-05/desc/settings/logging_post.md index 3619d9c0f..8d27ee1b3 100644 --- a/openapi-specs/compute/32-05/desc/settings/logging_post.md +++ b/openapi-specs/compute/32-05/desc/settings/logging_post.md @@ -8,7 +8,7 @@ For more information, see [Logging](https://docs.paloaltonetworks.com/prisma/pri Refer to the following example cURL request that enables verbose scan output for syslog and stdout: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/settings/logon_get.md b/openapi-specs/compute/32-05/desc/settings/logon_get.md index 1559f2405..b1e9164f2 100644 --- a/openapi-specs/compute/32-05/desc/settings/logon_get.md +++ b/openapi-specs/compute/32-05/desc/settings/logon_get.md @@ -5,7 +5,7 @@ Configures the logon settings. Refer to the following example cURL request that uses basic auth to retrieve all current logon settings. ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/settings/logon_post.md b/openapi-specs/compute/32-05/desc/settings/logon_post.md index 5c2b60c9f..691e082fe 100644 --- a/openapi-specs/compute/32-05/desc/settings/logon_post.md +++ b/openapi-specs/compute/32-05/desc/settings/logon_post.md @@ -7,7 +7,7 @@ For more information, see [Logon Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that uses basic auth to set the timeout to 900 seconds (15 minutes): ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/32-05/desc/settings/oauth_get.md b/openapi-specs/compute/32-05/desc/settings/oauth_get.md index 6dcf70fb5..5d997f016 100644 --- a/openapi-specs/compute/32-05/desc/settings/oauth_get.md +++ b/openapi-specs/compute/32-05/desc/settings/oauth_get.md @@ -5,7 +5,7 @@ Returns the OAuth configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/settings/oauth_post.md b/openapi-specs/compute/32-05/desc/settings/oauth_post.md index c593b9237..da3c83d2f 100644 --- a/openapi-specs/compute/32-05/desc/settings/oauth_post.md +++ b/openapi-specs/compute/32-05/desc/settings/oauth_post.md @@ -7,7 +7,7 @@ For more information, see [GitHub OAuth](https://docs.paloaltonetworks.com/prism Refer to the following example cURL response: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/settings/oidc_get.md b/openapi-specs/compute/32-05/desc/settings/oidc_get.md index ee439622b..1f27f93ba 100644 --- a/openapi-specs/compute/32-05/desc/settings/oidc_get.md +++ b/openapi-specs/compute/32-05/desc/settings/oidc_get.md @@ -5,7 +5,7 @@ Returns the OpenID Connect configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/settings/oidc_post.md b/openapi-specs/compute/32-05/desc/settings/oidc_post.md index e0270247e..5bd3a9192 100644 --- a/openapi-specs/compute/32-05/desc/settings/oidc_post.md +++ b/openapi-specs/compute/32-05/desc/settings/oidc_post.md @@ -7,7 +7,7 @@ For more information, see [OIDC](https://docs.paloaltonetworks.com/prisma/prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/settings/pcf_get.md b/openapi-specs/compute/32-05/desc/settings/pcf_get.md index 5dc21eb17..c5e42a823 100644 --- a/openapi-specs/compute/32-05/desc/settings/pcf_get.md +++ b/openapi-specs/compute/32-05/desc/settings/pcf_get.md @@ -3,7 +3,7 @@ This endpoint will return settings for PCF (Pivotal Cloud Foundry)Blobstore scan The following example curl command uses basic auth to retrieve the current PCF Blobstore scanning settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/settings/pcf_post.md b/openapi-specs/compute/32-05/desc/settings/pcf_post.md index 139e947cb..657e14f27 100644 --- a/openapi-specs/compute/32-05/desc/settings/pcf_post.md +++ b/openapi-specs/compute/32-05/desc/settings/pcf_post.md @@ -3,7 +3,7 @@ This endpoint will allow for updating settings for PCF (Pivotal Cloud Foundry) B The following example curl command uses basic auth to set up a PCF Blobstore scanner that scans the last `5` droplets for every droplet in the PCF Blobstore: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/settings/projects_get.md b/openapi-specs/compute/32-05/desc/settings/projects_get.md index f5dd20395..bc95414a1 100644 --- a/openapi-specs/compute/32-05/desc/settings/projects_get.md +++ b/openapi-specs/compute/32-05/desc/settings/projects_get.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command retrieves the state of the Projects feature from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ All API calls must be proxied through Central Console, where the request is auto To retrieve the Projects settings from a supervisor Console, append the `project` query parameter to your request. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/settings/projects_post.md b/openapi-specs/compute/32-05/desc/settings/projects_post.md index d29f8e9d5..b3472e6b9 100644 --- a/openapi-specs/compute/32-05/desc/settings/projects_post.md +++ b/openapi-specs/compute/32-05/desc/settings/projects_post.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command designates `` as master. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/settings/proxy_get.md b/openapi-specs/compute/32-05/desc/settings/proxy_get.md index 9a4922d59..477563069 100644 --- a/openapi-specs/compute/32-05/desc/settings/proxy_get.md +++ b/openapi-specs/compute/32-05/desc/settings/proxy_get.md @@ -5,7 +5,7 @@ Returns the proxy settings for Prisma Cloud Compute containers to access the Int Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/settings/proxy_post.md b/openapi-specs/compute/32-05/desc/settings/proxy_post.md index a1bdc07ed..df926524e 100644 --- a/openapi-specs/compute/32-05/desc/settings/proxy_post.md +++ b/openapi-specs/compute/32-05/desc/settings/proxy_post.md @@ -7,7 +7,7 @@ For more information, see [Proxy Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that specifies the proxy to use to access the Internet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/settings/registry_get.md b/openapi-specs/compute/32-05/desc/settings/registry_get.md index 12745005d..64e70b698 100644 --- a/openapi-specs/compute/32-05/desc/settings/registry_get.md +++ b/openapi-specs/compute/32-05/desc/settings/registry_get.md @@ -17,7 +17,7 @@ Construct the full webhook using the publicly accessible DNS name or IP address, The following cURL command retrieves all the registries to scan and the URL suffix for the registry's webhook URL suffix. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/settings/registry_post.md b/openapi-specs/compute/32-05/desc/settings/registry_post.md index 0fae2c481..f9ff1b8e6 100644 --- a/openapi-specs/compute/32-05/desc/settings/registry_post.md +++ b/openapi-specs/compute/32-05/desc/settings/registry_post.md @@ -30,7 +30,7 @@ The API response returns an HTTP 400 error, if the number of registry specificat Refer to the following example cURL command that configures Prisma Cloud Compute to scan the Ubuntu 16.04 repository on Docker Hub: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -64,7 +64,7 @@ To add settings for a GitLab Container Registry, you must specify the following Refer to the following example cURL command: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/settings/registry_put.md b/openapi-specs/compute/32-05/desc/settings/registry_put.md index 3768914f6..75d6c79a2 100644 --- a/openapi-specs/compute/32-05/desc/settings/registry_put.md +++ b/openapi-specs/compute/32-05/desc/settings/registry_put.md @@ -127,7 +127,7 @@ To remove a registry from the list: To delete all entries, submit an empty `specifications` array. For example: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-05/desc/settings/saml_get.md b/openapi-specs/compute/32-05/desc/settings/saml_get.md index f2228a440..4fb940e80 100644 --- a/openapi-specs/compute/32-05/desc/settings/saml_get.md +++ b/openapi-specs/compute/32-05/desc/settings/saml_get.md @@ -5,7 +5,7 @@ Returns the configured SAML settings that is used to authenticate to the Prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/settings/saml_post.md b/openapi-specs/compute/32-05/desc/settings/saml_post.md index 0bd9c4a25..dfe8d380f 100644 --- a/openapi-specs/compute/32-05/desc/settings/saml_post.md +++ b/openapi-specs/compute/32-05/desc/settings/saml_post.md @@ -7,7 +7,7 @@ For more information, see [Okta via SAML 2.0](https://docs.paloaltonetworks.com/ Refer to the following example cURL request that uses the basic auth to set up and enable the SAML integration with Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/settings/scan_get.md b/openapi-specs/compute/32-05/desc/settings/scan_get.md index 5c1df30a2..543ea7662 100644 --- a/openapi-specs/compute/32-05/desc/settings/scan_get.md +++ b/openapi-specs/compute/32-05/desc/settings/scan_get.md @@ -5,7 +5,7 @@ Returns the global settings for image, host, container, and registry scanning. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/settings/scan_post.md b/openapi-specs/compute/32-05/desc/settings/scan_post.md index f043d1c9f..9ddb521a2 100644 --- a/openapi-specs/compute/32-05/desc/settings/scan_post.md +++ b/openapi-specs/compute/32-05/desc/settings/scan_post.md @@ -9,7 +9,7 @@ Refer to the following example cURL request that configures the following scan i * Scan images, containers, and hosts once per day. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/settings/secrets_get.md b/openapi-specs/compute/32-05/desc/settings/secrets_get.md index 75e2b32c7..339009641 100644 --- a/openapi-specs/compute/32-05/desc/settings/secrets_get.md +++ b/openapi-specs/compute/32-05/desc/settings/secrets_get.md @@ -3,7 +3,7 @@ This endpoint will return configured secret store already configured in the cons The following example curl command retrieves any configured secret stores, as well as the refresh period in hours: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/settings/secrets_post.md b/openapi-specs/compute/32-05/desc/settings/secrets_post.md index d302ecdf8..730d031bf 100644 --- a/openapi-specs/compute/32-05/desc/settings/secrets_post.md +++ b/openapi-specs/compute/32-05/desc/settings/secrets_post.md @@ -5,7 +5,7 @@ Please note the data structure returned from endpoint /settings/secrets GET to s Refer to the following example curl command that adds a CyberArk secret store to the console with the appID set to `Prisma_Cloud_Compute_Console` and set the URL to `https://services-myca.twistlock.com:10882`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/settings/serverless-scan_get.md b/openapi-specs/compute/32-05/desc/settings/serverless-scan_get.md index bb8ce06ba..eb42e4a12 100644 --- a/openapi-specs/compute/32-05/desc/settings/serverless-scan_get.md +++ b/openapi-specs/compute/32-05/desc/settings/serverless-scan_get.md @@ -8,7 +8,7 @@ This endpoint maps to the **Function scope** table data in the **Defend > Vulner Refer to the following example cURL command that retrieves a list of serverless scan scopes: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/settings/serverless_get.md b/openapi-specs/compute/32-05/desc/settings/serverless_get.md index b6122c460..8c654807c 100644 --- a/openapi-specs/compute/32-05/desc/settings/serverless_get.md +++ b/openapi-specs/compute/32-05/desc/settings/serverless_get.md @@ -3,7 +3,7 @@ This endpoint will return any configured serverless function scanners found in * The following example curl command uses basic auth to retrieve serverless settings in an array, sorted by Cloud Provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/settings/serverless_post.md b/openapi-specs/compute/32-05/desc/settings/serverless_post.md index 6e26ea1d3..c0e0f3225 100644 --- a/openapi-specs/compute/32-05/desc/settings/serverless_post.md +++ b/openapi-specs/compute/32-05/desc/settings/serverless_post.md @@ -3,7 +3,7 @@ This endpoint will add serverless function providers to scan for vulnerabilities The following example curl command uses basic auth to add a serverless account to scan for serverless functions. This is assuming that you already have the [credential](https://docs.twistlock.com/docs/latest/configure/credentials_store.html) added to the console that is needed to scan that provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/settings/system_get.md b/openapi-specs/compute/32-05/desc/settings/system_get.md index 6f893abf0..0e8a3cba3 100644 --- a/openapi-specs/compute/32-05/desc/settings/system_get.md +++ b/openapi-specs/compute/32-05/desc/settings/system_get.md @@ -3,7 +3,7 @@ This endpoint will return all system settings in JSON format. The following example curl command does exactly that: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/settings/tas_get.md b/openapi-specs/compute/32-05/desc/settings/tas_get.md index 52f392433..d2d0017f0 100644 --- a/openapi-specs/compute/32-05/desc/settings/tas_get.md +++ b/openapi-specs/compute/32-05/desc/settings/tas_get.md @@ -5,7 +5,7 @@ Retrieves Tanzu Application Service (TAS) settings. Refer to the following example cURL command that retrieves all TAS settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/settings/telemetry_get.md b/openapi-specs/compute/32-05/desc/settings/telemetry_get.md index 6460c3fc3..46a807e77 100644 --- a/openapi-specs/compute/32-05/desc/settings/telemetry_get.md +++ b/openapi-specs/compute/32-05/desc/settings/telemetry_get.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that retrieves the settings if telemetry is enabled or not: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/settings/telemetry_post.md b/openapi-specs/compute/32-05/desc/settings/telemetry_post.md index bc97a6d0f..662846f33 100644 --- a/openapi-specs/compute/32-05/desc/settings/telemetry_post.md +++ b/openapi-specs/compute/32-05/desc/settings/telemetry_post.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to turn off telemetry: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/settings/trusted_certificate_post.md b/openapi-specs/compute/32-05/desc/settings/trusted_certificate_post.md index 5a2a30bda..c54b96fa5 100644 --- a/openapi-specs/compute/32-05/desc/settings/trusted_certificate_post.md +++ b/openapi-specs/compute/32-05/desc/settings/trusted_certificate_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/trusted-certificates` endpoint. Refer to the following example cURL request that uses basic auth to add a certificate to the list: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/32-05/desc/settings/trusted_certificates_post.md b/openapi-specs/compute/32-05/desc/settings/trusted_certificates_post.md index 78c07982b..e9bdc72a1 100644 --- a/openapi-specs/compute/32-05/desc/settings/trusted_certificates_post.md +++ b/openapi-specs/compute/32-05/desc/settings/trusted_certificates_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/certificates` endpoint. Refer to the following example cURL request that uses basic auth to enable this feature: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/32-05/desc/settings/vm_get.md b/openapi-specs/compute/32-05/desc/settings/vm_get.md index 8043742f5..b98b94240 100644 --- a/openapi-specs/compute/32-05/desc/settings/vm_get.md +++ b/openapi-specs/compute/32-05/desc/settings/vm_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **VM images scope** table data in the **Defend > Vulne Refer to the following example cURL command that retrieves all the scopes used for pattern matching on VM functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/signup/post.md b/openapi-specs/compute/32-05/desc/signup/post.md index 1db21df29..67344a0b1 100644 --- a/openapi-specs/compute/32-05/desc/signup/post.md +++ b/openapi-specs/compute/32-05/desc/signup/post.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i The following cURL command creates the initial admin user with the username `admin` and password `password`. ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -X POST \ -d '{"username": "admin", "password": "password"}' \ diff --git a/openapi-specs/compute/32-05/desc/static/capabilities_get.md b/openapi-specs/compute/32-05/desc/static/capabilities_get.md index ea119d2a9..f9b60278c 100644 --- a/openapi-specs/compute/32-05/desc/static/capabilities_get.md +++ b/openapi-specs/compute/32-05/desc/static/capabilities_get.md @@ -1,7 +1,7 @@ Returns a list of capabilities used in host models. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/static/regions_get.md b/openapi-specs/compute/32-05/desc/static/regions_get.md index 4a07097ee..3b1adb5f1 100644 --- a/openapi-specs/compute/32-05/desc/static/regions_get.md +++ b/openapi-specs/compute/32-05/desc/static/regions_get.md @@ -1,7 +1,7 @@ Returns a list of regions used in cloud radar. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/static/syscalls_get.md b/openapi-specs/compute/32-05/desc/static/syscalls_get.md index 9e2ddcde7..09505ba39 100644 --- a/openapi-specs/compute/32-05/desc/static/syscalls_get.md +++ b/openapi-specs/compute/32-05/desc/static/syscalls_get.md @@ -2,7 +2,7 @@ Returns a list of the Linux kernel system calls. Runtime rules for containers can allow-list and deny-list specific system calls. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/static/vulnerabilities_get.md b/openapi-specs/compute/32-05/desc/static/vulnerabilities_get.md index cb6acab28..19809472b 100644 --- a/openapi-specs/compute/32-05/desc/static/vulnerabilities_get.md +++ b/openapi-specs/compute/32-05/desc/static/vulnerabilities_get.md @@ -3,7 +3,7 @@ This data can be used for building out reports with the API. This data can be correlated with the `/api/v1/images` endpoint, specifically the the `complianceVulnerabilities` and `cveVulnerabilities` objects, to generate more thorough reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/stats/compliance.md b/openapi-specs/compute/32-05/desc/stats/compliance.md index 5c5be3991..4f4c90071 100644 --- a/openapi-specs/compute/32-05/desc/stats/compliance.md +++ b/openapi-specs/compute/32-05/desc/stats/compliance.md @@ -5,7 +5,7 @@ For the current day, the response will also include detailed compliance stats fo The following example command that uses curl and basic auth to retrieve compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/stats/compliance_get.md b/openapi-specs/compute/32-05/desc/stats/compliance_get.md index 314f6a179..2ef2f9f75 100644 --- a/openapi-specs/compute/32-05/desc/stats/compliance_get.md +++ b/openapi-specs/compute/32-05/desc/stats/compliance_get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Compliance > Compliance explorer* Refer to the following example cURL command that retrieves compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/stats/compliance_refresh.md b/openapi-specs/compute/32-05/desc/stats/compliance_refresh.md index b75491a69..d8ce211a8 100644 --- a/openapi-specs/compute/32-05/desc/stats/compliance_refresh.md +++ b/openapi-specs/compute/32-05/desc/stats/compliance_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/compliance endpoint return The following example command that uses curl and basic auth to refresh compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/stats/compliance_refresh_post.md b/openapi-specs/compute/32-05/desc/stats/compliance_refresh_post.md index 541a54d16..0f329d1db 100644 --- a/openapi-specs/compute/32-05/desc/stats/compliance_refresh_post.md +++ b/openapi-specs/compute/32-05/desc/stats/compliance_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/compliance`, b Refer to the following example cURL command that refreshes compliance statistics for the current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/stats/daily.md b/openapi-specs/compute/32-05/desc/stats/daily.md index 082f58a27..9fd4c6138 100644 --- a/openapi-specs/compute/32-05/desc/stats/daily.md +++ b/openapi-specs/compute/32-05/desc/stats/daily.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/stats/daily_get.md b/openapi-specs/compute/32-05/desc/stats/daily_get.md index 0db89bdc3..fe852126c 100644 --- a/openapi-specs/compute/32-05/desc/stats/daily_get.md +++ b/openapi-specs/compute/32-05/desc/stats/daily_get.md @@ -3,7 +3,7 @@ Returns a historical list of per-day statistics for the resources protected by P The following example command uses curl and basic auth to retrieve the daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/stats/dashboard.md b/openapi-specs/compute/32-05/desc/stats/dashboard.md index be90a2d32..1e5fabf08 100644 --- a/openapi-specs/compute/32-05/desc/stats/dashboard.md +++ b/openapi-specs/compute/32-05/desc/stats/dashboard.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/stats/dashboard_get.md b/openapi-specs/compute/32-05/desc/stats/dashboard_get.md index 601769645..8f0bc827c 100644 --- a/openapi-specs/compute/32-05/desc/stats/dashboard_get.md +++ b/openapi-specs/compute/32-05/desc/stats/dashboard_get.md @@ -5,7 +5,7 @@ Returns statistics about the resources protected by Prisma Cloud Compute, includ Refer to the following example cURL command that retrieves dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/stats/events_get.md b/openapi-specs/compute/32-05/desc/stats/events_get.md index 3be5eb4e7..e64f98e57 100644 --- a/openapi-specs/compute/32-05/desc/stats/events_get.md +++ b/openapi-specs/compute/32-05/desc/stats/events_get.md @@ -5,7 +5,7 @@ Returns events statistics for your environment. Refer to the following example cURL command retrieves event stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/stats/vulnerabilities.md b/openapi-specs/compute/32-05/desc/stats/vulnerabilities.md index 40c4dd1f1..199cfab62 100644 --- a/openapi-specs/compute/32-05/desc/stats/vulnerabilities.md +++ b/openapi-specs/compute/32-05/desc/stats/vulnerabilities.md @@ -5,7 +5,7 @@ For the current day, the response will also include descriptions of the CVEs cur The following example command that uses curl and basic auth to retrieve vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/stats/vulnerabilities_download_get.md b/openapi-specs/compute/32-05/desc/stats/vulnerabilities_download_get.md index 753af8c7f..9930a636b 100644 --- a/openapi-specs/compute/32-05/desc/stats/vulnerabilities_download_get.md +++ b/openapi-specs/compute/32-05/desc/stats/vulnerabilities_download_get.md @@ -17,7 +17,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a summary count of the CVEs and detailed descriptions for each CVE in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/stats/vulnerabilities_get.md b/openapi-specs/compute/32-05/desc/stats/vulnerabilities_get.md index 1a6f1c152..aaa5a907b 100644 --- a/openapi-specs/compute/32-05/desc/stats/vulnerabilities_get.md +++ b/openapi-specs/compute/32-05/desc/stats/vulnerabilities_get.md @@ -19,7 +19,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a summary count of the CVEs and detailed descriptions for each CVE: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/stats/vulnerabilities_impacted_resources_download_get.md b/openapi-specs/compute/32-05/desc/stats/vulnerabilities_impacted_resources_download_get.md index 0821d6a9f..502c09a6c 100644 --- a/openapi-specs/compute/32-05/desc/stats/vulnerabilities_impacted_resources_download_get.md +++ b/openapi-specs/compute/32-05/desc/stats/vulnerabilities_impacted_resources_download_get.md @@ -15,7 +15,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a list of impacted resources for `CVE-2015-0313` in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/stats/vulnerabilities_impacted_resources_get.md b/openapi-specs/compute/32-05/desc/stats/vulnerabilities_impacted_resources_get.md index c1e6d0ba2..014a5f4a2 100644 --- a/openapi-specs/compute/32-05/desc/stats/vulnerabilities_impacted_resources_get.md +++ b/openapi-specs/compute/32-05/desc/stats/vulnerabilities_impacted_resources_get.md @@ -18,7 +18,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a list of impacted resources for `CVE-2022-28391`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -95,7 +95,7 @@ Refer to the following example JSON response that shows the risk tree for the im Refer to the following example cURL command that retrieves a the impacted registry images `CVE-2015-0313` by using an optional query parameter `resourceType`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -108,7 +108,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a paginated list of impacted resources for `CVE-2015-0313` by using optional query parameters `limit` and `offset`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/stats/vulnerabilities_refresh.md b/openapi-specs/compute/32-05/desc/stats/vulnerabilities_refresh.md index 505a99d98..2aa7da8a1 100644 --- a/openapi-specs/compute/32-05/desc/stats/vulnerabilities_refresh.md +++ b/openapi-specs/compute/32-05/desc/stats/vulnerabilities_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/vulnerabilities endpoint r The following example command that uses curl and basic auth to refresh vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/stats/vulnerabilities_refresh_post.md b/openapi-specs/compute/32-05/desc/stats/vulnerabilities_refresh_post.md index 1e3210e18..85e3ddd7a 100644 --- a/openapi-specs/compute/32-05/desc/stats/vulnerabilities_refresh_post.md +++ b/openapi-specs/compute/32-05/desc/stats/vulnerabilities_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/vulnerabilitie Refer to the following example cURL command that refreshes the vulnerability statistics for current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/stats/workload_get.md b/openapi-specs/compute/32-05/desc/stats/workload_get.md index a25deed5c..940a835ee 100644 --- a/openapi-specs/compute/32-05/desc/stats/workload_get.md +++ b/openapi-specs/compute/32-05/desc/stats/workload_get.md @@ -1,7 +1,7 @@ Returns the workload statistics from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/statuses/intelligence.md b/openapi-specs/compute/32-05/desc/statuses/intelligence.md index 74da8c7ff..ac102e81f 100644 --- a/openapi-specs/compute/32-05/desc/statuses/intelligence.md +++ b/openapi-specs/compute/32-05/desc/statuses/intelligence.md @@ -3,7 +3,7 @@ Returns the connection status of the intelligence stream and the last intelligen The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/statuses/intelligence_get.md b/openapi-specs/compute/32-05/desc/statuses/intelligence_get.md index c18dd9611..b5f620ad9 100644 --- a/openapi-specs/compute/32-05/desc/statuses/intelligence_get.md +++ b/openapi-specs/compute/32-05/desc/statuses/intelligence_get.md @@ -3,7 +3,7 @@ Returns the connection status for the Intelligence Stream, along with the time o The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/statuses/registry_get.md b/openapi-specs/compute/32-05/desc/statuses/registry_get.md index 427c4915c..e4fd09fe9 100644 --- a/openapi-specs/compute/32-05/desc/statuses/registry_get.md +++ b/openapi-specs/compute/32-05/desc/statuses/registry_get.md @@ -13,7 +13,7 @@ To view the more details about the progress of a regular or on-demand registry s Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/statuses/secrets_get.md b/openapi-specs/compute/32-05/desc/statuses/secrets_get.md index 510f15161..e77c5ed70 100644 --- a/openapi-specs/compute/32-05/desc/statuses/secrets_get.md +++ b/openapi-specs/compute/32-05/desc/statuses/secrets_get.md @@ -3,7 +3,7 @@ Returns the connection status of any secret stores you have configured, as well The following is an example curl using basic auth to find the secret store status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/statuses/serverless-radar_get.md b/openapi-specs/compute/32-05/desc/statuses/serverless-radar_get.md index 3bfdbb5bf..4ab5d0c1d 100644 --- a/openapi-specs/compute/32-05/desc/statuses/serverless-radar_get.md +++ b/openapi-specs/compute/32-05/desc/statuses/serverless-radar_get.md @@ -1,7 +1,7 @@ Returns the status of the serverless scans. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/tags/get.md b/openapi-specs/compute/32-05/desc/tags/get.md index 6da7ad135..604eee98e 100644 --- a/openapi-specs/compute/32-05/desc/tags/get.md +++ b/openapi-specs/compute/32-05/desc/tags/get.md @@ -5,7 +5,7 @@ Retrieves a list of tags. Refer to the following example cURL command that retrieves a list of tags: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/tags/name_delete.md b/openapi-specs/compute/32-05/desc/tags/name_delete.md index 2ed010e57..6dedfce8f 100644 --- a/openapi-specs/compute/32-05/desc/tags/name_delete.md +++ b/openapi-specs/compute/32-05/desc/tags/name_delete.md @@ -5,7 +5,7 @@ Deletes a tag from the system. Refer to the following example cURL command that deletes a tag named *my tag*: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-05/desc/tags/name_put.md b/openapi-specs/compute/32-05/desc/tags/name_put.md index cbaea40d3..a5923b8ef 100644 --- a/openapi-specs/compute/32-05/desc/tags/name_put.md +++ b/openapi-specs/compute/32-05/desc/tags/name_put.md @@ -9,7 +9,7 @@ You must define all parameters in your PUT request. Refer to the following example cURL command that updates the parameters in a tag named `my_tag`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-05/desc/tags/post.md b/openapi-specs/compute/32-05/desc/tags/post.md index d55ae8b96..8e1a493d6 100644 --- a/openapi-specs/compute/32-05/desc/tags/post.md +++ b/openapi-specs/compute/32-05/desc/tags/post.md @@ -8,7 +8,7 @@ You can use tags as policy exceptions or assign them to vulnerabilities for acti Refer to the following example cURL command that creates a tag named "my-tag": ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/tags/tag_cve_delete.md b/openapi-specs/compute/32-05/desc/tags/tag_cve_delete.md index 8caed79cf..3031029b9 100644 --- a/openapi-specs/compute/32-05/desc/tags/tag_cve_delete.md +++ b/openapi-specs/compute/32-05/desc/tags/tag_cve_delete.md @@ -6,7 +6,7 @@ When you delete a tag, the tag is deleted from a wider scope. All the packages a Refer to the following example cURL command that removes the tag named `ignored` from the CVE `CVE-2017-15088`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-05/desc/tags/tag_cve_post.md b/openapi-specs/compute/32-05/desc/tags/tag_cve_post.md index 966a80bd8..1b4ead89b 100644 --- a/openapi-specs/compute/32-05/desc/tags/tag_cve_post.md +++ b/openapi-specs/compute/32-05/desc/tags/tag_cve_post.md @@ -45,7 +45,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the source package `perl`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -72,7 +72,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2021-20305` on the binary package `gnutls`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -98,7 +98,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -120,7 +120,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `image` and to all the packages and resources. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -140,7 +140,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `host`, resource `servo-vmware71`, and to all the packages. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/tas-droplets/download_get.md b/openapi-specs/compute/32-05/desc/tas-droplets/download_get.md index 6372f0b35..f9d82820d 100644 --- a/openapi-specs/compute/32-05/desc/tas-droplets/download_get.md +++ b/openapi-specs/compute/32-05/desc/tas-droplets/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > VMware The following cURL command downloads all TAS droplets to a CSV file called `tas_droplets.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/tas-droplets/get.md b/openapi-specs/compute/32-05/desc/tas-droplets/get.md index dd2b44993..a0a97e8ca 100644 --- a/openapi-specs/compute/32-05/desc/tas-droplets/get.md +++ b/openapi-specs/compute/32-05/desc/tas-droplets/get.md @@ -10,7 +10,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > VMware Tanzu bl The following cURL command retrieves all TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/tas-droplets/get_tas_addresses.md b/openapi-specs/compute/32-05/desc/tas-droplets/get_tas_addresses.md index 91ebb2e50..04c6dccb0 100644 --- a/openapi-specs/compute/32-05/desc/tas-droplets/get_tas_addresses.md +++ b/openapi-specs/compute/32-05/desc/tas-droplets/get_tas_addresses.md @@ -9,7 +9,7 @@ You get an HTTP error response 429 if the limit exceeds. The following cURL command retrieves the Cloud Controller Addresses of scanned TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/tas-droplets/progress_get.md b/openapi-specs/compute/32-05/desc/tas-droplets/progress_get.md index 504a21e84..507d001bf 100644 --- a/openapi-specs/compute/32-05/desc/tas-droplets/progress_get.md +++ b/openapi-specs/compute/32-05/desc/tas-droplets/progress_get.md @@ -5,7 +5,7 @@ Returns the details of the TAS Droplets ongoing scan. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/tas-droplets/scan_post.md b/openapi-specs/compute/32-05/desc/tas-droplets/scan_post.md index aad2174af..13c4eeeb9 100644 --- a/openapi-specs/compute/32-05/desc/tas-droplets/scan_post.md +++ b/openapi-specs/compute/32-05/desc/tas-droplets/scan_post.md @@ -5,7 +5,7 @@ Scans the TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/tas-droplets/stop_post.md b/openapi-specs/compute/32-05/desc/tas-droplets/stop_post.md index 5f5a019b1..53d709ec7 100644 --- a/openapi-specs/compute/32-05/desc/tas-droplets/stop_post.md +++ b/openapi-specs/compute/32-05/desc/tas-droplets/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing scan of TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/trust/data_get.md b/openapi-specs/compute/32-05/desc/trust/data_get.md index dd55d47a3..88983f139 100644 --- a/openapi-specs/compute/32-05/desc/trust/data_get.md +++ b/openapi-specs/compute/32-05/desc/trust/data_get.md @@ -5,7 +5,7 @@ Returns the trusted registries, repositories, and images. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/trust/data_put.md b/openapi-specs/compute/32-05/desc/trust/data_put.md index 0e6a0ba49..733514505 100644 --- a/openapi-specs/compute/32-05/desc/trust/data_put.md +++ b/openapi-specs/compute/32-05/desc/trust/data_put.md @@ -6,7 +6,7 @@ Specify trusted images using either the image name or layers properties. Refer to the following example cURL command that uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -19,7 +19,7 @@ To edit a trust group based on image base layers, use PUT to specify a list of S Refer to the following example that specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-05/desc/trust/get.md b/openapi-specs/compute/32-05/desc/trust/get.md index 1226cd0a3..57ff5bdb5 100644 --- a/openapi-specs/compute/32-05/desc/trust/get.md +++ b/openapi-specs/compute/32-05/desc/trust/get.md @@ -3,7 +3,7 @@ Retrieves a list of all trusted images. The following example curl command uses basic auth to retrieve all trusted images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/trust/id_delete.md b/openapi-specs/compute/32-05/desc/trust/id_delete.md index b3114775f..d63cdf71a 100644 --- a/openapi-specs/compute/32-05/desc/trust/id_delete.md +++ b/openapi-specs/compute/32-05/desc/trust/id_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to specify a image trust grou ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-05/desc/trust/id_put.md b/openapi-specs/compute/32-05/desc/trust/id_put.md index 44d2c8b8b..c98617bcd 100644 --- a/openapi-specs/compute/32-05/desc/trust/id_put.md +++ b/openapi-specs/compute/32-05/desc/trust/id_put.md @@ -9,7 +9,7 @@ For more information about handles, see the `_id` in the response body for the G The following example curl command uses basic auth to modify the image property for an existing trusted image entry, where the handle for the entry is `docker-ubuntu-group`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-05/desc/trust/learn_get.md b/openapi-specs/compute/32-05/desc/trust/learn_get.md index d8a3414d0..004b16b02 100644 --- a/openapi-specs/compute/32-05/desc/trust/learn_get.md +++ b/openapi-specs/compute/32-05/desc/trust/learn_get.md @@ -1,7 +1,7 @@ Returns the state of the trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/trust/learn_post.md b/openapi-specs/compute/32-05/desc/trust/learn_post.md index 094817738..008657fa2 100644 --- a/openapi-specs/compute/32-05/desc/trust/learn_post.md +++ b/openapi-specs/compute/32-05/desc/trust/learn_post.md @@ -1,7 +1,7 @@ Sets the state of trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/trust/post.md b/openapi-specs/compute/32-05/desc/trust/post.md index 1072275a1..23a324c6c 100644 --- a/openapi-specs/compute/32-05/desc/trust/post.md +++ b/openapi-specs/compute/32-05/desc/trust/post.md @@ -7,7 +7,7 @@ For more information about handles, see the `_id` key in the response body for t The following example curl command uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ To create a trust group based on image base layers, POST a list of SHA256 hashes The following example specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/users/get.md b/openapi-specs/compute/32-05/desc/users/get.md index e4e6966ec..cd5a661ba 100644 --- a/openapi-specs/compute/32-05/desc/users/get.md +++ b/openapi-specs/compute/32-05/desc/users/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Manage > Authentication > Users** in the Console UI. The following cURL command retrieves all users. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/users/id_delete.md b/openapi-specs/compute/32-05/desc/users/id_delete.md index 1cfa5642d..66a1102f9 100644 --- a/openapi-specs/compute/32-05/desc/users/id_delete.md +++ b/openapi-specs/compute/32-05/desc/users/id_delete.md @@ -17,7 +17,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes user `ID` from the system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-05/desc/util/osx_twistcli_arm64_get.md b/openapi-specs/compute/32-05/desc/util/osx_twistcli_arm64_get.md index b385d0d3b..a30686374 100644 --- a/openapi-specs/compute/32-05/desc/util/osx_twistcli_arm64_get.md +++ b/openapi-specs/compute/32-05/desc/util/osx_twistcli_arm64_get.md @@ -7,7 +7,7 @@ Downloads the twistcli binary executable for MacOS platforms based on ARM64 arch Refer to the following example cURL command that downloads and saves the “twistcli” binary executable for ARM64 bit MacOS platforms to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/compute/32-05/desc/util/osx_twistcli_get.md b/openapi-specs/compute/32-05/desc/util/osx_twistcli_get.md index c49f96c41..2353ea338 100644 --- a/openapi-specs/compute/32-05/desc/util/osx_twistcli_get.md +++ b/openapi-specs/compute/32-05/desc/util/osx_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **MacOS platform** hyperlink in **Manage > System > Ut The following cURL command downloads the twistcli binary executable for MacOS platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli \ diff --git a/openapi-specs/compute/32-05/desc/util/twistcli_arm64_get.md b/openapi-specs/compute/32-05/desc/util/twistcli_arm64_get.md index 7ec36d3f5..a3d7318ab 100644 --- a/openapi-specs/compute/32-05/desc/util/twistcli_arm64_get.md +++ b/openapi-specs/compute/32-05/desc/util/twistcli_arm64_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/compute/32-05/desc/util/twistcli_get.md b/openapi-specs/compute/32-05/desc/util/twistcli_get.md index f9d2d295c..08a3ae8aa 100644 --- a/openapi-specs/compute/32-05/desc/util/twistcli_get.md +++ b/openapi-specs/compute/32-05/desc/util/twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -X GET -o \ 'https:///api/v/util/twistcli' diff --git a/openapi-specs/compute/32-05/desc/util/twistlock_jenkins_plugin_get.md b/openapi-specs/compute/32-05/desc/util/twistlock_jenkins_plugin_get.md index 9fb8d4a02..c9f180e5e 100644 --- a/openapi-specs/compute/32-05/desc/util/twistlock_jenkins_plugin_get.md +++ b/openapi-specs/compute/32-05/desc/util/twistlock_jenkins_plugin_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-jenkins-plugin.hpi \ diff --git a/openapi-specs/compute/32-05/desc/util/twistlock_tas_tile_get.md b/openapi-specs/compute/32-05/desc/util/twistlock_tas_tile_get.md index fea28aaad..3fd114e2d 100644 --- a/openapi-specs/compute/32-05/desc/util/twistlock_tas_tile_get.md +++ b/openapi-specs/compute/32-05/desc/util/twistlock_tas_tile_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-tile.pivotal \ diff --git a/openapi-specs/compute/32-05/desc/util/windows_twistcli_get.md b/openapi-specs/compute/32-05/desc/util/windows_twistcli_get.md index 1c545dbbb..38c609b08 100644 --- a/openapi-specs/compute/32-05/desc/util/windows_twistcli_get.md +++ b/openapi-specs/compute/32-05/desc/util/windows_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Windows platform** hyperlink in **Manage > System > The following cURL command downloads the twistcli binary executable for Windows platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli.exe \ diff --git a/openapi-specs/compute/32-05/desc/version/get.md b/openapi-specs/compute/32-05/desc/version/get.md index 28be315e0..5787e90fd 100644 --- a/openapi-specs/compute/32-05/desc/version/get.md +++ b/openapi-specs/compute/32-05/desc/version/get.md @@ -5,7 +5,7 @@ Retrieves the version number for Console. The following cURL command retrieves the version number for Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/vms/download_get.md b/openapi-specs/compute/32-05/desc/vms/download_get.md index e65e4efc9..3cc813bc5 100644 --- a/openapi-specs/compute/32-05/desc/vms/download_get.md +++ b/openapi-specs/compute/32-05/desc/vms/download_get.md @@ -7,7 +7,7 @@ Returns all VM image scan reports in CSV format. Refer to the following example cURL command that retrieves all VM image scan reports and saves the results in a CSV file called `vm_images_scan.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/vms/get.md b/openapi-specs/compute/32-05/desc/vms/get.md index d44d9d801..ad9938124 100644 --- a/openapi-specs/compute/32-05/desc/vms/get.md +++ b/openapi-specs/compute/32-05/desc/vms/get.md @@ -10,7 +10,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > Hosts > VM imag Refer to the following example cURL command that retrieves all VM image scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/vms/labels_get.md b/openapi-specs/compute/32-05/desc/vms/labels_get.md index ad678b30d..eb2674bf6 100644 --- a/openapi-specs/compute/32-05/desc/vms/labels_get.md +++ b/openapi-specs/compute/32-05/desc/vms/labels_get.md @@ -5,7 +5,7 @@ Returns an array of strings containing all AWS tags of the scanned VM images. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-05/desc/vms/names_get.md b/openapi-specs/compute/32-05/desc/vms/names_get.md index 0283ed28e..0b905c37b 100644 --- a/openapi-specs/compute/32-05/desc/vms/names_get.md +++ b/openapi-specs/compute/32-05/desc/vms/names_get.md @@ -6,7 +6,7 @@ Returns an array of strings containing VM image names. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-05/desc/vms/scan_post.md b/openapi-specs/compute/32-05/desc/vms/scan_post.md index 1caa2dcaf..4d4de3ab1 100644 --- a/openapi-specs/compute/32-05/desc/vms/scan_post.md +++ b/openapi-specs/compute/32-05/desc/vms/scan_post.md @@ -5,7 +5,7 @@ Re-scans all VM images immediately. This endpoint returns the time that the scan Refer to the following example cURL command that forces Prisma Cloud to re-scan all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-05/desc/vms/stop_post.md b/openapi-specs/compute/32-05/desc/vms/stop_post.md index 4a74743eb..49b2b26f9 100644 --- a/openapi-specs/compute/32-05/desc/vms/stop_post.md +++ b/openapi-specs/compute/32-05/desc/vms/stop_post.md @@ -7,7 +7,7 @@ Note: It might take a few minutes for the scan to stop completely. Refer to the following example cURL command that forces Prisma Cloud to stop scanning all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/SCAP/get.md b/openapi-specs/compute/32-06/desc/SCAP/get.md index a25abe94e..f5870d822 100644 --- a/openapi-specs/compute/32-06/desc/SCAP/get.md +++ b/openapi-specs/compute/32-06/desc/SCAP/get.md @@ -3,7 +3,7 @@ This endpoint will return any SCAP datastreams uploaded to the console. This end The following is an example curl command that uses basic auth to retrieve any uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/SCAP/id_delete.md b/openapi-specs/compute/32-06/desc/SCAP/id_delete.md index 39f1b0132..52923f20a 100644 --- a/openapi-specs/compute/32-06/desc/SCAP/id_delete.md +++ b/openapi-specs/compute/32-06/desc/SCAP/id_delete.md @@ -3,7 +3,7 @@ This endpoint will delete any SCAP datastreams uploaded to the console. You can The following is an example curl command that uses basic auth to delete an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-06/desc/SCAP/post.md b/openapi-specs/compute/32-06/desc/SCAP/post.md index d459a0e97..c45fd6b4e 100644 --- a/openapi-specs/compute/32-06/desc/SCAP/post.md +++ b/openapi-specs/compute/32-06/desc/SCAP/post.md @@ -3,7 +3,7 @@ This endpoint will allow you to add a SCAP datastream to the console. The following is an example curl command that uses basic auth to add an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/_ping/get.md b/openapi-specs/compute/32-06/desc/_ping/get.md index 8e143ef67..b7ffdc653 100644 --- a/openapi-specs/compute/32-06/desc/_ping/get.md +++ b/openapi-specs/compute/32-06/desc/_ping/get.md @@ -5,7 +5,7 @@ Checks if Console is reachable from your network host. Refer to the following cURL example command that pings Console and prints the HTTP response code: ```bash -$ curl -k \ +$ curl \ -s \ -o /dev/null \ -w "%{http_code}\n" \ diff --git a/openapi-specs/compute/32-06/desc/agentless/get_agentless_progress.md b/openapi-specs/compute/32-06/desc/agentless/get_agentless_progress.md index b98ed9da5..78396eec6 100644 --- a/openapi-specs/compute/32-06/desc/agentless/get_agentless_progress.md +++ b/openapi-specs/compute/32-06/desc/agentless/get_agentless_progress.md @@ -5,7 +5,7 @@ Shows the progress of an ongoing scan on hosts or containers for vulnerabilities Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/agentless/post_agentless_scan.md b/openapi-specs/compute/32-06/desc/agentless/post_agentless_scan.md index f1295cdc4..e2f8a4e11 100644 --- a/openapi-specs/compute/32-06/desc/agentless/post_agentless_scan.md +++ b/openapi-specs/compute/32-06/desc/agentless/post_agentless_scan.md @@ -9,7 +9,7 @@ Make sure that you download (use the agentless/templates API) and apply the perm Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/agentless/post_agentless_stop.md b/openapi-specs/compute/32-06/desc/agentless/post_agentless_stop.md index ab83960cc..ddee6ec7a 100644 --- a/openapi-specs/compute/32-06/desc/agentless/post_agentless_stop.md +++ b/openapi-specs/compute/32-06/desc/agentless/post_agentless_stop.md @@ -5,7 +5,7 @@ Stops an ongoing scan on hosts or containers for vulnerabilities and compliance. Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/agentless/post_agentless_templates.md b/openapi-specs/compute/32-06/desc/agentless/post_agentless_templates.md index 96be32555..5159c439a 100644 --- a/openapi-specs/compute/32-06/desc/agentless/post_agentless_templates.md +++ b/openapi-specs/compute/32-06/desc/agentless/post_agentless_templates.md @@ -31,7 +31,7 @@ Add the supported cloud accounts (AWS, Azure, GCP, and OCI) in Prisma Cloud Comp Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/alert-profiles/get.md b/openapi-specs/compute/32-06/desc/alert-profiles/get.md index 82647e248..f17191ac4 100644 --- a/openapi-specs/compute/32-06/desc/alert-profiles/get.md +++ b/openapi-specs/compute/32-06/desc/alert-profiles/get.md @@ -3,7 +3,7 @@ Retrieve a list of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/alert-profiles/id_delete.md b/openapi-specs/compute/32-06/desc/alert-profiles/id_delete.md index 1a67fe20e..2cf21b57e 100644 --- a/openapi-specs/compute/32-06/desc/alert-profiles/id_delete.md +++ b/openapi-specs/compute/32-06/desc/alert-profiles/id_delete.md @@ -5,7 +5,7 @@ This method has no response data. The following example curl command deletes an existing alert profile named `PROFILE-NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-06/desc/alert-profiles/names_get.md b/openapi-specs/compute/32-06/desc/alert-profiles/names_get.md index cac14437b..38a1f78ca 100644 --- a/openapi-specs/compute/32-06/desc/alert-profiles/names_get.md +++ b/openapi-specs/compute/32-06/desc/alert-profiles/names_get.md @@ -3,7 +3,7 @@ Retrieve a list of only the names of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles' names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/alert-profiles/post.md b/openapi-specs/compute/32-06/desc/alert-profiles/post.md index 9fa643429..19db863d5 100644 --- a/openapi-specs/compute/32-06/desc/alert-profiles/post.md +++ b/openapi-specs/compute/32-06/desc/alert-profiles/post.md @@ -3,7 +3,7 @@ Update an existing alert profile created in the system. The following example curl command uses basic auth to add a Jira Alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/alert-profiles/test_post.md b/openapi-specs/compute/32-06/desc/alert-profiles/test_post.md index 1fc745efa..2205a6e73 100644 --- a/openapi-specs/compute/32-06/desc/alert-profiles/test_post.md +++ b/openapi-specs/compute/32-06/desc/alert-profiles/test_post.md @@ -3,7 +3,7 @@ Sends a test alert to verify successful configuration of the alert profile setti The following example curl command uses basic auth to send test alert for an email alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/application-control/get.md b/openapi-specs/compute/32-06/desc/application-control/get.md index 5bd600beb..535584284 100644 --- a/openapi-specs/compute/32-06/desc/application-control/get.md +++ b/openapi-specs/compute/32-06/desc/application-control/get.md @@ -3,7 +3,7 @@ Retrieves the host application control rules. The following example curl command uses basic auth to retrieve the control rules: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/access_delete.md b/openapi-specs/compute/32-06/desc/audits/access_delete.md index 37f33ca64..0450b534c 100644 --- a/openapi-specs/compute/32-06/desc/audits/access_delete.md +++ b/openapi-specs/compute/32-06/desc/audits/access_delete.md @@ -2,7 +2,7 @@ Deletes **all** access audits. This deletion cannot be undone. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-06/desc/audits/access_download_get.md b/openapi-specs/compute/32-06/desc/audits/access_download_get.md index 1700deb8d..8d8fee259 100644 --- a/openapi-specs/compute/32-06/desc/audits/access_download_get.md +++ b/openapi-specs/compute/32-06/desc/audits/access_download_get.md @@ -3,7 +3,7 @@ Returns the docker access audit events data in CSV format that are logged and ag **Note**: You can download the access events from Console under **Monitor > Events > Docker audits > Download CSV**. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/access_filters_get.md b/openapi-specs/compute/32-06/desc/audits/access_filters_get.md index 00ac061c1..4b8e9cd9b 100644 --- a/openapi-specs/compute/32-06/desc/audits/access_filters_get.md +++ b/openapi-specs/compute/32-06/desc/audits/access_filters_get.md @@ -5,7 +5,7 @@ The following example uses basic auth to list history of commands that are run o ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ The following command gives list of sudo events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -27,7 +27,7 @@ $ curl -k \ The following command gives list of SSHD events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/access_get.md b/openapi-specs/compute/32-06/desc/audits/access_get.md index 2401391c7..56e53fe12 100644 --- a/openapi-specs/compute/32-06/desc/audits/access_get.md +++ b/openapi-specs/compute/32-06/desc/audits/access_get.md @@ -8,7 +8,7 @@ You can configure Prisma Cloud Compute to log and aggregate events such as sudo Refer to the following example cURL command that gives a list of all access audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/admission_download_get.md b/openapi-specs/compute/32-06/desc/audits/admission_download_get.md index 9571c483f..d45f47c4e 100644 --- a/openapi-specs/compute/32-06/desc/audits/admission_download_get.md +++ b/openapi-specs/compute/32-06/desc/audits/admission_download_get.md @@ -4,7 +4,7 @@ Returns the access admission events data in CSV format that were alerted or bloc Refer to the following example cURL command that downloads the admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/admission_get.md b/openapi-specs/compute/32-06/desc/audits/admission_get.md index 84414496c..3640c737c 100644 --- a/openapi-specs/compute/32-06/desc/audits/admission_get.md +++ b/openapi-specs/compute/32-06/desc/audits/admission_get.md @@ -4,7 +4,7 @@ Returns all activities that were alerted or blocked by Defender functioning as O Refer to the following example cURL command that gives a list of all admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/firewall_network_container_download_get.md b/openapi-specs/compute/32-06/desc/audits/firewall_network_container_download_get.md index 29029ac6d..434e09acd 100644 --- a/openapi-specs/compute/32-06/desc/audits/firewall_network_container_download_get.md +++ b/openapi-specs/compute/32-06/desc/audits/firewall_network_container_download_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/firewall_network_container_get.md b/openapi-specs/compute/32-06/desc/audits/firewall_network_container_get.md index 454558a44..be03b2c45 100644 --- a/openapi-specs/compute/32-06/desc/audits/firewall_network_container_get.md +++ b/openapi-specs/compute/32-06/desc/audits/firewall_network_container_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/firewall_network_host_download_get.md b/openapi-specs/compute/32-06/desc/audits/firewall_network_host_download_get.md index 768dd00d7..e83e8e1c3 100644 --- a/openapi-specs/compute/32-06/desc/audits/firewall_network_host_download_get.md +++ b/openapi-specs/compute/32-06/desc/audits/firewall_network_host_download_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/firewall_network_host_get.md b/openapi-specs/compute/32-06/desc/audits/firewall_network_host_get.md index e5dc4c399..6cbda0d4b 100644 --- a/openapi-specs/compute/32-06/desc/audits/firewall_network_host_get.md +++ b/openapi-specs/compute/32-06/desc/audits/firewall_network_host_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/incidents_archive_patch.md b/openapi-specs/compute/32-06/desc/audits/incidents_archive_patch.md index a1127a001..d1f42eedd 100644 --- a/openapi-specs/compute/32-06/desc/audits/incidents_archive_patch.md +++ b/openapi-specs/compute/32-06/desc/audits/incidents_archive_patch.md @@ -7,7 +7,7 @@ You can get an incident ID from the list of incidents using the endpoint GET /ap Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/compute/32-06/desc/audits/incidents_download_get.md b/openapi-specs/compute/32-06/desc/audits/incidents_download_get.md index 2266c3471..5958756bf 100644 --- a/openapi-specs/compute/32-06/desc/audits/incidents_download_get.md +++ b/openapi-specs/compute/32-06/desc/audits/incidents_download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the **CSV** hyperlink in **Monitor > Runtime > Incident ex The following cURL command downloads all incidents and saves the result in a CSV file called `incidents.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/incidents_filters_get.md b/openapi-specs/compute/32-06/desc/audits/incidents_filters_get.md index 7d1c6f303..856881c90 100644 --- a/openapi-specs/compute/32-06/desc/audits/incidents_filters_get.md +++ b/openapi-specs/compute/32-06/desc/audits/incidents_filters_get.md @@ -3,7 +3,7 @@ This endpoint lists the incident categories found in your environment. The following example lists incident filters. ```bash -$ curl -k \ +$ curl \ -u \ https://console:8083/api/v1/audits/incidents/filters ``` diff --git a/openapi-specs/compute/32-06/desc/audits/incidents_get.md b/openapi-specs/compute/32-06/desc/audits/incidents_get.md index 7724a08c1..9b9451821 100644 --- a/openapi-specs/compute/32-06/desc/audits/incidents_get.md +++ b/openapi-specs/compute/32-06/desc/audits/incidents_get.md @@ -9,7 +9,7 @@ This endpoint maps to the table in **Monitor > Runtime > Incident explorer** in Refer to the following example cURL command that retrieves a list of unacknowledged incidents (not in the archived state): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/kubernetes_download_get.md b/openapi-specs/compute/32-06/desc/audits/kubernetes_download_get.md index 6008bd92a..62992095c 100644 --- a/openapi-specs/compute/32-06/desc/audits/kubernetes_download_get.md +++ b/openapi-specs/compute/32-06/desc/audits/kubernetes_download_get.md @@ -7,7 +7,7 @@ Returns the audit events data that occur in an integrated Kubernetes cluster tha Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/kubernetes_get.md b/openapi-specs/compute/32-06/desc/audits/kubernetes_get.md index e1ecb8a88..2e3f51b71 100644 --- a/openapi-specs/compute/32-06/desc/audits/kubernetes_get.md +++ b/openapi-specs/compute/32-06/desc/audits/kubernetes_get.md @@ -7,7 +7,7 @@ Retrieves events that occur in an integrated Kubernetes cluster that you configu Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/mgmt_download_get.md b/openapi-specs/compute/32-06/desc/audits/mgmt_download_get.md index ae3ef45b6..bcee17342 100644 --- a/openapi-specs/compute/32-06/desc/audits/mgmt_download_get.md +++ b/openapi-specs/compute/32-06/desc/audits/mgmt_download_get.md @@ -10,7 +10,7 @@ Management audits are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/mgmt_filters_get.md b/openapi-specs/compute/32-06/desc/audits/mgmt_filters_get.md index 854977b99..f910a4c2a 100644 --- a/openapi-specs/compute/32-06/desc/audits/mgmt_filters_get.md +++ b/openapi-specs/compute/32-06/desc/audits/mgmt_filters_get.md @@ -6,7 +6,7 @@ Use these filters to query management audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/mgmt_get.md b/openapi-specs/compute/32-06/desc/audits/mgmt_get.md index 5b586cb5e..abe802348 100644 --- a/openapi-specs/compute/32-06/desc/audits/mgmt_get.md +++ b/openapi-specs/compute/32-06/desc/audits/mgmt_get.md @@ -10,7 +10,7 @@ Management audit events are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/runtime_app_embedded_download_get.md b/openapi-specs/compute/32-06/desc/audits/runtime_app_embedded_download_get.md index f3d844ead..ec5ae0f2a 100644 --- a/openapi-specs/compute/32-06/desc/audits/runtime_app_embedded_download_get.md +++ b/openapi-specs/compute/32-06/desc/audits/runtime_app_embedded_download_get.md @@ -5,7 +5,7 @@ Returns the app-embedded runtime audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/runtime_app_embedded_get.md b/openapi-specs/compute/32-06/desc/audits/runtime_app_embedded_get.md index c1d72acfa..51a43b7f5 100644 --- a/openapi-specs/compute/32-06/desc/audits/runtime_app_embedded_get.md +++ b/openapi-specs/compute/32-06/desc/audits/runtime_app_embedded_get.md @@ -5,7 +5,7 @@ Retrieves all app-embedded runtime audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/runtime_container_delete.md b/openapi-specs/compute/32-06/desc/audits/runtime_container_delete.md index ddc8e82d6..62050c71f 100644 --- a/openapi-specs/compute/32-06/desc/audits/runtime_container_delete.md +++ b/openapi-specs/compute/32-06/desc/audits/runtime_container_delete.md @@ -3,7 +3,7 @@ Deletes all container runtime audits. The following example curl command uses basic auth to delete all the audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-06/desc/audits/runtime_container_download_get.md b/openapi-specs/compute/32-06/desc/audits/runtime_container_download_get.md index 20e673b5e..81286d929 100644 --- a/openapi-specs/compute/32-06/desc/audits/runtime_container_download_get.md +++ b/openapi-specs/compute/32-06/desc/audits/runtime_container_download_get.md @@ -6,7 +6,7 @@ Returns the container audit events data in CSV format when a runtime sensor such Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o \ diff --git a/openapi-specs/compute/32-06/desc/audits/runtime_container_get.md b/openapi-specs/compute/32-06/desc/audits/runtime_container_get.md index 11beffb24..a6b6ba484 100644 --- a/openapi-specs/compute/32-06/desc/audits/runtime_container_get.md +++ b/openapi-specs/compute/32-06/desc/audits/runtime_container_get.md @@ -7,7 +7,7 @@ Retrieves all container audit events when a runtime sensor such as process, netw Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/runtime_container_timeslice_get.md b/openapi-specs/compute/32-06/desc/audits/runtime_container_timeslice_get.md index f65d477af..01df48f28 100644 --- a/openapi-specs/compute/32-06/desc/audits/runtime_container_timeslice_get.md +++ b/openapi-specs/compute/32-06/desc/audits/runtime_container_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/runtime_file-integrity_download_get.md b/openapi-specs/compute/32-06/desc/audits/runtime_file-integrity_download_get.md index 99ec70c52..234c3ce32 100644 --- a/openapi-specs/compute/32-06/desc/audits/runtime_file-integrity_download_get.md +++ b/openapi-specs/compute/32-06/desc/audits/runtime_file-integrity_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for file-integrity checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/runtime_file-integrity_get.md b/openapi-specs/compute/32-06/desc/audits/runtime_file-integrity_get.md index 53fec9f9f..c31904422 100644 --- a/openapi-specs/compute/32-06/desc/audits/runtime_file-integrity_get.md +++ b/openapi-specs/compute/32-06/desc/audits/runtime_file-integrity_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for file-integrity checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/runtime_host_delete.md b/openapi-specs/compute/32-06/desc/audits/runtime_host_delete.md index 0ab1c877e..2ada9b15a 100644 --- a/openapi-specs/compute/32-06/desc/audits/runtime_host_delete.md +++ b/openapi-specs/compute/32-06/desc/audits/runtime_host_delete.md @@ -3,7 +3,7 @@ Deletes all host audits from the database. The following example curl command uses basic auth to delete all host audits: ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/audits/runtime/host diff --git a/openapi-specs/compute/32-06/desc/audits/runtime_host_download_get.md b/openapi-specs/compute/32-06/desc/audits/runtime_host_download_get.md index 4d0454f56..d85cc39d0 100644 --- a/openapi-specs/compute/32-06/desc/audits/runtime_host_download_get.md +++ b/openapi-specs/compute/32-06/desc/audits/runtime_host_download_get.md @@ -5,7 +5,7 @@ Returns the runtime host audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/runtime_host_get.md b/openapi-specs/compute/32-06/desc/audits/runtime_host_get.md index 044b8b42d..e063550d6 100644 --- a/openapi-specs/compute/32-06/desc/audits/runtime_host_get.md +++ b/openapi-specs/compute/32-06/desc/audits/runtime_host_get.md @@ -5,7 +5,7 @@ Retrieves the runtime host audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/runtime_host_timeslice_get.md b/openapi-specs/compute/32-06/desc/audits/runtime_host_timeslice_get.md index 8933efa74..aafd869b8 100644 --- a/openapi-specs/compute/32-06/desc/audits/runtime_host_timeslice_get.md +++ b/openapi-specs/compute/32-06/desc/audits/runtime_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/runtime_log-inspection_download_get.md b/openapi-specs/compute/32-06/desc/audits/runtime_log-inspection_download_get.md index f047ed96f..0aa1a5710 100644 --- a/openapi-specs/compute/32-06/desc/audits/runtime_log-inspection_download_get.md +++ b/openapi-specs/compute/32-06/desc/audits/runtime_log-inspection_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for log inspection checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/runtime_log-inspection_get.md b/openapi-specs/compute/32-06/desc/audits/runtime_log-inspection_get.md index 49f0d7be4..8292b623e 100644 --- a/openapi-specs/compute/32-06/desc/audits/runtime_log-inspection_get.md +++ b/openapi-specs/compute/32-06/desc/audits/runtime_log-inspection_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for log inspection checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/runtime_rasp_delete.md b/openapi-specs/compute/32-06/desc/audits/runtime_rasp_delete.md index 688e04038..14315c55b 100644 --- a/openapi-specs/compute/32-06/desc/audits/runtime_rasp_delete.md +++ b/openapi-specs/compute/32-06/desc/audits/runtime_rasp_delete.md @@ -1,7 +1,7 @@ Deletes all RASP Defender runtime audits. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-06/desc/audits/runtime_rasp_download_get.md b/openapi-specs/compute/32-06/desc/audits/runtime_rasp_download_get.md index 303c75858..11a85100d 100644 --- a/openapi-specs/compute/32-06/desc/audits/runtime_rasp_download_get.md +++ b/openapi-specs/compute/32-06/desc/audits/runtime_rasp_download_get.md @@ -1,7 +1,7 @@ Returns CSV data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/runtime_rasp_get.md b/openapi-specs/compute/32-06/desc/audits/runtime_rasp_get.md index 229d908b1..0475cb149 100644 --- a/openapi-specs/compute/32-06/desc/audits/runtime_rasp_get.md +++ b/openapi-specs/compute/32-06/desc/audits/runtime_rasp_get.md @@ -1,7 +1,7 @@ Returns JSON data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/runtime_serverless_delete.md b/openapi-specs/compute/32-06/desc/audits/runtime_serverless_delete.md index 99ada0515..e27ebe858 100644 --- a/openapi-specs/compute/32-06/desc/audits/runtime_serverless_delete.md +++ b/openapi-specs/compute/32-06/desc/audits/runtime_serverless_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to delete the current audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-06/desc/audits/runtime_serverless_download_get.md b/openapi-specs/compute/32-06/desc/audits/runtime_serverless_download_get.md index f829d2342..91693c145 100644 --- a/openapi-specs/compute/32-06/desc/audits/runtime_serverless_download_get.md +++ b/openapi-specs/compute/32-06/desc/audits/runtime_serverless_download_get.md @@ -5,7 +5,7 @@ Returns the scan audit events data in CSV format for any configured serverless f Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/runtime_serverless_filters_get.md b/openapi-specs/compute/32-06/desc/audits/runtime_serverless_filters_get.md index b9bf38610..babda78dd 100644 --- a/openapi-specs/compute/32-06/desc/audits/runtime_serverless_filters_get.md +++ b/openapi-specs/compute/32-06/desc/audits/runtime_serverless_filters_get.md @@ -2,7 +2,7 @@ Returns all serverless filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/runtime_serverless_get.md b/openapi-specs/compute/32-06/desc/audits/runtime_serverless_get.md index 045946886..f6aeb748e 100644 --- a/openapi-specs/compute/32-06/desc/audits/runtime_serverless_get.md +++ b/openapi-specs/compute/32-06/desc/audits/runtime_serverless_get.md @@ -5,7 +5,7 @@ Retrieves all scan events for any configured serverless functions in Prisma Clou Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/runtime_serverless_timeslice_get.md b/openapi-specs/compute/32-06/desc/audits/runtime_serverless_timeslice_get.md index 863890174..a2456cec0 100644 --- a/openapi-specs/compute/32-06/desc/audits/runtime_serverless_timeslice_get.md +++ b/openapi-specs/compute/32-06/desc/audits/runtime_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/trust_delete.md b/openapi-specs/compute/32-06/desc/audits/trust_delete.md index 0bfb2bd81..4aaeef3fe 100644 --- a/openapi-specs/compute/32-06/desc/audits/trust_delete.md +++ b/openapi-specs/compute/32-06/desc/audits/trust_delete.md @@ -1,7 +1,7 @@ Deletes all the trust audits from the events page in Console. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-06/desc/audits/trust_download_get.md b/openapi-specs/compute/32-06/desc/audits/trust_download_get.md index 21c0e55a2..234089449 100644 --- a/openapi-specs/compute/32-06/desc/audits/trust_download_get.md +++ b/openapi-specs/compute/32-06/desc/audits/trust_download_get.md @@ -5,7 +5,7 @@ Returns the trust audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/trust_get.md b/openapi-specs/compute/32-06/desc/audits/trust_get.md index 8fb3a341d..de7d47e96 100644 --- a/openapi-specs/compute/32-06/desc/audits/trust_get.md +++ b/openapi-specs/compute/32-06/desc/audits/trust_get.md @@ -4,7 +4,7 @@ Retrieves all the trust audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/waas_agentless_download_get.md b/openapi-specs/compute/32-06/desc/audits/waas_agentless_download_get.md index bbfcd12f5..f930ef6b3 100644 --- a/openapi-specs/compute/32-06/desc/audits/waas_agentless_download_get.md +++ b/openapi-specs/compute/32-06/desc/audits/waas_agentless_download_get.md @@ -7,7 +7,7 @@ Returns the agentless Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/waas_agentless_get.md b/openapi-specs/compute/32-06/desc/audits/waas_agentless_get.md index ad40ae497..b257b0385 100644 --- a/openapi-specs/compute/32-06/desc/audits/waas_agentless_get.md +++ b/openapi-specs/compute/32-06/desc/audits/waas_agentless_get.md @@ -7,7 +7,7 @@ Retrieves all agentless Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/waas_agentless_timeslice_get.md b/openapi-specs/compute/32-06/desc/audits/waas_agentless_timeslice_get.md index 007c6dba3..3eaf34b25 100644 --- a/openapi-specs/compute/32-06/desc/audits/waas_agentless_timeslice_get.md +++ b/openapi-specs/compute/32-06/desc/audits/waas_agentless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/waas_app_embedded_download_get.md b/openapi-specs/compute/32-06/desc/audits/waas_app_embedded_download_get.md index 149c10376..c94aa87b0 100644 --- a/openapi-specs/compute/32-06/desc/audits/waas_app_embedded_download_get.md +++ b/openapi-specs/compute/32-06/desc/audits/waas_app_embedded_download_get.md @@ -6,7 +6,7 @@ Returns the app-embedded WAAS audit events data in CSV format for the specified Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/waas_app_embedded_get.md b/openapi-specs/compute/32-06/desc/audits/waas_app_embedded_get.md index 400fa447d..6318fb299 100644 --- a/openapi-specs/compute/32-06/desc/audits/waas_app_embedded_get.md +++ b/openapi-specs/compute/32-06/desc/audits/waas_app_embedded_get.md @@ -6,7 +6,7 @@ Returns all app-embedded WAAS audit events for the specified query parameters. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/waas_app_embedded_timeslice_get.md b/openapi-specs/compute/32-06/desc/audits/waas_app_embedded_timeslice_get.md index 79a60038e..42a76d08c 100644 --- a/openapi-specs/compute/32-06/desc/audits/waas_app_embedded_timeslice_get.md +++ b/openapi-specs/compute/32-06/desc/audits/waas_app_embedded_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the app-embedded WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/waas_container_download_get.md b/openapi-specs/compute/32-06/desc/audits/waas_container_download_get.md index 9a5e04fad..7d26c34f4 100644 --- a/openapi-specs/compute/32-06/desc/audits/waas_container_download_get.md +++ b/openapi-specs/compute/32-06/desc/audits/waas_container_download_get.md @@ -6,7 +6,7 @@ Returns the container Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that downloads the WAAS container audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/waas_container_get.md b/openapi-specs/compute/32-06/desc/audits/waas_container_get.md index ac0df80fd..c1ad08f3c 100644 --- a/openapi-specs/compute/32-06/desc/audits/waas_container_get.md +++ b/openapi-specs/compute/32-06/desc/audits/waas_container_get.md @@ -6,7 +6,7 @@ Retrieves all container Web-Application and API Security (WAAS) audits. Refer to the following example cURL command that retrieves all container WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/waas_container_timeslice_get.md b/openapi-specs/compute/32-06/desc/audits/waas_container_timeslice_get.md index a56b4c48f..be56260d6 100644 --- a/openapi-specs/compute/32-06/desc/audits/waas_container_timeslice_get.md +++ b/openapi-specs/compute/32-06/desc/audits/waas_container_timeslice_get.md @@ -11,7 +11,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the container WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s):: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/waas_host_download_get.md b/openapi-specs/compute/32-06/desc/audits/waas_host_download_get.md index 4bc66202b..71692e682 100644 --- a/openapi-specs/compute/32-06/desc/audits/waas_host_download_get.md +++ b/openapi-specs/compute/32-06/desc/audits/waas_host_download_get.md @@ -7,7 +7,7 @@ Returns the host Web-Application and API Security (WAAS) audit events data in CS Refer to the following example cURL command that downloads the host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/waas_host_get.md b/openapi-specs/compute/32-06/desc/audits/waas_host_get.md index 14c967594..f6e3df050 100644 --- a/openapi-specs/compute/32-06/desc/audits/waas_host_get.md +++ b/openapi-specs/compute/32-06/desc/audits/waas_host_get.md @@ -7,7 +7,7 @@ Retrieves all host Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/waas_host_timeslice_get.md b/openapi-specs/compute/32-06/desc/audits/waas_host_timeslice_get.md index e28ed7b7a..67b3a54c3 100644 --- a/openapi-specs/compute/32-06/desc/audits/waas_host_timeslice_get.md +++ b/openapi-specs/compute/32-06/desc/audits/waas_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves host WAAS audit events for a specific time frame: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/waas_serverless_download_get.md b/openapi-specs/compute/32-06/desc/audits/waas_serverless_download_get.md index da05504df..0c0dbe698 100644 --- a/openapi-specs/compute/32-06/desc/audits/waas_serverless_download_get.md +++ b/openapi-specs/compute/32-06/desc/audits/waas_serverless_download_get.md @@ -7,7 +7,7 @@ Returns the serverless function Web-Application and API Security (WAAS) audit ev Refer to the following example cURL command that downloads the serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/waas_serverless_get.md b/openapi-specs/compute/32-06/desc/audits/waas_serverless_get.md index fe482a3f3..82488f7ee 100644 --- a/openapi-specs/compute/32-06/desc/audits/waas_serverless_get.md +++ b/openapi-specs/compute/32-06/desc/audits/waas_serverless_get.md @@ -7,7 +7,7 @@ Retrieves all serverless function Web-Application and API Security (WAAS) audit Refer to the following example cURL command that retrieves all serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/audits/waas_serverless_timeslice_get.md b/openapi-specs/compute/32-06/desc/audits/waas_serverless_timeslice_get.md index ec9ff3df1..a0a9a1368 100644 --- a/openapi-specs/compute/32-06/desc/audits/waas_serverless_timeslice_get.md +++ b/openapi-specs/compute/32-06/desc/audits/waas_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the serverless WAAS audit events for a : ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/authenticate-client/post.md b/openapi-specs/compute/32-06/desc/authenticate-client/post.md index bc493d04e..ce6f00afe 100644 --- a/openapi-specs/compute/32-06/desc/authenticate-client/post.md +++ b/openapi-specs/compute/32-06/desc/authenticate-client/post.md @@ -8,7 +8,7 @@ This endpoint checks the supplied client certificate and authorizes the user bas Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X POST \ --cert \ https:///api/v/authenticate-client diff --git a/openapi-specs/compute/32-06/desc/authenticate/post.md b/openapi-specs/compute/32-06/desc/authenticate/post.md index cb018de64..4f85c5d34 100644 --- a/openapi-specs/compute/32-06/desc/authenticate/post.md +++ b/openapi-specs/compute/32-06/desc/authenticate/post.md @@ -9,7 +9,7 @@ You can set the validity period in Console under **Manage > Authentication > Log Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H "Content-Type: application/json" \ -X POST \ -d \ diff --git a/openapi-specs/compute/32-06/desc/authenticate/renew_get.md b/openapi-specs/compute/32-06/desc/authenticate/renew_get.md index 6040d58e1..3458b500a 100644 --- a/openapi-specs/compute/32-06/desc/authenticate/renew_get.md +++ b/openapi-specs/compute/32-06/desc/authenticate/renew_get.md @@ -5,7 +5,7 @@ Renews an old (unexpired) access token and returns a new token. The following cURL command retrieves a new access token using an old access token. ```bash -$ curl -k \ +$ curl \ -H "Authorization: Bearer " \ https:///api/v1/authenticate/renew ``` diff --git a/openapi-specs/compute/32-06/desc/certs/capem_get.md b/openapi-specs/compute/32-06/desc/certs/capem_get.md index f0f0f1bf3..945476c9b 100644 --- a/openapi-specs/compute/32-06/desc/certs/capem_get.md +++ b/openapi-specs/compute/32-06/desc/certs/capem_get.md @@ -5,7 +5,7 @@ Retrieves the Base64-encoded SSL root certificate self-signed by primary certifi Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/certs/client-certs_get.md b/openapi-specs/compute/32-06/desc/certs/client-certs_get.md index d099b3e3d..279d196b1 100644 --- a/openapi-specs/compute/32-06/desc/certs/client-certs_get.md +++ b/openapi-specs/compute/32-06/desc/certs/client-certs_get.md @@ -3,7 +3,7 @@ Downloads a script that installs a client certificate, client private key, and c The following example curl command uses basic auth to download and run the install script for your client certs: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/certs/client-certs.sh | sh diff --git a/openapi-specs/compute/32-06/desc/certs/server-certs_get.md b/openapi-specs/compute/32-06/desc/certs/server-certs_get.md index 0bb13f51d..118a4d9b0 100644 --- a/openapi-specs/compute/32-06/desc/certs/server-certs_get.md +++ b/openapi-specs/compute/32-06/desc/certs/server-certs_get.md @@ -12,7 +12,7 @@ Retrieves the server certificate bundle from Prisma Cloud Compute that contains Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -u \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/cloud/compliance_download_get.md b/openapi-specs/compute/32-06/desc/cloud/compliance_download_get.md index 7b1ec9fea..14f2725b1 100644 --- a/openapi-specs/compute/32-06/desc/cloud/compliance_download_get.md +++ b/openapi-specs/compute/32-06/desc/cloud/compliance_download_get.md @@ -2,7 +2,7 @@ Download all cloud scan data in CSV format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/cloud/compliance_get.md b/openapi-specs/compute/32-06/desc/cloud/compliance_get.md index 48c2fe5bb..ad47e0998 100644 --- a/openapi-specs/compute/32-06/desc/cloud/compliance_get.md +++ b/openapi-specs/compute/32-06/desc/cloud/compliance_get.md @@ -2,7 +2,7 @@ Returns a list of all cloud compliance scan results. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/cloud/compliance_scan_post.md b/openapi-specs/compute/32-06/desc/cloud/compliance_scan_post.md index 7f87bf1f4..7321c3b9d 100644 --- a/openapi-specs/compute/32-06/desc/cloud/compliance_scan_post.md +++ b/openapi-specs/compute/32-06/desc/cloud/compliance_scan_post.md @@ -2,7 +2,7 @@ Initiates a new cloud compliance scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/cloud/compliance_stop_post.md b/openapi-specs/compute/32-06/desc/cloud/compliance_stop_post.md index df0febb56..60c31dc51 100644 --- a/openapi-specs/compute/32-06/desc/cloud/compliance_stop_post.md +++ b/openapi-specs/compute/32-06/desc/cloud/compliance_stop_post.md @@ -2,7 +2,7 @@ Terminates a cloud compliance scan that's in progress.. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/cloud/discovery_download_get.md b/openapi-specs/compute/32-06/desc/cloud/discovery_download_get.md index 44d60a113..a667c8471 100644 --- a/openapi-specs/compute/32-06/desc/cloud/discovery_download_get.md +++ b/openapi-specs/compute/32-06/desc/cloud/discovery_download_get.md @@ -5,7 +5,7 @@ Downloads all cloud scan data in a CSV file. Refer to the following cURL example command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/cloud/discovery_entities_get.md b/openapi-specs/compute/32-06/desc/cloud/discovery_entities_get.md index a7abbdfb6..85f1be971 100644 --- a/openapi-specs/compute/32-06/desc/cloud/discovery_entities_get.md +++ b/openapi-specs/compute/32-06/desc/cloud/discovery_entities_get.md @@ -7,7 +7,7 @@ Use this API endpoint along with the `GET, api/vVERSION/cloud/discovery` to get Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/cloud/discovery_get.md b/openapi-specs/compute/32-06/desc/cloud/discovery_get.md index 28025f140..c2b4c6e3c 100644 --- a/openapi-specs/compute/32-06/desc/cloud/discovery_get.md +++ b/openapi-specs/compute/32-06/desc/cloud/discovery_get.md @@ -8,7 +8,7 @@ Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/cloud/discovery_scan_post.md b/openapi-specs/compute/32-06/desc/cloud/discovery_scan_post.md index 51799ebdb..0717096f8 100644 --- a/openapi-specs/compute/32-06/desc/cloud/discovery_scan_post.md +++ b/openapi-specs/compute/32-06/desc/cloud/discovery_scan_post.md @@ -5,7 +5,7 @@ Initiates a new cloud discovery scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/cloud/discovery_stop_post.md b/openapi-specs/compute/32-06/desc/cloud/discovery_stop_post.md index 6a6c7a5a5..73dbf46e7 100644 --- a/openapi-specs/compute/32-06/desc/cloud/discovery_stop_post.md +++ b/openapi-specs/compute/32-06/desc/cloud/discovery_stop_post.md @@ -5,7 +5,7 @@ Terminates a cloud discovery scan that's in progress. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/cloud/discovery_vms_get.md b/openapi-specs/compute/32-06/desc/cloud/discovery_vms_get.md index 6766f4e5a..2264a27fe 100644 --- a/openapi-specs/compute/32-06/desc/cloud/discovery_vms_get.md +++ b/openapi-specs/compute/32-06/desc/cloud/discovery_vms_get.md @@ -5,7 +5,7 @@ Returns the discovered cloud VM instances. Refer to the following example cURL command that retrieves all the discovered cloud VM instances: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/coderepos/download_get.md b/openapi-specs/compute/32-06/desc/coderepos/download_get.md index 4ec0197bb..b06dd9f17 100644 --- a/openapi-specs/compute/32-06/desc/coderepos/download_get.md +++ b/openapi-specs/compute/32-06/desc/coderepos/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Code re The following cURL command generates a CSV file containing the reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/coderepos/get.md b/openapi-specs/compute/32-06/desc/coderepos/get.md index 54c4e99bf..42dc16fb6 100644 --- a/openapi-specs/compute/32-06/desc/coderepos/get.md +++ b/openapi-specs/compute/32-06/desc/coderepos/get.md @@ -10,7 +10,7 @@ This endpoint maps to the **Code repositories** table in **Monitor > Vulnerabili The following cURL command retrieves all code repository scan reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/collections/get.md b/openapi-specs/compute/32-06/desc/collections/get.md index 99120d17d..5a9e8a50c 100755 --- a/openapi-specs/compute/32-06/desc/collections/get.md +++ b/openapi-specs/compute/32-06/desc/collections/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table in **Manage > Collections and Tags > Collections Refer to the following example cURL command that returns a list of collections: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/collections/name_delete.md b/openapi-specs/compute/32-06/desc/collections/name_delete.md index 3e2debd01..033358000 100755 --- a/openapi-specs/compute/32-06/desc/collections/name_delete.md +++ b/openapi-specs/compute/32-06/desc/collections/name_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that deletes a collection with the name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-06/desc/collections/name_usages_get.md b/openapi-specs/compute/32-06/desc/collections/name_usages_get.md index 5c9c40424..89e383cce 100755 --- a/openapi-specs/compute/32-06/desc/collections/name_usages_get.md +++ b/openapi-specs/compute/32-06/desc/collections/name_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that retrieves all policies with name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/containers/count_get.md b/openapi-specs/compute/32-06/desc/containers/count_get.md index 4c6ecdcb4..aca59a913 100644 --- a/openapi-specs/compute/32-06/desc/containers/count_get.md +++ b/openapi-specs/compute/32-06/desc/containers/count_get.md @@ -5,7 +5,7 @@ Returns an integer representing the number of containers in your environment. Refer to the following example cURL command that returns the number of containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/containers/download_get.md b/openapi-specs/compute/32-06/desc/containers/download_get.md index 8f581aabe..d76a8de25 100644 --- a/openapi-specs/compute/32-06/desc/containers/download_get.md +++ b/openapi-specs/compute/32-06/desc/containers/download_get.md @@ -9,7 +9,7 @@ You can download the container scan reports in CSV format in Console under **Mon Refer to the following example cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/containers/filters_get.md b/openapi-specs/compute/32-06/desc/containers/filters_get.md index c8a1dfca4..6c2777819 100644 --- a/openapi-specs/compute/32-06/desc/containers/filters_get.md +++ b/openapi-specs/compute/32-06/desc/containers/filters_get.md @@ -1,7 +1,7 @@ Returns all container filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/containers/get.md b/openapi-specs/compute/32-06/desc/containers/get.md index 4cacdde60..3de9dd4af 100644 --- a/openapi-specs/compute/32-06/desc/containers/get.md +++ b/openapi-specs/compute/32-06/desc/containers/get.md @@ -16,7 +16,7 @@ Refer to the following available options for the `fields` query parameters: Refer to the following example cURL command that retrieves a scan report for all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -26,7 +26,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a scan report for a container with the collection ``: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/containers/labels_get.md b/openapi-specs/compute/32-06/desc/containers/labels_get.md index eb40a748d..7a63ab6fb 100644 --- a/openapi-specs/compute/32-06/desc/containers/labels_get.md +++ b/openapi-specs/compute/32-06/desc/containers/labels_get.md @@ -1,7 +1,7 @@ Returns an array of strings containing all of the labels. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/containers/names_get.md b/openapi-specs/compute/32-06/desc/containers/names_get.md index 8b32465d5..9025e2e10 100644 --- a/openapi-specs/compute/32-06/desc/containers/names_get.md +++ b/openapi-specs/compute/32-06/desc/containers/names_get.md @@ -5,7 +5,7 @@ Returns an array of strings containing all container names. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/containers/scan_post.md b/openapi-specs/compute/32-06/desc/containers/scan_post.md index 6b2bdaaba..56137cf64 100644 --- a/openapi-specs/compute/32-06/desc/containers/scan_post.md +++ b/openapi-specs/compute/32-06/desc/containers/scan_post.md @@ -4,7 +4,7 @@ This endpoint returns the time that the scans were initiated. The following example command uses curl and basic auth to force Prisma Cloud Compute to re-scan all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/credentials/get.md b/openapi-specs/compute/32-06/desc/credentials/get.md index ee4309dee..b807ce8f3 100644 --- a/openapi-specs/compute/32-06/desc/credentials/get.md +++ b/openapi-specs/compute/32-06/desc/credentials/get.md @@ -6,7 +6,7 @@ This endpoint maps to **Manage > Authentication > Credentials store** in the Con Refer to the following example cURL command that retrieves all credentials: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/credentials/id_delete.md b/openapi-specs/compute/32-06/desc/credentials/id_delete.md index e5c70259e..27f090158 100644 --- a/openapi-specs/compute/32-06/desc/credentials/id_delete.md +++ b/openapi-specs/compute/32-06/desc/credentials/id_delete.md @@ -14,7 +14,7 @@ To invoke this endpoint in the Prisma Cloud Compute user interface: Refer to the following example cURL command that deletes an existing credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-06/desc/credentials/id_usages_get.md b/openapi-specs/compute/32-06/desc/credentials/id_usages_get.md index 76c1099aa..ca2ce6216 100644 --- a/openapi-specs/compute/32-06/desc/credentials/id_usages_get.md +++ b/openapi-specs/compute/32-06/desc/credentials/id_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following cURL command that retrieves all usages for a credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/curl_examples.md b/openapi-specs/compute/32-06/desc/curl_examples.md index 3d4fcd468..745d21db3 100644 --- a/openapi-specs/compute/32-06/desc/curl_examples.md +++ b/openapi-specs/compute/32-06/desc/curl_examples.md @@ -6,7 +6,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -17,7 +17,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -29,7 +29,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/compute/32-06/desc/custom-compliance/get.md b/openapi-specs/compute/32-06/desc/custom-compliance/get.md index 9022a87b7..9dddcff4e 100644 --- a/openapi-specs/compute/32-06/desc/custom-compliance/get.md +++ b/openapi-specs/compute/32-06/desc/custom-compliance/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example curl command that gets the list of custom compliance checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/custom-compliance/id_delete.md b/openapi-specs/compute/32-06/desc/custom-compliance/id_delete.md index 72c7183ee..f6536e51d 100644 --- a/openapi-specs/compute/32-06/desc/custom-compliance/id_delete.md +++ b/openapi-specs/compute/32-06/desc/custom-compliance/id_delete.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example cURL command that uses basic auth to delete the compliance check with id 9000: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-06/desc/custom-compliance/put.md b/openapi-specs/compute/32-06/desc/custom-compliance/put.md index 480e41b54..b8760a11f 100644 --- a/openapi-specs/compute/32-06/desc/custom-compliance/put.md +++ b/openapi-specs/compute/32-06/desc/custom-compliance/put.md @@ -21,7 +21,7 @@ Create `custom_check.json` file (example): Refer to the following example curl command that uses basic auth to update the checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-06/desc/custom-rules/get.md b/openapi-specs/compute/32-06/desc/custom-rules/get.md index f0385f81a..f77924be8 100644 --- a/openapi-specs/compute/32-06/desc/custom-rules/get.md +++ b/openapi-specs/compute/32-06/desc/custom-rules/get.md @@ -7,7 +7,7 @@ This endpoint maps to the policy table in **Defend > Custom rules** in the Conso Refer to the following example cURL command that retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/custom-rules/id_delete.md b/openapi-specs/compute/32-06/desc/custom-rules/id_delete.md index c0d6dc8b0..01412abf3 100644 --- a/openapi-specs/compute/32-06/desc/custom-rules/id_delete.md +++ b/openapi-specs/compute/32-06/desc/custom-rules/id_delete.md @@ -5,7 +5,7 @@ Deletes a custom rule. Refer to the following example cURL command that deletes a custom rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-06/desc/cves/distribution_get.md b/openapi-specs/compute/32-06/desc/cves/distribution_get.md index aecddce23..7365e1a5e 100644 --- a/openapi-specs/compute/32-06/desc/cves/distribution_get.md +++ b/openapi-specs/compute/32-06/desc/cves/distribution_get.md @@ -3,7 +3,7 @@ Retrieves CVEs from the vulnerability database grouped into distribution where y The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/cves/get.md b/openapi-specs/compute/32-06/desc/cves/get.md index 469ea4b28..f81223298 100644 --- a/openapi-specs/compute/32-06/desc/cves/get.md +++ b/openapi-specs/compute/32-06/desc/cves/get.md @@ -6,7 +6,7 @@ A null response indicates that the CVE is not in our database. The following example curl command queries the Prisma Cloud Compute database for `CVE-2018-1102`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/defenders/app_embedded_post.md b/openapi-specs/compute/32-06/desc/defenders/app_embedded_post.md index 9167469d0..7999cbadb 100644 --- a/openapi-specs/compute/32-06/desc/defenders/app_embedded_post.md +++ b/openapi-specs/compute/32-06/desc/defenders/app_embedded_post.md @@ -5,7 +5,7 @@ Creates an augmented Dockerfile with Defender and dependencies included as a ZIP Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/defenders/daemonset_yaml_get.md b/openapi-specs/compute/32-06/desc/defenders/daemonset_yaml_get.md index 678901a8a..b68869081 100644 --- a/openapi-specs/compute/32-06/desc/defenders/daemonset_yaml_get.md +++ b/openapi-specs/compute/32-06/desc/defenders/daemonset_yaml_get.md @@ -10,7 +10,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https://:8083/api/v1/defenders/daemonset.yaml?consoleaddr=&listener=none&namespace=twistlock&orchestration=kubernetes' diff --git a/openapi-specs/compute/32-06/desc/defenders/daemonset_yaml_post.md b/openapi-specs/compute/32-06/desc/defenders/daemonset_yaml_post.md index 8dcf30639..91abe241f 100644 --- a/openapi-specs/compute/32-06/desc/defenders/daemonset_yaml_post.md +++ b/openapi-specs/compute/32-06/desc/defenders/daemonset_yaml_post.md @@ -5,7 +5,7 @@ Creates a DaemonSet deployment file in YAML format that you can use to deploy De Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/defenders/download_get.md b/openapi-specs/compute/32-06/desc/defenders/download_get.md index 2d9435506..67f08c0e5 100644 --- a/openapi-specs/compute/32-06/desc/defenders/download_get.md +++ b/openapi-specs/compute/32-06/desc/defenders/download_get.md @@ -8,7 +8,7 @@ Use the query parameters to filter what data is returned. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o \ diff --git a/openapi-specs/compute/32-06/desc/defenders/fargate_json_post.md b/openapi-specs/compute/32-06/desc/defenders/fargate_json_post.md index 5128e90a1..e2e4e85ab 100644 --- a/openapi-specs/compute/32-06/desc/defenders/fargate_json_post.md +++ b/openapi-specs/compute/32-06/desc/defenders/fargate_json_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command: Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -23,7 +23,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/defenders/fargate_yaml_post.md b/openapi-specs/compute/32-06/desc/defenders/fargate_yaml_post.md index 9a8306a1b..95560526a 100644 --- a/openapi-specs/compute/32-06/desc/defenders/fargate_yaml_post.md +++ b/openapi-specs/compute/32-06/desc/defenders/fargate_yaml_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.yaml` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/yaml' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/defenders/get.md b/openapi-specs/compute/32-06/desc/defenders/get.md index 471e7ef9d..8d2f5cd4c 100644 --- a/openapi-specs/compute/32-06/desc/defenders/get.md +++ b/openapi-specs/compute/32-06/desc/defenders/get.md @@ -7,7 +7,7 @@ This endpoint maps to the UI Console page in **Manage > Defenders > Defenders**. Refer to the following example cURL command that retrieves all deployed Defenders. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/defenders/helm_get.md b/openapi-specs/compute/32-06/desc/defenders/helm_get.md index b11f9c4b9..487c8b7e8 100644 --- a/openapi-specs/compute/32-06/desc/defenders/helm_get.md +++ b/openapi-specs/compute/32-06/desc/defenders/helm_get.md @@ -13,7 +13,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o twistlock-defender-helm.tar.gz \ diff --git a/openapi-specs/compute/32-06/desc/defenders/helm_post.md b/openapi-specs/compute/32-06/desc/defenders/helm_post.md index 2046e63eb..fb76807ae 100644 --- a/openapi-specs/compute/32-06/desc/defenders/helm_post.md +++ b/openapi-specs/compute/32-06/desc/defenders/helm_post.md @@ -5,7 +5,7 @@ Creates a Helm deployment file that you can use to deploy Defenders to your clus Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/defenders/id_delete.md b/openapi-specs/compute/32-06/desc/defenders/id_delete.md index f637ef850..e3ac52daf 100644 --- a/openapi-specs/compute/32-06/desc/defenders/id_delete.md +++ b/openapi-specs/compute/32-06/desc/defenders/id_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes an existing Defender on a host. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-06/desc/defenders/id_features_post.md b/openapi-specs/compute/32-06/desc/defenders/id_features_post.md index ec8e4c5f3..9b42f5fa0 100644 --- a/openapi-specs/compute/32-06/desc/defenders/id_features_post.md +++ b/openapi-specs/compute/32-06/desc/defenders/id_features_post.md @@ -3,7 +3,7 @@ Updates a deployed Defender's configuration. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/defenders/id_restart_post.md b/openapi-specs/compute/32-06/desc/defenders/id_restart_post.md index da0cc7811..7296a186b 100644 --- a/openapi-specs/compute/32-06/desc/defenders/id_restart_post.md +++ b/openapi-specs/compute/32-06/desc/defenders/id_restart_post.md @@ -3,7 +3,7 @@ Restarts Defender on a given host. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/defenders/id_upgrade_post.md b/openapi-specs/compute/32-06/desc/defenders/id_upgrade_post.md index f0d30d1e9..3e63c6414 100644 --- a/openapi-specs/compute/32-06/desc/defenders/id_upgrade_post.md +++ b/openapi-specs/compute/32-06/desc/defenders/id_upgrade_post.md @@ -7,7 +7,7 @@ Upgrades Defender on ``. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/defenders/image-name_get.md b/openapi-specs/compute/32-06/desc/defenders/image-name_get.md index e81ba3e19..19f360c07 100644 --- a/openapi-specs/compute/32-06/desc/defenders/image-name_get.md +++ b/openapi-specs/compute/32-06/desc/defenders/image-name_get.md @@ -5,7 +5,7 @@ Returns the full Docker image name for Defender. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/defenders/install-bundle_get.md b/openapi-specs/compute/32-06/desc/defenders/install-bundle_get.md index 882d0cd53..9b09e733f 100644 --- a/openapi-specs/compute/32-06/desc/defenders/install-bundle_get.md +++ b/openapi-specs/compute/32-06/desc/defenders/install-bundle_get.md @@ -5,7 +5,7 @@ Returns the certificate bundle that Defender needs to securely connect to Consol Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/defenders/names_get.md b/openapi-specs/compute/32-06/desc/defenders/names_get.md index 728eb6364..6339c1483 100644 --- a/openapi-specs/compute/32-06/desc/defenders/names_get.md +++ b/openapi-specs/compute/32-06/desc/defenders/names_get.md @@ -5,7 +5,7 @@ Retrieves a list of Defender hostnames that can be used as the `{id}` query para Refer to the following example cURL command that retrieves a list of all Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -15,7 +15,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of connected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -25,7 +25,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of disconnected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -37,7 +37,7 @@ The endpoint enlists all the connected and disconnected Defenders if do not spec Refer to the following example cURL command that retrieves a list of Defenders by type: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/defenders/rasp_post.md b/openapi-specs/compute/32-06/desc/defenders/rasp_post.md index 526a9e112..e110044dd 100644 --- a/openapi-specs/compute/32-06/desc/defenders/rasp_post.md +++ b/openapi-specs/compute/32-06/desc/defenders/rasp_post.md @@ -7,7 +7,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o rasp-defender.zip diff --git a/openapi-specs/compute/32-06/desc/defenders/serverless-bundle_post.md b/openapi-specs/compute/32-06/desc/defenders/serverless-bundle_post.md index df4f13e6a..7533e436b 100644 --- a/openapi-specs/compute/32-06/desc/defenders/serverless-bundle_post.md +++ b/openapi-specs/compute/32-06/desc/defenders/serverless-bundle_post.md @@ -5,7 +5,7 @@ Downloads a ZIP file with serverless Defender bundle. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/octet-stream' \ -o serverless_bundle.zip \ diff --git a/openapi-specs/compute/32-06/desc/defenders/summary_get.md b/openapi-specs/compute/32-06/desc/defenders/summary_get.md index 08be4ebc4..e308ef64b 100644 --- a/openapi-specs/compute/32-06/desc/defenders/summary_get.md +++ b/openapi-specs/compute/32-06/desc/defenders/summary_get.md @@ -6,7 +6,7 @@ Lists the number of Defenders in each defender category. Refer to the following example cURL command that retrieves a summary of Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/defenders/upgrade_post.md b/openapi-specs/compute/32-06/desc/defenders/upgrade_post.md index 2f0b4d39e..eacd6b779 100644 --- a/openapi-specs/compute/32-06/desc/defenders/upgrade_post.md +++ b/openapi-specs/compute/32-06/desc/defenders/upgrade_post.md @@ -9,7 +9,7 @@ To upgrade Serverless and Fargate Defenders, re-embed them. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/deployment/daemonsets_deploy_post.md b/openapi-specs/compute/32-06/desc/deployment/daemonsets_deploy_post.md index 94ec9386b..b60f28346 100644 --- a/openapi-specs/compute/32-06/desc/deployment/daemonsets_deploy_post.md +++ b/openapi-specs/compute/32-06/desc/deployment/daemonsets_deploy_post.md @@ -5,7 +5,7 @@ It identifies the cluster's API server, user, and credentials. Use the various request parameters to control the properties of the deployed DaemonSet. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/deployment/daemonsets_get.md b/openapi-specs/compute/32-06/desc/deployment/daemonsets_get.md index a0b7f3798..0385acf75 100644 --- a/openapi-specs/compute/32-06/desc/deployment/daemonsets_get.md +++ b/openapi-specs/compute/32-06/desc/deployment/daemonsets_get.md @@ -3,7 +3,7 @@ You must specify a `credentialID`, of type `kubeconfig`, which identifies your c Credentials are managed in Console's credentials store (`/api/v1/credentials`). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/feeds/custom-vulnerabilities_get.md b/openapi-specs/compute/32-06/desc/feeds/custom-vulnerabilities_get.md index 71834f19d..d661acf55 100644 --- a/openapi-specs/compute/32-06/desc/feeds/custom-vulnerabilities_get.md +++ b/openapi-specs/compute/32-06/desc/feeds/custom-vulnerabilities_get.md @@ -11,7 +11,7 @@ Vulnerability rules can be created using the Prisma Cloud Compute. Refer to the following cURL command that retrieves a list of all the custom vulnerabilities and associated rules. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/feeds/custom-vulnerabilities_put.md b/openapi-specs/compute/32-06/desc/feeds/custom-vulnerabilities_put.md index 4fe1c1898..149ada978 100644 --- a/openapi-specs/compute/32-06/desc/feeds/custom-vulnerabilities_put.md +++ b/openapi-specs/compute/32-06/desc/feeds/custom-vulnerabilities_put.md @@ -5,7 +5,7 @@ Updates all the custom vulnerabilities and associated rules simultaneously for h Refer to the following cURL command that updates a vulnerability for a library named `internal-lib`, and specifies that its versions `1.1` to `1.8` are known to be vulnerable. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -37,7 +37,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: **Note:** You will need `jq` to execute this command. ``` - $ curl -k \ + $ curl \ -u \ https:///api/v/feeds/custom/custom-vulnerabilities \ | jq '.' > custom_vulnerability_rules.json @@ -66,7 +66,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 3. Update the rules by pushing the new JSON payload. **Note:** Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -77,7 +77,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 4. Run the cURL command for the `GET /api/vVERSION/feeds/custom/custom-vulnerabilities` endpoint and you can see that the previously installed rules are now overwritten with your new rules. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/feeds/custom_vulnerabilities_digest_get.md b/openapi-specs/compute/32-06/desc/feeds/custom_vulnerabilities_digest_get.md index 0eb501d9b..02af9a3ab 100644 --- a/openapi-specs/compute/32-06/desc/feeds/custom_vulnerabilities_digest_get.md +++ b/openapi-specs/compute/32-06/desc/feeds/custom_vulnerabilities_digest_get.md @@ -5,7 +5,7 @@ Returns the unique digest for the custom vulnerabilities and associated rules fo The following cURL command retrieves the digest for the configured custom vulnerabilities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/feeds/cve_allow_list_digest_get.md b/openapi-specs/compute/32-06/desc/feeds/cve_allow_list_digest_get.md index e27f21251..911a07fd9 100644 --- a/openapi-specs/compute/32-06/desc/feeds/cve_allow_list_digest_get.md +++ b/openapi-specs/compute/32-06/desc/feeds/cve_allow_list_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the Common Vulnerabilities and Exposures (CVE) a The following cURL command retrieves the digest for the configured CVE allow list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/feeds/cve_allow_list_get.md b/openapi-specs/compute/32-06/desc/feeds/cve_allow_list_get.md index 34fb2c7f8..d73ce17c2 100644 --- a/openapi-specs/compute/32-06/desc/feeds/cve_allow_list_get.md +++ b/openapi-specs/compute/32-06/desc/feeds/cve_allow_list_get.md @@ -5,7 +5,7 @@ Retrieves the globally allow-listed Common Vulnerabilities and Exposures (CVE). The following cURL command retrieves the globally allow-listed CVEs. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/feeds/cve_allow_list_put.md b/openapi-specs/compute/32-06/desc/feeds/cve_allow_list_put.md index 850016965..c4e2ce0af 100644 --- a/openapi-specs/compute/32-06/desc/feeds/cve_allow_list_put.md +++ b/openapi-specs/compute/32-06/desc/feeds/cve_allow_list_put.md @@ -7,7 +7,7 @@ Globally allow-lists a set of Common Vulnerabilities and Exposures (CVE). The following cURL command installs a global CVE allow-list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-06/desc/feeds/ips_digest_get.md b/openapi-specs/compute/32-06/desc/feeds/ips_digest_get.md index d059271ea..ae2a09915 100644 --- a/openapi-specs/compute/32-06/desc/feeds/ips_digest_get.md +++ b/openapi-specs/compute/32-06/desc/feeds/ips_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the list of suspicious or high risk IP endpoints The following cURL command retrieves the digest for the banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/feeds/ips_get.md b/openapi-specs/compute/32-06/desc/feeds/ips_get.md index 381257d47..f51c577a7 100644 --- a/openapi-specs/compute/32-06/desc/feeds/ips_get.md +++ b/openapi-specs/compute/32-06/desc/feeds/ips_get.md @@ -5,7 +5,7 @@ Retrieves the customized list of block-listed suspicious or high-risk IP address The following cURL command retrieves the list of globally block-listed suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/feeds/ips_put.md b/openapi-specs/compute/32-06/desc/feeds/ips_put.md index 6f8fc2419..5bf791044 100644 --- a/openapi-specs/compute/32-06/desc/feeds/ips_put.md +++ b/openapi-specs/compute/32-06/desc/feeds/ips_put.md @@ -7,7 +7,7 @@ Bans a custom list of suspicious or high-risk IP addresses. The following cURL command installs a custom list of banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-06/desc/feeds/malware_digest_get.md b/openapi-specs/compute/32-06/desc/feeds/malware_digest_get.md index 005c476a2..522a59aef 100644 --- a/openapi-specs/compute/32-06/desc/feeds/malware_digest_get.md +++ b/openapi-specs/compute/32-06/desc/feeds/malware_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for all the MD5 signatures of malicious executables The following cURL command retrieves the digest for the configured list for the MD5 signatures of malicious executables. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/feeds/malware_get.md b/openapi-specs/compute/32-06/desc/feeds/malware_get.md index 2a7aa128b..72bee6594 100644 --- a/openapi-specs/compute/32-06/desc/feeds/malware_get.md +++ b/openapi-specs/compute/32-06/desc/feeds/malware_get.md @@ -5,7 +5,7 @@ Returns the customized list of MD5 signatures of malicious executables. Refer to the following cURL command that retrieves the list of MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/feeds/malware_put.md b/openapi-specs/compute/32-06/desc/feeds/malware_put.md index 7e6ec5da0..176304cb9 100644 --- a/openapi-specs/compute/32-06/desc/feeds/malware_put.md +++ b/openapi-specs/compute/32-06/desc/feeds/malware_put.md @@ -7,7 +7,7 @@ Creates a custom list of malware MD5 signatures of malicious executables. Refer to the following cURL command that installs a custom list of malware MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-06/desc/feeds/refresh_post.md b/openapi-specs/compute/32-06/desc/feeds/refresh_post.md index a83c40d10..1c756edae 100644 --- a/openapi-specs/compute/32-06/desc/feeds/refresh_post.md +++ b/openapi-specs/compute/32-06/desc/feeds/refresh_post.md @@ -1,7 +1,7 @@ Triggers Console to refresh its data from the **Intelligence Stream** ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/forensic/activities_download_get.md b/openapi-specs/compute/32-06/desc/forensic/activities_download_get.md index 8a2dbd926..1918e3790 100644 --- a/openapi-specs/compute/32-06/desc/forensic/activities_download_get.md +++ b/openapi-specs/compute/32-06/desc/forensic/activities_download_get.md @@ -3,7 +3,7 @@ Downloads all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/forensic/activities_get.md b/openapi-specs/compute/32-06/desc/forensic/activities_get.md index c8fb1d0cd..c0761aa60 100644 --- a/openapi-specs/compute/32-06/desc/forensic/activities_get.md +++ b/openapi-specs/compute/32-06/desc/forensic/activities_get.md @@ -3,7 +3,7 @@ Retrieves all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/groups/get.md b/openapi-specs/compute/32-06/desc/groups/get.md index 6a0daa2eb..34a2711e0 100644 --- a/openapi-specs/compute/32-06/desc/groups/get.md +++ b/openapi-specs/compute/32-06/desc/groups/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups. ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-06/desc/groups/id_delete.md b/openapi-specs/compute/32-06/desc/groups/id_delete.md index 5962a1135..0c3cfa1cd 100644 --- a/openapi-specs/compute/32-06/desc/groups/id_delete.md +++ b/openapi-specs/compute/32-06/desc/groups/id_delete.md @@ -13,7 +13,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes a collection with the name `{id}`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-06/desc/groups/names.md b/openapi-specs/compute/32-06/desc/groups/names.md index 80f34f536..9c2dd1089 100644 --- a/openapi-specs/compute/32-06/desc/groups/names.md +++ b/openapi-specs/compute/32-06/desc/groups/names.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-06/desc/groups/post.md b/openapi-specs/compute/32-06/desc/groups/post.md index d0fc23a6d..ebad011f4 100644 --- a/openapi-specs/compute/32-06/desc/groups/post.md +++ b/openapi-specs/compute/32-06/desc/groups/post.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that creates a new group named `my-group`: ```bash -$ curl -k \ +$ curl \ -X POST \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-06/desc/high-availability/get.md b/openapi-specs/compute/32-06/desc/high-availability/get.md index a988d47ef..83d5d9b46 100644 --- a/openapi-specs/compute/32-06/desc/high-availability/get.md +++ b/openapi-specs/compute/32-06/desc/high-availability/get.md @@ -3,7 +3,7 @@ Returns the status of high high availability. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-06/desc/hosts/download_get.md b/openapi-specs/compute/32-06/desc/hosts/download_get.md index ab691fb49..34e546573 100644 --- a/openapi-specs/compute/32-06/desc/hosts/download_get.md +++ b/openapi-specs/compute/32-06/desc/hosts/download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Hosts > Refer to the following example cURL command that downloads all host scan reports to a CSV file called `hosts_report.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o hosts_report.csv \ diff --git a/openapi-specs/compute/32-06/desc/hosts/filters_get.md b/openapi-specs/compute/32-06/desc/hosts/filters_get.md index 4bf6df5e6..a39ec8a97 100644 --- a/openapi-specs/compute/32-06/desc/hosts/filters_get.md +++ b/openapi-specs/compute/32-06/desc/hosts/filters_get.md @@ -3,7 +3,7 @@ Returns host filters such as distribution and host name. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/hosts/get.md b/openapi-specs/compute/32-06/desc/hosts/get.md index d125c9d7b..26df89cef 100644 --- a/openapi-specs/compute/32-06/desc/hosts/get.md +++ b/openapi-specs/compute/32-06/desc/hosts/get.md @@ -35,7 +35,7 @@ Refer to the following available options for the `fields` query parameters: Refer to the following cURL command that retrieves all host scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/hosts/info_get.md b/openapi-specs/compute/32-06/desc/hosts/info_get.md index be456b46b..b71c6be2f 100644 --- a/openapi-specs/compute/32-06/desc/hosts/info_get.md +++ b/openapi-specs/compute/32-06/desc/hosts/info_get.md @@ -3,7 +3,7 @@ Returns minimal information that includes hostname, distro, distro-release, coll A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/hosts/scan_post.md b/openapi-specs/compute/32-06/desc/hosts/scan_post.md index 6b72cbfa3..0e0e7b074 100644 --- a/openapi-specs/compute/32-06/desc/hosts/scan_post.md +++ b/openapi-specs/compute/32-06/desc/hosts/scan_post.md @@ -3,7 +3,7 @@ Re-scan all hosts immediately. Refer to the following example command that forces Prisma Cloud Compute to re-scan all hosts: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/hosts/scan diff --git a/openapi-specs/compute/32-06/desc/images/defender_layer_get.md b/openapi-specs/compute/32-06/desc/images/defender_layer_get.md index 1dfe3633d..4bb88d62c 100644 --- a/openapi-specs/compute/32-06/desc/images/defender_layer_get.md +++ b/openapi-specs/compute/32-06/desc/images/defender_layer_get.md @@ -5,7 +5,7 @@ Returns the the Prisma Cloud Compute Defender in as a layer that can be used in Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/compute/32-06/desc/images/defender_rasp_get.md b/openapi-specs/compute/32-06/desc/images/defender_rasp_get.md index a8e145ff7..260e271a1 100644 --- a/openapi-specs/compute/32-06/desc/images/defender_rasp_get.md +++ b/openapi-specs/compute/32-06/desc/images/defender_rasp_get.md @@ -3,7 +3,7 @@ Returns the the Prisma Cloud Compute Defender as the RASP Defender A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/compute/32-06/desc/images/download_get.md b/openapi-specs/compute/32-06/desc/images/download_get.md index 713114955..fcae06e3d 100644 --- a/openapi-specs/compute/32-06/desc/images/download_get.md +++ b/openapi-specs/compute/32-06/desc/images/download_get.md @@ -15,7 +15,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -26,7 +26,7 @@ $ curl -k \ Refer to the following example cURL command that might be useful for developers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/images/get.md b/openapi-specs/compute/32-06/desc/images/get.md index ec777ffb8..b79c298e6 100644 --- a/openapi-specs/compute/32-06/desc/images/get.md +++ b/openapi-specs/compute/32-06/desc/images/get.md @@ -24,7 +24,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that retrieves a compact scan report for all images: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -34,7 +34,7 @@ $ curl -k \ Refer to the following cURL command that retrieves a compact scan report for an Ubuntu image: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -45,7 +45,7 @@ The name query is synonymous with the filter images text field in the Console UI Refer to the following cURL command that retrieves the scan report for an image with the matching SHA-256 hash: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/images/names_get.md b/openapi-specs/compute/32-06/desc/images/names_get.md index 3db6f5429..ad5fd25dc 100644 --- a/openapi-specs/compute/32-06/desc/images/names_get.md +++ b/openapi-specs/compute/32-06/desc/images/names_get.md @@ -5,7 +5,7 @@ Returns an array of strings containing image names. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-06/desc/images/scan_post.md b/openapi-specs/compute/32-06/desc/images/scan_post.md index 8d802727a..36278249b 100644 --- a/openapi-specs/compute/32-06/desc/images/scan_post.md +++ b/openapi-specs/compute/32-06/desc/images/scan_post.md @@ -5,7 +5,7 @@ Re-scan all images immediately. This endpoint returns the time that the scans we Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all images: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/images/scan diff --git a/openapi-specs/compute/32-06/desc/images/twistlock_defender_tar_gz_get.md b/openapi-specs/compute/32-06/desc/images/twistlock_defender_tar_gz_get.md index 7852e12ba..36fb66ae8 100644 --- a/openapi-specs/compute/32-06/desc/images/twistlock_defender_tar_gz_get.md +++ b/openapi-specs/compute/32-06/desc/images/twistlock_defender_tar_gz_get.md @@ -1,7 +1,7 @@ Download the Container Defender image for Linux platforms. ```bash -$ curl -k \ +$ curl \ -u \ -H "Content-Type: application/octet-stream" \ -o twistlock_defender.tar.gz \ diff --git a/openapi-specs/compute/32-06/desc/intro.md b/openapi-specs/compute/32-06/desc/intro.md index 9038a3734..5b4ed5864 100644 --- a/openapi-specs/compute/32-06/desc/intro.md +++ b/openapi-specs/compute/32-06/desc/intro.md @@ -47,7 +47,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -58,7 +58,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -70,7 +70,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/compute/32-06/desc/kubernetes/scan_post.md b/openapi-specs/compute/32-06/desc/kubernetes/scan_post.md index 15d614c1a..ab74d5d96 100644 --- a/openapi-specs/compute/32-06/desc/kubernetes/scan_post.md +++ b/openapi-specs/compute/32-06/desc/kubernetes/scan_post.md @@ -3,7 +3,7 @@ This endpoint will trigger a Kubernetes scan. The following example curl command uses basic auth to initiate this scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/logs/console_get.md b/openapi-specs/compute/32-06/desc/logs/console_get.md index 80ece6611..113543540 100644 --- a/openapi-specs/compute/32-06/desc/logs/console_get.md +++ b/openapi-specs/compute/32-06/desc/logs/console_get.md @@ -3,7 +3,7 @@ Retrieves the latest Console log messages. The following example curl command retrieves the 10 latest Console log messages: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/logs/defender_download_get.md b/openapi-specs/compute/32-06/desc/logs/defender_download_get.md index 5d6718db0..05bbc6a75 100644 --- a/openapi-specs/compute/32-06/desc/logs/defender_download_get.md +++ b/openapi-specs/compute/32-06/desc/logs/defender_download_get.md @@ -5,7 +5,7 @@ The hostname can be returned from the endpoint `/defenders/names` The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/logs/defender_get.md b/openapi-specs/compute/32-06/desc/logs/defender_get.md index 1e733a746..f2e3b25df 100644 --- a/openapi-specs/compute/32-06/desc/logs/defender_get.md +++ b/openapi-specs/compute/32-06/desc/logs/defender_get.md @@ -7,7 +7,7 @@ Note that you must quote the URL when running the following command. Otherwise the shell misinterprets the ampersand (`&`) as the end of the command, and puts the curl command in the background. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/logs/system_download_get.md b/openapi-specs/compute/32-06/desc/logs/system_download_get.md index 1e5b5b873..43bb0abce 100644 --- a/openapi-specs/compute/32-06/desc/logs/system_download_get.md +++ b/openapi-specs/compute/32-06/desc/logs/system_download_get.md @@ -4,7 +4,7 @@ This endpoint will return the system debug logs with `tar.gz` file extension. The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/pcf-droplets/addresses_get.md b/openapi-specs/compute/32-06/desc/pcf-droplets/addresses_get.md index 257a47455..bb3365015 100644 --- a/openapi-specs/compute/32-06/desc/pcf-droplets/addresses_get.md +++ b/openapi-specs/compute/32-06/desc/pcf-droplets/addresses_get.md @@ -5,7 +5,7 @@ You can also add optional query parameters to this API call, in this example `cl The following example curl command retrieves the list of addresses: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/pcf-droplets/download_get.md b/openapi-specs/compute/32-06/desc/pcf-droplets/download_get.md index ad761e744..ac8546a25 100644 --- a/openapi-specs/compute/32-06/desc/pcf-droplets/download_get.md +++ b/openapi-specs/compute/32-06/desc/pcf-droplets/download_get.md @@ -3,7 +3,7 @@ This endpoint will download the list of configured cloud controller addresses co The following example curl command retrieves the list of addresses and outputs it to a file call `PCF_blobstores.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/pcf-droplets/get.md b/openapi-specs/compute/32-06/desc/pcf-droplets/get.md index 930d16948..aad607cba 100644 --- a/openapi-specs/compute/32-06/desc/pcf-droplets/get.md +++ b/openapi-specs/compute/32-06/desc/pcf-droplets/get.md @@ -3,7 +3,7 @@ This endpoint will return the full metadata of PCF blobstore from page **Monitor The following example curl command will retrieve this: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/pcf-droplets/scan_post.md b/openapi-specs/compute/32-06/desc/pcf-droplets/scan_post.md index 34e75b26c..d9c9df4dd 100644 --- a/openapi-specs/compute/32-06/desc/pcf-droplets/scan_post.md +++ b/openapi-specs/compute/32-06/desc/pcf-droplets/scan_post.md @@ -3,7 +3,7 @@ This endpoint will kick off a scan of the any PCF Blobstores you have configured Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/pcf-droplets/stop_post.md b/openapi-specs/compute/32-06/desc/pcf-droplets/stop_post.md index 94c376972..2c4d5264a 100644 --- a/openapi-specs/compute/32-06/desc/pcf-droplets/stop_post.md +++ b/openapi-specs/compute/32-06/desc/pcf-droplets/stop_post.md @@ -3,7 +3,7 @@ This endpoint will instruct the PFC Defenders to stop scanning. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/policies/compliance_ci_images_get.md b/openapi-specs/compute/32-06/desc/policies/compliance_ci_images_get.md index f97130a97..9a2b2abf5 100644 --- a/openapi-specs/compute/32-06/desc/policies/compliance_ci_images_get.md +++ b/openapi-specs/compute/32-06/desc/policies/compliance_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > CI** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/policies/compliance_ci_serverless_get.md b/openapi-specs/compute/32-06/desc/policies/compliance_ci_serverless_get.md index 59195f070..2f30e2d74 100644 --- a/openapi-specs/compute/32-06/desc/policies/compliance_ci_serverless_get.md +++ b/openapi-specs/compute/32-06/desc/policies/compliance_ci_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Functions > CI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/policies/compliance_container_get.md b/openapi-specs/compute/32-06/desc/policies/compliance_container_get.md index 7f10245ea..657d4f2dd 100644 --- a/openapi-specs/compute/32-06/desc/policies/compliance_container_get.md +++ b/openapi-specs/compute/32-06/desc/policies/compliance_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > Deployed** Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/policies/compliance_container_impacted_get.md b/openapi-specs/compute/32-06/desc/policies/compliance_container_impacted_get.md index 607bfa3c8..de9e0ee77 100644 --- a/openapi-specs/compute/32-06/desc/policies/compliance_container_impacted_get.md +++ b/openapi-specs/compute/32-06/desc/policies/compliance_container_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of containers captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/compliance/container/impacted?ruleName=' diff --git a/openapi-specs/compute/32-06/desc/policies/compliance_host_get.md b/openapi-specs/compute/32-06/desc/policies/compliance_host_get.md index c029ecf7f..a5e429af5 100755 --- a/openapi-specs/compute/32-06/desc/policies/compliance_host_get.md +++ b/openapi-specs/compute/32-06/desc/policies/compliance_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Hosts > Running hosts** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/policies/compliance_serverless_get.md b/openapi-specs/compute/32-06/desc/policies/compliance_serverless_get.md index c7de886c1..f559179f6 100755 --- a/openapi-specs/compute/32-06/desc/policies/compliance_serverless_get.md +++ b/openapi-specs/compute/32-06/desc/policies/compliance_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Functions > Functions** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/policies/compliance_vms_get.md b/openapi-specs/compute/32-06/desc/policies/compliance_vms_get.md index f7d7e1a49..b61d20d9d 100755 --- a/openapi-specs/compute/32-06/desc/policies/compliance_vms_get.md +++ b/openapi-specs/compute/32-06/desc/policies/compliance_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Hosts > VM ima The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/policies/compliance_vms_impacted_get.md b/openapi-specs/compute/32-06/desc/policies/compliance_vms_impacted_get.md index 9cf5b9d03..4ac3f2832 100644 --- a/openapi-specs/compute/32-06/desc/policies/compliance_vms_impacted_get.md +++ b/openapi-specs/compute/32-06/desc/policies/compliance_vms_impacted_get.md @@ -8,7 +8,7 @@ Use query parameters to retrieve the list of impacted resources by *account ID*, Refer to the following example cURL command, which retrieves a list of impacted resources: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/policies/docker_get.md b/openapi-specs/compute/32-06/desc/policies/docker_get.md index f56872c67..e8ab3d5bb 100644 --- a/openapi-specs/compute/32-06/desc/policies/docker_get.md +++ b/openapi-specs/compute/32-06/desc/policies/docker_get.md @@ -3,7 +3,7 @@ Retrieves a list of all access control rules for Docker Engine commands. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/policies/docker_put.md b/openapi-specs/compute/32-06/desc/policies/docker_put.md index 860e2bb1e..a5d0c0230 100644 --- a/openapi-specs/compute/32-06/desc/policies/docker_put.md +++ b/openapi-specs/compute/32-06/desc/policies/docker_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove Docker access control rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/docker \ | jq '.' > docker_access_control_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove Docker access control rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/32-06/desc/policies/firewall_app-embedded_get.md b/openapi-specs/compute/32-06/desc/policies/firewall_app-embedded_get.md index 3da2a7cd6..4e59c4c21 100644 --- a/openapi-specs/compute/32-06/desc/policies/firewall_app-embedded_get.md +++ b/openapi-specs/compute/32-06/desc/policies/firewall_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > App-Embedded** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/policies/firewall_app_container_get.md b/openapi-specs/compute/32-06/desc/policies/firewall_app_container_get.md index 3b8c157fa..f0486aa4c 100644 --- a/openapi-specs/compute/32-06/desc/policies/firewall_app_container_get.md +++ b/openapi-specs/compute/32-06/desc/policies/firewall_app_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Container** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/container' diff --git a/openapi-specs/compute/32-06/desc/policies/firewall_app_host_get.md b/openapi-specs/compute/32-06/desc/policies/firewall_app_host_get.md index adb90128a..75c22add4 100644 --- a/openapi-specs/compute/32-06/desc/policies/firewall_app_host_get.md +++ b/openapi-specs/compute/32-06/desc/policies/firewall_app_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Host** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/policies/firewall_app_network_list_get.md b/openapi-specs/compute/32-06/desc/policies/firewall_app_network_list_get.md index 13f7fb450..5a1f87d85 100644 --- a/openapi-specs/compute/32-06/desc/policies/firewall_app_network_list_get.md +++ b/openapi-specs/compute/32-06/desc/policies/firewall_app_network_list_get.md @@ -11,7 +11,7 @@ This endpoint maps to **Defend > WAAS > Network lists** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/network-list' diff --git a/openapi-specs/compute/32-06/desc/policies/firewall_app_out-of-band_get.md b/openapi-specs/compute/32-06/desc/policies/firewall_app_out-of-band_get.md index d4f72d041..9ae662687 100644 --- a/openapi-specs/compute/32-06/desc/policies/firewall_app_out-of-band_get.md +++ b/openapi-specs/compute/32-06/desc/policies/firewall_app_out-of-band_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/policies/firewall_app_out-of-band_impacted_get.md b/openapi-specs/compute/32-06/desc/policies/firewall_app_out-of-band_impacted_get.md index 25d2c6691..96a427f94 100644 --- a/openapi-specs/compute/32-06/desc/policies/firewall_app_out-of-band_impacted_get.md +++ b/openapi-specs/compute/32-06/desc/policies/firewall_app_out-of-band_impacted_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/policies/firewall_app_rasp_get.md b/openapi-specs/compute/32-06/desc/policies/firewall_app_rasp_get.md index 15d481cf3..a201d3beb 100644 --- a/openapi-specs/compute/32-06/desc/policies/firewall_app_rasp_get.md +++ b/openapi-specs/compute/32-06/desc/policies/firewall_app_rasp_get.md @@ -1,7 +1,7 @@ Retrieves a list of all application firewall (CNAF) rules for RASP. ``` -$ curl -k \ +$ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp ``` diff --git a/openapi-specs/compute/32-06/desc/policies/firewall_app_rasp_put.md b/openapi-specs/compute/32-06/desc/policies/firewall_app_rasp_put.md index 04ba86483..1101c7690 100644 --- a/openapi-specs/compute/32-06/desc/policies/firewall_app_rasp_put.md +++ b/openapi-specs/compute/32-06/desc/policies/firewall_app_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp \ | jq '.' > app_firewall_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/32-06/desc/policies/firewall_app_serverless_get.md b/openapi-specs/compute/32-06/desc/policies/firewall_app_serverless_get.md index d19e909f3..90cac0015 100644 --- a/openapi-specs/compute/32-06/desc/policies/firewall_app_serverless_get.md +++ b/openapi-specs/compute/32-06/desc/policies/firewall_app_serverless_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Serverless** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/serverless' diff --git a/openapi-specs/compute/32-06/desc/policies/firewall_network_container_get.md b/openapi-specs/compute/32-06/desc/policies/firewall_network_container_get.md index 3f1343b53..82e656818 100644 --- a/openapi-specs/compute/32-06/desc/policies/firewall_network_container_get.md +++ b/openapi-specs/compute/32-06/desc/policies/firewall_network_container_get.md @@ -4,7 +4,7 @@ Retrieves a list of all CNNS container and host rules. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/policies/firewall_network_container_put.md b/openapi-specs/compute/32-06/desc/policies/firewall_network_container_put.md index fd9263430..cffb3f1c4 100644 --- a/openapi-specs/compute/32-06/desc/policies/firewall_network_container_put.md +++ b/openapi-specs/compute/32-06/desc/policies/firewall_network_container_put.md @@ -9,7 +9,7 @@ The procedure to add, edit, or remove rules is: Refer to the following example cURL command that retrieves a list of all rules, pretty-print the JSON response, and save the results to a file: ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -26,7 +26,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/32-06/desc/policies/firewall_network_entities_get.md b/openapi-specs/compute/32-06/desc/policies/firewall_network_entities_get.md index 757121f70..28ed8dbcb 100644 --- a/openapi-specs/compute/32-06/desc/policies/firewall_network_entities_get.md +++ b/openapi-specs/compute/32-06/desc/policies/firewall_network_entities_get.md @@ -1,7 +1,7 @@ Retrieves a list of all CNNF network objects. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/policies/firewall_network_entities_put.md b/openapi-specs/compute/32-06/desc/policies/firewall_network_entities_put.md index 83c023286..39044ee10 100644 --- a/openapi-specs/compute/32-06/desc/policies/firewall_network_entities_put.md +++ b/openapi-specs/compute/32-06/desc/policies/firewall_network_entities_put.md @@ -3,7 +3,7 @@ Updates the list of CNNF network objects. The following example curl command updates the network objects. There is an example of all three types (images,subnets, and applications ): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-06/desc/policies/policies.md b/openapi-specs/compute/32-06/desc/policies/policies.md index 69768c03d..97be7b616 100644 --- a/openapi-specs/compute/32-06/desc/policies/policies.md +++ b/openapi-specs/compute/32-06/desc/policies/policies.md @@ -21,7 +21,7 @@ To add, edit, or remove vulnerability rules from a policy: For example, the following cURL command uses basic auth to retrieve a list of all image vulnerability rules, pretty-prints the JSON response, and saves the results to a `vulnerability_rules.json` file. ```bash - $ curl -k \ + $ curl \ -u \ https:///api/v1/policies/runtime/host \ | jq '.' > vulnerability_rules.json @@ -36,7 +36,7 @@ To add, edit, or remove vulnerability rules from a policy: **Note:** Remember to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -107,7 +107,7 @@ Use the `PUT` method to delete all rules by submitting an empty JSON object. For example, to delete all host runtime rules: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-06/desc/policies/runtime_app-embedded_get.md b/openapi-specs/compute/32-06/desc/policies/runtime_app-embedded_get.md index fcf0ba8b9..517b741bb 100755 --- a/openapi-specs/compute/32-06/desc/policies/runtime_app-embedded_get.md +++ b/openapi-specs/compute/32-06/desc/policies/runtime_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > App-Embedded policy** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/policies/runtime_container_get.md b/openapi-specs/compute/32-06/desc/policies/runtime_container_get.md index f1b50b727..65cd10660 100644 --- a/openapi-specs/compute/32-06/desc/policies/runtime_container_get.md +++ b/openapi-specs/compute/32-06/desc/policies/runtime_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Container policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/policies/runtime_container_impacted_get.md b/openapi-specs/compute/32-06/desc/policies/runtime_container_impacted_get.md index 195f75547..e026d33b9 100644 --- a/openapi-specs/compute/32-06/desc/policies/runtime_container_impacted_get.md +++ b/openapi-specs/compute/32-06/desc/policies/runtime_container_impacted_get.md @@ -6,7 +6,7 @@ In the Console UI, you can see how it works by going to the **Defend > Runtime > Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ $ curl -k \ For additional help with your `ruleName`: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/policies/runtime_host_get.md b/openapi-specs/compute/32-06/desc/policies/runtime_host_get.md index 38800596c..559ef690a 100644 --- a/openapi-specs/compute/32-06/desc/policies/runtime_host_get.md +++ b/openapi-specs/compute/32-06/desc/policies/runtime_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Host policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/policies/runtime_rasp_get.md b/openapi-specs/compute/32-06/desc/policies/runtime_rasp_get.md index 5b7a76457..55a6ff05b 100644 --- a/openapi-specs/compute/32-06/desc/policies/runtime_rasp_get.md +++ b/openapi-specs/compute/32-06/desc/policies/runtime_rasp_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your RASP runtime policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/policies/runtime_rasp_put.md b/openapi-specs/compute/32-06/desc/policies/runtime_rasp_put.md index bba60ba81..f71fb4b93 100644 --- a/openapi-specs/compute/32-06/desc/policies/runtime_rasp_put.md +++ b/openapi-specs/compute/32-06/desc/policies/runtime_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve the rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET @@ -24,7 +24,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -H "Content-Type:application/json" \ -X PUT \ diff --git a/openapi-specs/compute/32-06/desc/policies/runtime_serverless_get.md b/openapi-specs/compute/32-06/desc/policies/runtime_serverless_get.md index 44326bbf6..c98489e16 100644 --- a/openapi-specs/compute/32-06/desc/policies/runtime_serverless_get.md +++ b/openapi-specs/compute/32-06/desc/policies/runtime_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Serverless policy** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/policies/secrets_get.md b/openapi-specs/compute/32-06/desc/policies/secrets_get.md index 89e6b9c0e..cb4ecb37c 100644 --- a/openapi-specs/compute/32-06/desc/policies/secrets_get.md +++ b/openapi-specs/compute/32-06/desc/policies/secrets_get.md @@ -3,7 +3,7 @@ Retrieves a list of all secrets rules. The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/policies/secrets diff --git a/openapi-specs/compute/32-06/desc/policies/secrets_put.md b/openapi-specs/compute/32-06/desc/policies/secrets_put.md index 1e8877ca1..04fd41f24 100644 --- a/openapi-specs/compute/32-06/desc/policies/secrets_put.md +++ b/openapi-specs/compute/32-06/desc/policies/secrets_put.md @@ -10,7 +10,7 @@ The procedure to add, edit, or remove secrets rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/secrets \ | jq '.' > secrets_rules.json @@ -24,7 +24,7 @@ The procedure to add, edit, or remove secrets rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/32-06/desc/policies/trust_get.md b/openapi-specs/compute/32-06/desc/policies/trust_get.md index 8de1ba409..0805d6777 100644 --- a/openapi-specs/compute/32-06/desc/policies/trust_get.md +++ b/openapi-specs/compute/32-06/desc/policies/trust_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/policies/trust_put.md b/openapi-specs/compute/32-06/desc/policies/trust_put.md index fccd4b91e..7fec72031 100644 --- a/openapi-specs/compute/32-06/desc/policies/trust_put.md +++ b/openapi-specs/compute/32-06/desc/policies/trust_put.md @@ -1,7 +1,7 @@ Updates the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-06/desc/policies/vulnerability_ci_images_get.md b/openapi-specs/compute/32-06/desc/policies/vulnerability_ci_images_get.md index abc3da8fa..ce0d50a29 100644 --- a/openapi-specs/compute/32-06/desc/policies/vulnerability_ci_images_get.md +++ b/openapi-specs/compute/32-06/desc/policies/vulnerability_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/policies/vulnerability_ci_serverless_get.md b/openapi-specs/compute/32-06/desc/policies/vulnerability_ci_serverless_get.md index 958c86495..6fb5f93ce 100644 --- a/openapi-specs/compute/32-06/desc/policies/vulnerability_ci_serverless_get.md +++ b/openapi-specs/compute/32-06/desc/policies/vulnerability_ci_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/policies/vulnerability_coderepos_get.md b/openapi-specs/compute/32-06/desc/policies/vulnerability_coderepos_get.md index 08dfed8e1..a4ac62f33 100644 --- a/openapi-specs/compute/32-06/desc/policies/vulnerability_coderepos_get.md +++ b/openapi-specs/compute/32-06/desc/policies/vulnerability_coderepos_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Code repositories** in the Co Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/vulnerability/coderepos' diff --git a/openapi-specs/compute/32-06/desc/policies/vulnerability_coderepos_impacted_get.md b/openapi-specs/compute/32-06/desc/policies/vulnerability_coderepos_impacted_get.md index a401a12c4..e64ef768e 100644 --- a/openapi-specs/compute/32-06/desc/policies/vulnerability_coderepos_impacted_get.md +++ b/openapi-specs/compute/32-06/desc/policies/vulnerability_coderepos_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/coderepos/impacted?project=&ruleName=' ``` diff --git a/openapi-specs/compute/32-06/desc/policies/vulnerability_coderepos_put.md b/openapi-specs/compute/32-06/desc/policies/vulnerability_coderepos_put.md index 514eec136..a002415b9 100644 --- a/openapi-specs/compute/32-06/desc/policies/vulnerability_coderepos_put.md +++ b/openapi-specs/compute/32-06/desc/policies/vulnerability_coderepos_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Code repo Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT 'https:///api/v/policies/vulnerability/coderepos' \ diff --git a/openapi-specs/compute/32-06/desc/policies/vulnerability_host_get.md b/openapi-specs/compute/32-06/desc/policies/vulnerability_host_get.md index 3b9b14b9c..260da7675 100644 --- a/openapi-specs/compute/32-06/desc/policies/vulnerability_host_get.md +++ b/openapi-specs/compute/32-06/desc/policies/vulnerability_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Hosts > Running hosts** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/policies/vulnerability_host_impacted_get.md b/openapi-specs/compute/32-06/desc/policies/vulnerability_host_impacted_get.md index 346368518..f44592830 100644 --- a/openapi-specs/compute/32-06/desc/policies/vulnerability_host_impacted_get.md +++ b/openapi-specs/compute/32-06/desc/policies/vulnerability_host_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by `RULE_NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/host/impacted?project={PROJECT_NAME}&ruleName={RULE_NAME}' ``` diff --git a/openapi-specs/compute/32-06/desc/policies/vulnerability_images_get.md b/openapi-specs/compute/32-06/desc/policies/vulnerability_images_get.md index 33581be37..57359bb8f 100644 --- a/openapi-specs/compute/32-06/desc/policies/vulnerability_images_get.md +++ b/openapi-specs/compute/32-06/desc/policies/vulnerability_images_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images?project=" diff --git a/openapi-specs/compute/32-06/desc/policies/vulnerability_images_impacted_get.md b/openapi-specs/compute/32-06/desc/policies/vulnerability_images_impacted_get.md index ae1d5e396..e2a4efa23 100644 --- a/openapi-specs/compute/32-06/desc/policies/vulnerability_images_impacted_get.md +++ b/openapi-specs/compute/32-06/desc/policies/vulnerability_images_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of images caught by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images/impacted?project=&ruleName=" diff --git a/openapi-specs/compute/32-06/desc/policies/vulnerability_images_put.md b/openapi-specs/compute/32-06/desc/policies/vulnerability_images_put.md index b3330dab7..8c3cc8af2 100644 --- a/openapi-specs/compute/32-06/desc/policies/vulnerability_images_put.md +++ b/openapi-specs/compute/32-06/desc/policies/vulnerability_images_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -X PUT 'https:///api/v/policies/vulnerability/images' \ --data '{ diff --git a/openapi-specs/compute/32-06/desc/policies/vulnerability_serverless_get.md b/openapi-specs/compute/32-06/desc/policies/vulnerability_serverless_get.md index c7a8e2ef5..41c7e75d8 100644 --- a/openapi-specs/compute/32-06/desc/policies/vulnerability_serverless_get.md +++ b/openapi-specs/compute/32-06/desc/policies/vulnerability_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Functions** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/policies/vulnerability_serverless_put.md b/openapi-specs/compute/32-06/desc/policies/vulnerability_serverless_put.md index 2b567b5b1..5199f0997 100644 --- a/openapi-specs/compute/32-06/desc/policies/vulnerability_serverless_put.md +++ b/openapi-specs/compute/32-06/desc/policies/vulnerability_serverless_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k 'https:///api/v/policies/vulnerability/serverless' \ +$ curl 'https:///api/v/policies/vulnerability/serverless' \ -X PUT \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-06/desc/policies/vulnerability_vms_get.md b/openapi-specs/compute/32-06/desc/policies/vulnerability_vms_get.md index 117d2cc4a..e37c1520f 100644 --- a/openapi-specs/compute/32-06/desc/policies/vulnerability_vms_get.md +++ b/openapi-specs/compute/32-06/desc/policies/vulnerability_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Hosts > V The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/policies/vulnerability_vms_impacted_get.md b/openapi-specs/compute/32-06/desc/policies/vulnerability_vms_impacted_get.md index 29d9621ea..f1a7f7ef5 100644 --- a/openapi-specs/compute/32-06/desc/policies/vulnerability_vms_impacted_get.md +++ b/openapi-specs/compute/32-06/desc/policies/vulnerability_vms_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/vms?project=&ruleName=' ``` diff --git a/openapi-specs/compute/32-06/desc/profiles/app-embedded_download_get.md b/openapi-specs/compute/32-06/desc/profiles/app-embedded_download_get.md index 4b3f7ff8a..2e8cac56d 100644 --- a/openapi-specs/compute/32-06/desc/profiles/app-embedded_download_get.md +++ b/openapi-specs/compute/32-06/desc/profiles/app-embedded_download_get.md @@ -5,7 +5,7 @@ Downloads the app-embedded observations in a CSV format. Refer to the following example cURL command that downloads all the app-embedded runtime profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/profiles/app-embedded_get.md b/openapi-specs/compute/32-06/desc/profiles/app-embedded_get.md index f3ddb3125..c332061e5 100644 --- a/openapi-specs/compute/32-06/desc/profiles/app-embedded_get.md +++ b/openapi-specs/compute/32-06/desc/profiles/app-embedded_get.md @@ -5,7 +5,7 @@ Retrieves the app-embedded observations. Refer to the following example cURL command that lists all the app-embedded runtime: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/profiles/container_download_get.md b/openapi-specs/compute/32-06/desc/profiles/container_download_get.md index ad7a86101..ee9d5e9e4 100644 --- a/openapi-specs/compute/32-06/desc/profiles/container_download_get.md +++ b/openapi-specs/compute/32-06/desc/profiles/container_download_get.md @@ -6,7 +6,7 @@ Retrieves the details and state of all runtime models in CSV format. Refer to the following example cURL command that downloads a complete list in CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/profiles/container_filters_get.md b/openapi-specs/compute/32-06/desc/profiles/container_filters_get.md index 8b6122b80..13535b520 100644 --- a/openapi-specs/compute/32-06/desc/profiles/container_filters_get.md +++ b/openapi-specs/compute/32-06/desc/profiles/container_filters_get.md @@ -4,7 +4,7 @@ Returns a list of os and images from page monitor/runtime/container-models in Co Example curl command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/profiles/container_get.md b/openapi-specs/compute/32-06/desc/profiles/container_get.md index cdbc24c3e..59a3764fb 100644 --- a/openapi-specs/compute/32-06/desc/profiles/container_get.md +++ b/openapi-specs/compute/32-06/desc/profiles/container_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of all runtime models. Refer to the following example cURL command that lists all runtime models in a system: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/profiles/container_learn_post.md b/openapi-specs/compute/32-06/desc/profiles/container_learn_post.md index 5fef2e31e..2c1d08af1 100644 --- a/openapi-specs/compute/32-06/desc/profiles/container_learn_post.md +++ b/openapi-specs/compute/32-06/desc/profiles/container_learn_post.md @@ -7,7 +7,7 @@ For more information, refer to [Learning mode](https://docs.prismacloud.io/en/cl Refer to the following example cURL command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/profiles/host_download_get.md b/openapi-specs/compute/32-06/desc/profiles/host_download_get.md index ace270a32..2dfb51ec0 100644 --- a/openapi-specs/compute/32-06/desc/profiles/host_download_get.md +++ b/openapi-specs/compute/32-06/desc/profiles/host_download_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of each host service runtime model in CSV format Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/profiles/host_get.md b/openapi-specs/compute/32-06/desc/profiles/host_get.md index 208a24de3..55d8bf8ff 100644 --- a/openapi-specs/compute/32-06/desc/profiles/host_get.md +++ b/openapi-specs/compute/32-06/desc/profiles/host_get.md @@ -15,7 +15,7 @@ The returned JSON object has the following structure: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/profiles/host_id_rule_get.md b/openapi-specs/compute/32-06/desc/profiles/host_id_rule_get.md index 672cb4c62..8be668fca 100644 --- a/openapi-specs/compute/32-06/desc/profiles/host_id_rule_get.md +++ b/openapi-specs/compute/32-06/desc/profiles/host_id_rule_get.md @@ -10,7 +10,7 @@ This is the `PROFILE_ID`. The following example command uses curl and basic auth to specify the learning mode for a profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/profiles/service_download_get.md b/openapi-specs/compute/32-06/desc/profiles/service_download_get.md index 63dff3354..4c1c431c1 100644 --- a/openapi-specs/compute/32-06/desc/profiles/service_download_get.md +++ b/openapi-specs/compute/32-06/desc/profiles/service_download_get.md @@ -1,7 +1,7 @@ Retrieves the details and state of all host service runtime models in CSV format ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/profiles/service_get.md b/openapi-specs/compute/32-06/desc/profiles/service_get.md index a4f8c348d..5d786d919 100644 --- a/openapi-specs/compute/32-06/desc/profiles/service_get.md +++ b/openapi-specs/compute/32-06/desc/profiles/service_get.md @@ -10,7 +10,7 @@ The returned JSON object has the following structure: Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/profiles/service_id_learn_post.md b/openapi-specs/compute/32-06/desc/profiles/service_id_learn_post.md index fb338b80d..fa85fc3a2 100644 --- a/openapi-specs/compute/32-06/desc/profiles/service_id_learn_post.md +++ b/openapi-specs/compute/32-06/desc/profiles/service_id_learn_post.md @@ -11,7 +11,7 @@ The `PROFILE_ID` is typically the service's name, such as `sshd` or `ntpd`. The following example command uses curl and basic auth to specify the learning mode for a host service profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/profiles/service_learn_post.md b/openapi-specs/compute/32-06/desc/profiles/service_learn_post.md index 02a1f299e..ceff8e5a5 100644 --- a/openapi-specs/compute/32-06/desc/profiles/service_learn_post.md +++ b/openapi-specs/compute/32-06/desc/profiles/service_learn_post.md @@ -3,7 +3,7 @@ Specify the learning mode for all host service profiles. The following example command uses curl and basic auth to specify the learning mode for all host service profiles. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/profiles/service_names_get.md b/openapi-specs/compute/32-06/desc/profiles/service_names_get.md index 7da863545..afae56f0d 100644 --- a/openapi-specs/compute/32-06/desc/profiles/service_names_get.md +++ b/openapi-specs/compute/32-06/desc/profiles/service_names_get.md @@ -3,7 +3,7 @@ Retrieves the name of all host service runtime models from within the app at **M The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/projects/get.md b/openapi-specs/compute/32-06/desc/projects/get.md index 05485c24c..1ac04d2c0 100644 --- a/openapi-specs/compute/32-06/desc/projects/get.md +++ b/openapi-specs/compute/32-06/desc/projects/get.md @@ -3,7 +3,7 @@ Lists all projects visible to the given user. Assuming the given user is an admin, the following example curl command would list all projects: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/projects/name_delete.md b/openapi-specs/compute/32-06/desc/projects/name_delete.md index fba889f7e..0a34e72a2 100644 --- a/openapi-specs/compute/32-06/desc/projects/name_delete.md +++ b/openapi-specs/compute/32-06/desc/projects/name_delete.md @@ -6,7 +6,7 @@ The value for `` can be retrieved from the `_id` field in the resp The DELETE method returns the decommissioned supervisor's admin username and password. ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/compute/32-06/desc/projects/name_put.md b/openapi-specs/compute/32-06/desc/projects/name_put.md index b5a83a67d..1bde9b0c7 100644 --- a/openapi-specs/compute/32-06/desc/projects/name_put.md +++ b/openapi-specs/compute/32-06/desc/projects/name_put.md @@ -4,7 +4,7 @@ The following example curl command updates a project named ``. The value for `` can be retrieved from the `_id` field in the response object from `GET /api/v1/projects`. ```bash -$ curl -k \ +$ curl \ -u \ -X PUT \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/compute/32-06/desc/projects/post.md b/openapi-specs/compute/32-06/desc/projects/post.md index 8862c0fd4..38c574173 100644 --- a/openapi-specs/compute/32-06/desc/projects/post.md +++ b/openapi-specs/compute/32-06/desc/projects/post.md @@ -3,7 +3,7 @@ Provisions a new project. The following example curl command provisions a new project named `my-project`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ $ curl -k \ If you have installed a new instance of Console, and you have already created an initial admin user for it, then you can specify the admin username name and password when you provision the project. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/projects/projects.md b/openapi-specs/compute/32-06/desc/projects/projects.md index 7e7dcff66..19c904e9e 100644 --- a/openapi-specs/compute/32-06/desc/projects/projects.md +++ b/openapi-specs/compute/32-06/desc/projects/projects.md @@ -20,7 +20,7 @@ If `project` is not specified, it is set to `Central+Console`. For example, to retrieve the compliance policies for a tenant project named `mobile_payments_division`, use the following curl command: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/radar/container_clean_post.md b/openapi-specs/compute/32-06/desc/radar/container_clean_post.md index 662b6d53f..d4f87e91e 100644 --- a/openapi-specs/compute/32-06/desc/radar/container_clean_post.md +++ b/openapi-specs/compute/32-06/desc/radar/container_clean_post.md @@ -1,7 +1,7 @@ Cleans the container runtime profiles and Radar entities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/radar/container_delete.md b/openapi-specs/compute/32-06/desc/radar/container_delete.md index 4eabe337f..b6cc69cf2 100644 --- a/openapi-specs/compute/32-06/desc/radar/container_delete.md +++ b/openapi-specs/compute/32-06/desc/radar/container_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-06/desc/radar/container_export_get.md b/openapi-specs/compute/32-06/desc/radar/container_export_get.md index 7f577568f..f776c7e6c 100644 --- a/openapi-specs/compute/32-06/desc/radar/container_export_get.md +++ b/openapi-specs/compute/32-06/desc/radar/container_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for containers) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/radar/container_filters_get.md b/openapi-specs/compute/32-06/desc/radar/container_filters_get.md index f66463da1..8d7cd6df3 100644 --- a/openapi-specs/compute/32-06/desc/radar/container_filters_get.md +++ b/openapi-specs/compute/32-06/desc/radar/container_filters_get.md @@ -1,7 +1,7 @@ Returns the namespaces from the container view on the Radar page. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/radar/container_get.md b/openapi-specs/compute/32-06/desc/radar/container_get.md index 280d683d9..404629a25 100644 --- a/openapi-specs/compute/32-06/desc/radar/container_get.md +++ b/openapi-specs/compute/32-06/desc/radar/container_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (container view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/radar/host_delete.md b/openapi-specs/compute/32-06/desc/radar/host_delete.md index 738fa7a7c..b4910a8b7 100644 --- a/openapi-specs/compute/32-06/desc/radar/host_delete.md +++ b/openapi-specs/compute/32-06/desc/radar/host_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two apps in CNNF for hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-06/desc/radar/host_export_get.md b/openapi-specs/compute/32-06/desc/radar/host_export_get.md index dd91b5335..851d6f40f 100644 --- a/openapi-specs/compute/32-06/desc/radar/host_export_get.md +++ b/openapi-specs/compute/32-06/desc/radar/host_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for hosts) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/radar/host_get.md b/openapi-specs/compute/32-06/desc/radar/host_get.md index a12025856..222d075aa 100644 --- a/openapi-specs/compute/32-06/desc/radar/host_get.md +++ b/openapi-specs/compute/32-06/desc/radar/host_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (host view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/radar/serverless_get.md b/openapi-specs/compute/32-06/desc/radar/serverless_get.md index b2f329149..170cfb48d 100644 --- a/openapi-specs/compute/32-06/desc/radar/serverless_get.md +++ b/openapi-specs/compute/32-06/desc/radar/serverless_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/radar/serverless_progress_get.md b/openapi-specs/compute/32-06/desc/radar/serverless_progress_get.md index a11c1ae20..0808dfbf4 100644 --- a/openapi-specs/compute/32-06/desc/radar/serverless_progress_get.md +++ b/openapi-specs/compute/32-06/desc/radar/serverless_progress_get.md @@ -1,7 +1,7 @@ Returns the scan progress from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/radar/serverless_scan_post.md b/openapi-specs/compute/32-06/desc/radar/serverless_scan_post.md index 0d519ba88..2d444ac88 100644 --- a/openapi-specs/compute/32-06/desc/radar/serverless_scan_post.md +++ b/openapi-specs/compute/32-06/desc/radar/serverless_scan_post.md @@ -1,7 +1,7 @@ Initiates a serverless scan of your environments. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/radar/serverless_stop_post.md b/openapi-specs/compute/32-06/desc/radar/serverless_stop_post.md index 5c0bdf186..f15bef34d 100644 --- a/openapi-specs/compute/32-06/desc/radar/serverless_stop_post.md +++ b/openapi-specs/compute/32-06/desc/radar/serverless_stop_post.md @@ -1,7 +1,7 @@ Stops an in-progress serverless scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/rbac/role_delete.md b/openapi-specs/compute/32-06/desc/rbac/role_delete.md index 87015b6e8..46efcf9c9 100644 --- a/openapi-specs/compute/32-06/desc/rbac/role_delete.md +++ b/openapi-specs/compute/32-06/desc/rbac/role_delete.md @@ -4,7 +4,7 @@ System roles and roles assigned to users/groups cannot be deleted. The following example curl command uses basic auth to delete role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-06/desc/rbac/roles_get.md b/openapi-specs/compute/32-06/desc/rbac/roles_get.md index 4cd1d9bc7..112026937 100644 --- a/openapi-specs/compute/32-06/desc/rbac/roles_get.md +++ b/openapi-specs/compute/32-06/desc/rbac/roles_get.md @@ -3,7 +3,7 @@ This endpoint will return a list in JSON format of the roles can be found under The following example curl command uses basic auth to return: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/rbac/roles_post.md b/openapi-specs/compute/32-06/desc/rbac/roles_post.md index 1f20772ce..6988766e8 100644 --- a/openapi-specs/compute/32-06/desc/rbac/roles_post.md +++ b/openapi-specs/compute/32-06/desc/rbac/roles_post.md @@ -37,7 +37,7 @@ The added role must contain the "user" permission with read-write access. This p The following example curl command uses basic auth to create the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/rbac/roles_put.md b/openapi-specs/compute/32-06/desc/rbac/roles_put.md index 34d7b41a7..f62e34ccb 100644 --- a/openapi-specs/compute/32-06/desc/rbac/roles_put.md +++ b/openapi-specs/compute/32-06/desc/rbac/roles_put.md @@ -38,7 +38,7 @@ The updated role must contain the "user" permission with read-write access. This The following example curl command uses basic auth to update the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-06/desc/recovery/backup_get.md b/openapi-specs/compute/32-06/desc/recovery/backup_get.md index 4da46f356..bf735905a 100644 --- a/openapi-specs/compute/32-06/desc/recovery/backup_get.md +++ b/openapi-specs/compute/32-06/desc/recovery/backup_get.md @@ -3,7 +3,7 @@ Returns a list of available backups. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/recovery/backup_id_delete.md b/openapi-specs/compute/32-06/desc/recovery/backup_id_delete.md index ae9c33e90..80cd4c3f6 100644 --- a/openapi-specs/compute/32-06/desc/recovery/backup_id_delete.md +++ b/openapi-specs/compute/32-06/desc/recovery/backup_id_delete.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-06/desc/recovery/backup_id_patch.md b/openapi-specs/compute/32-06/desc/recovery/backup_id_patch.md index 4a78cd67d..b3699972f 100644 --- a/openapi-specs/compute/32-06/desc/recovery/backup_id_patch.md +++ b/openapi-specs/compute/32-06/desc/recovery/backup_id_patch.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/compute/32-06/desc/recovery/backup_post.md b/openapi-specs/compute/32-06/desc/recovery/backup_post.md index f45161712..41436fe5f 100644 --- a/openapi-specs/compute/32-06/desc/recovery/backup_post.md +++ b/openapi-specs/compute/32-06/desc/recovery/backup_post.md @@ -3,7 +3,7 @@ Creates a backup named `backup_name` by invoking the MongoDB dump process. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/recovery/restore_id_post.md b/openapi-specs/compute/32-06/desc/recovery/restore_id_post.md index 850fceeaa..e424641cc 100644 --- a/openapi-specs/compute/32-06/desc/recovery/restore_id_post.md +++ b/openapi-specs/compute/32-06/desc/recovery/restore_id_post.md @@ -5,7 +5,7 @@ Restores Prisma Cloud Compute from the given backup. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/registry/download_get.md b/openapi-specs/compute/32-06/desc/registry/download_get.md index 5a3eb0141..3eef8d50e 100644 --- a/openapi-specs/compute/32-06/desc/registry/download_get.md +++ b/openapi-specs/compute/32-06/desc/registry/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Compliance > Images > Reg Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/registry/get.md b/openapi-specs/compute/32-06/desc/registry/get.md index 96b46382e..7474b119a 100644 --- a/openapi-specs/compute/32-06/desc/registry/get.md +++ b/openapi-specs/compute/32-06/desc/registry/get.md @@ -20,7 +20,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that retrieves a scan report for all images in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -32,7 +32,7 @@ The compact query can be used to get a general overview of the number of Vulnera Refer to the following cURL command that retrieves a compact scan report for the Ubuntu image in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -43,7 +43,7 @@ The name query is synonymous with the filter registry text field in the Console Refer to the following cURL that retrieves the scan report for the image in the registry with the matching **sha256** hash: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -53,7 +53,7 @@ $ curl -k \ Refer to the following cURL command that retrieves the images in the first 10 registries: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/registry/get_registry_progress.md b/openapi-specs/compute/32-06/desc/registry/get_registry_progress.md index 03c5d0896..c08331d5b 100644 --- a/openapi-specs/compute/32-06/desc/registry/get_registry_progress.md +++ b/openapi-specs/compute/32-06/desc/registry/get_registry_progress.md @@ -9,7 +9,7 @@ For a regular scan, use the API path only without any query parameters. Refer to the following example cURL request that retrieves the ongoing scan details for a regular registry scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -63,7 +63,7 @@ For an on-demand scan that is started using the `/registry/scan` endpoint with t Refer to the following example cURL request that retrieves the ongoing scan details for an on-demand registry scan that is started using the `/registry/scan` endpoint for the repository `alpine` with tag `3.16`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/registry/names_get.md b/openapi-specs/compute/32-06/desc/registry/names_get.md index 1e5bed727..f3b8676a8 100644 --- a/openapi-specs/compute/32-06/desc/registry/names_get.md +++ b/openapi-specs/compute/32-06/desc/registry/names_get.md @@ -5,7 +5,7 @@ Retrieves a list of image names from current scanned registry images. The base ` Refer to the following example cURL command that retrieves a list of image names from your scanned registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/registry/scan_post.md b/openapi-specs/compute/32-06/desc/registry/scan_post.md index ce7e19533..96bfd5f16 100644 --- a/openapi-specs/compute/32-06/desc/registry/scan_post.md +++ b/openapi-specs/compute/32-06/desc/registry/scan_post.md @@ -17,7 +17,7 @@ For information on scan result, see [Get Registry Scan Report](https://prisma.pa Refer to the following example cURL command that forces Prisma Cloud Compute to rescan all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -27,7 +27,7 @@ $ curl -k \ Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan a specific image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -52,7 +52,7 @@ For information on scan result, see [Get Registry Scan Report](https://pan.dev/p Refer to the following example cURL command to trigger an on-demand scan for an image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/registry/stop_post.md b/openapi-specs/compute/32-06/desc/registry/stop_post.md index 29e103ac1..05ac2f436 100644 --- a/openapi-specs/compute/32-06/desc/registry/stop_post.md +++ b/openapi-specs/compute/32-06/desc/registry/stop_post.md @@ -5,7 +5,7 @@ Stops current registry scan immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to stop scanning all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/scans/download_get.md b/openapi-specs/compute/32-06/desc/scans/download_get.md index 61a0ccc2d..3785bf562 100644 --- a/openapi-specs/compute/32-06/desc/scans/download_get.md +++ b/openapi-specs/compute/32-06/desc/scans/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Images The following cURL command retrieves and saves your Jenkins and twistcli scan reports to a CSV file called `scans_report.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/scans/filter_get.md b/openapi-specs/compute/32-06/desc/scans/filter_get.md index 58550ad35..df3e9cdb0 100644 --- a/openapi-specs/compute/32-06/desc/scans/filter_get.md +++ b/openapi-specs/compute/32-06/desc/scans/filter_get.md @@ -3,7 +3,7 @@ Retrieves the list of Jenkins projects that have been scanned by the Jenkins plu The following example curl command uses basic auth to retrieve the list of Jenkins project names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/scans/get.md b/openapi-specs/compute/32-06/desc/scans/get.md index 9bc06317f..775d9934f 100644 --- a/openapi-specs/compute/32-06/desc/scans/get.md +++ b/openapi-specs/compute/32-06/desc/scans/get.md @@ -10,7 +10,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command that retrieves the scan reports for all images scanned using the Jenkins CI plugin or the twistcli tool: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -22,7 +22,7 @@ To get the report of a specific scan, add query parameters to narrow the scope o The following cURL command retrieves the scan report for an image with a SHA256 ID of `sha256:f756e84300d8e53006090573dd33abe5b8cfac3e42d104fc4be37f435fe512f3`. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/scans/id_get.md b/openapi-specs/compute/32-06/desc/scans/id_get.md index 7a342ef60..1557b1905 100644 --- a/openapi-specs/compute/32-06/desc/scans/id_get.md +++ b/openapi-specs/compute/32-06/desc/scans/id_get.md @@ -3,7 +3,7 @@ Retrieves all scan reports for images scanned by the Jenkins plugin or twistcli The following example curl command uses basic auth to retrieve the scan report for just an image with a SHA256 ID of `5c3385fd2e76c5c16124c077`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/scripts/console_sh_get.md b/openapi-specs/compute/32-06/desc/scripts/console_sh_get.md index d8f02038f..1622321ca 100644 --- a/openapi-specs/compute/32-06/desc/scripts/console_sh_get.md +++ b/openapi-specs/compute/32-06/desc/scripts/console_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/scripts/defender_ps1_get.md b/openapi-specs/compute/32-06/desc/scripts/defender_ps1_get.md index a47616983..45e4a6133 100644 --- a/openapi-specs/compute/32-06/desc/scripts/defender_ps1_get.md +++ b/openapi-specs/compute/32-06/desc/scripts/defender_ps1_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/scripts/defender_sh_get.md b/openapi-specs/compute/32-06/desc/scripts/defender_sh_get.md index 98ad6cf62..a8a302426 100644 --- a/openapi-specs/compute/32-06/desc/scripts/defender_sh_get.md +++ b/openapi-specs/compute/32-06/desc/scripts/defender_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/serverless/download_get.md b/openapi-specs/compute/32-06/desc/serverless/download_get.md index a8e49ff25..4d7d3adc1 100644 --- a/openapi-specs/compute/32-06/desc/serverless/download_get.md +++ b/openapi-specs/compute/32-06/desc/serverless/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Functio The following cURL command retrieves a list of all serverless resources monitored by Prisma Cloud Compute and saves the results in a CSV file called `serverless.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/serverless/download' \ diff --git a/openapi-specs/compute/32-06/desc/serverless/embed_post.md b/openapi-specs/compute/32-06/desc/serverless/embed_post.md index 6cce784b8..353b5721c 100644 --- a/openapi-specs/compute/32-06/desc/serverless/embed_post.md +++ b/openapi-specs/compute/32-06/desc/serverless/embed_post.md @@ -1,7 +1,7 @@ The following curl command uses basic auth to retrieve a list of all Serverless resources that monitored by Prisma Cloud Compute, and save the results to a CSV file: ```bash -$ curl -k \ +$ curl \ -X POST \ -H "Content-Type: application/octet-stream" \ -u \ diff --git a/openapi-specs/compute/32-06/desc/serverless/get.md b/openapi-specs/compute/32-06/desc/serverless/get.md index 77a0d8a4e..c6c75c480 100644 --- a/openapi-specs/compute/32-06/desc/serverless/get.md +++ b/openapi-specs/compute/32-06/desc/serverless/get.md @@ -10,7 +10,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Functions > Scanned function Refer to the following example cURL command that retrieves the scan reports for serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/serverless/names_get.md b/openapi-specs/compute/32-06/desc/serverless/names_get.md index 62cbcd53b..ab229e0f8 100644 --- a/openapi-specs/compute/32-06/desc/serverless/names_get.md +++ b/openapi-specs/compute/32-06/desc/serverless/names_get.md @@ -1,7 +1,7 @@ The following curl command uses basic auth to retrieve a list of names of all Serverless resources monitored by Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -X GET \ -H "Content-Type: application/json" \ -u \ diff --git a/openapi-specs/compute/32-06/desc/serverless/scan_post.md b/openapi-specs/compute/32-06/desc/serverless/scan_post.md index 159285349..70a3a3b4e 100644 --- a/openapi-specs/compute/32-06/desc/serverless/scan_post.md +++ b/openapi-specs/compute/32-06/desc/serverless/scan_post.md @@ -5,7 +5,7 @@ Re-scan all serverless functions immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/scan diff --git a/openapi-specs/compute/32-06/desc/serverless/stop_post.md b/openapi-specs/compute/32-06/desc/serverless/stop_post.md index 763710842..67c0d2239 100644 --- a/openapi-specs/compute/32-06/desc/serverless/stop_post.md +++ b/openapi-specs/compute/32-06/desc/serverless/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing serverless scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/stop diff --git a/openapi-specs/compute/32-06/desc/settings/alerts_get.md b/openapi-specs/compute/32-06/desc/settings/alerts_get.md index 060114c39..2b25dc6c9 100644 --- a/openapi-specs/compute/32-06/desc/settings/alerts_get.md +++ b/openapi-specs/compute/32-06/desc/settings/alerts_get.md @@ -1,7 +1,7 @@ Retrieves a list of your alert settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/settings/alerts_options_get.md b/openapi-specs/compute/32-06/desc/settings/alerts_options_get.md index 095c1f1b7..aa7a1d250 100644 --- a/openapi-specs/compute/32-06/desc/settings/alerts_options_get.md +++ b/openapi-specs/compute/32-06/desc/settings/alerts_options_get.md @@ -3,7 +3,7 @@ This endpoint will return the alert profile configuration options that can be fo The following example curl command uses basic auth to retrieve all alert profile configuration options: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/settings/alerts_post.md b/openapi-specs/compute/32-06/desc/settings/alerts_post.md index 3acb8d543..cd303f880 100644 --- a/openapi-specs/compute/32-06/desc/settings/alerts_post.md +++ b/openapi-specs/compute/32-06/desc/settings/alerts_post.md @@ -3,7 +3,7 @@ Configure alerts. The following example curl command sets the aggregation period for alerts to one hour. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/settings/certificates_post.md b/openapi-specs/compute/32-06/desc/settings/certificates_post.md index fbdc8a5a9..bd30ea399 100644 --- a/openapi-specs/compute/32-06/desc/settings/certificates_post.md +++ b/openapi-specs/compute/32-06/desc/settings/certificates_post.md @@ -9,7 +9,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to set the validity period for client certificates to seven days: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/32-06/desc/settings/certs_get.md b/openapi-specs/compute/32-06/desc/settings/certs_get.md index ba6674a3c..dbf1d3790 100644 --- a/openapi-specs/compute/32-06/desc/settings/certs_get.md +++ b/openapi-specs/compute/32-06/desc/settings/certs_get.md @@ -6,7 +6,7 @@ Defenders use these names to connect to Console. Refer to the following example cURL request that uses basic auth to retrieve the SANs in Console's cert: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/settings/certs_post.md b/openapi-specs/compute/32-06/desc/settings/certs_post.md index a6e429006..fb2cedee5 100644 --- a/openapi-specs/compute/32-06/desc/settings/certs_post.md +++ b/openapi-specs/compute/32-06/desc/settings/certs_post.md @@ -12,7 +12,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to add `node-01.example.com` to the `subjectAltName` field in the certificate: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/32-06/desc/settings/coderepos_get.md b/openapi-specs/compute/32-06/desc/settings/coderepos_get.md index 6cbfb78cb..286a8d905 100644 --- a/openapi-specs/compute/32-06/desc/settings/coderepos_get.md +++ b/openapi-specs/compute/32-06/desc/settings/coderepos_get.md @@ -20,7 +20,7 @@ Construct the full webhook using Console's publicly accessible DNS name or IP ad Refer to the following example cURL command that retrieves all code repositories to scan, as well as the webhook URL suffix: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/settings/console-certificates_post.md b/openapi-specs/compute/32-06/desc/settings/console-certificates_post.md index 5673af840..392061c8f 100644 --- a/openapi-specs/compute/32-06/desc/settings/console-certificates_post.md +++ b/openapi-specs/compute/32-06/desc/settings/console-certificates_post.md @@ -9,7 +9,7 @@ For the custom TLS certificate for securing browser access, this file must be in Refer to the following example cURL request that uses basic auth and configures the custom certificate to use for securing browser access to the console: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/settings/custom-labels_get.md b/openapi-specs/compute/32-06/desc/settings/custom-labels_get.md index a849dd8a8..19c1cadde 100644 --- a/openapi-specs/compute/32-06/desc/settings/custom-labels_get.md +++ b/openapi-specs/compute/32-06/desc/settings/custom-labels_get.md @@ -5,7 +5,7 @@ Returns the list of alert labels configured in Prisma Cloud Compute. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/settings/custom-labels_post.md b/openapi-specs/compute/32-06/desc/settings/custom-labels_post.md index 6bb66e706..9b0702fe8 100644 --- a/openapi-specs/compute/32-06/desc/settings/custom-labels_post.md +++ b/openapi-specs/compute/32-06/desc/settings/custom-labels_post.md @@ -5,7 +5,7 @@ Creates a custom alert label to augment audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/settings/defender_get.md b/openapi-specs/compute/32-06/desc/settings/defender_get.md index ecb8b6989..cf43bb304 100644 --- a/openapi-specs/compute/32-06/desc/settings/defender_get.md +++ b/openapi-specs/compute/32-06/desc/settings/defender_get.md @@ -5,7 +5,7 @@ Returns the advanced settings for Defenders. Refer to the following example cURL command that gets all advanced settings for Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/settings/forensic_get.md b/openapi-specs/compute/32-06/desc/settings/forensic_get.md index 9c16b70b9..3486b2bf9 100644 --- a/openapi-specs/compute/32-06/desc/settings/forensic_get.md +++ b/openapi-specs/compute/32-06/desc/settings/forensic_get.md @@ -1,7 +1,7 @@ Retrieves the settings for the forensics system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/settings/forensic_post.md b/openapi-specs/compute/32-06/desc/settings/forensic_post.md index 31f809d39..8943842fb 100644 --- a/openapi-specs/compute/32-06/desc/settings/forensic_post.md +++ b/openapi-specs/compute/32-06/desc/settings/forensic_post.md @@ -3,7 +3,7 @@ Configures the forensics system. The following example curl command allocates 100 MB of local disk space for container forensic data and 10 MB for host forensics data. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/settings/initialized_get.md b/openapi-specs/compute/32-06/desc/settings/initialized_get.md index 3134912d1..2af8462f1 100644 --- a/openapi-specs/compute/32-06/desc/settings/initialized_get.md +++ b/openapi-specs/compute/32-06/desc/settings/initialized_get.md @@ -4,7 +4,7 @@ After first installing Console, the first thing you must do is create an admin a Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/settings/intelligence-windows_post.md b/openapi-specs/compute/32-06/desc/settings/intelligence-windows_post.md index c39e256d2..0721dab3b 100644 --- a/openapi-specs/compute/32-06/desc/settings/intelligence-windows_post.md +++ b/openapi-specs/compute/32-06/desc/settings/intelligence-windows_post.md @@ -3,7 +3,7 @@ This endpoint will enable or disable the Windows Intelligence Service from **Man The following example curl command uses basic auth to enable online updates of Windows vulnerabilities from the intelligence stream: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/settings/intelligence_get.md b/openapi-specs/compute/32-06/desc/settings/intelligence_get.md index 26c694246..15e9f24ae 100644 --- a/openapi-specs/compute/32-06/desc/settings/intelligence_get.md +++ b/openapi-specs/compute/32-06/desc/settings/intelligence_get.md @@ -5,7 +5,7 @@ Returns the details about the Intelligence Stream configuration. Refer to the following example cURL command that uses basic auth to retrieve your Intelligence Stream configuration settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/settings/intelligence_post.md b/openapi-specs/compute/32-06/desc/settings/intelligence_post.md index 74b06a3a0..2dbbd0168 100644 --- a/openapi-specs/compute/32-06/desc/settings/intelligence_post.md +++ b/openapi-specs/compute/32-06/desc/settings/intelligence_post.md @@ -7,7 +7,7 @@ For more information, see [Intelligence Stream](https://docs.paloaltonetworks.co Refer to the following example cURL command that uses basic auth to configure settings of your Intelligence Stream. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/settings/latest-version_get.md b/openapi-specs/compute/32-06/desc/settings/latest-version_get.md index c443fa7b5..16601fb5b 100644 --- a/openapi-specs/compute/32-06/desc/settings/latest-version_get.md +++ b/openapi-specs/compute/32-06/desc/settings/latest-version_get.md @@ -3,7 +3,7 @@ Retrieves the version number of the latest available Prisma Cloud Compute releas Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/settings/latest_version_get.md b/openapi-specs/compute/32-06/desc/settings/latest_version_get.md index 18e436668..5c64edff1 100644 --- a/openapi-specs/compute/32-06/desc/settings/latest_version_get.md +++ b/openapi-specs/compute/32-06/desc/settings/latest_version_get.md @@ -1,7 +1,7 @@ This endpoint will return the latest version of the product. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/settings/ldap_get.md b/openapi-specs/compute/32-06/desc/settings/ldap_get.md index 4ad0ad0c9..7d803ba1c 100644 --- a/openapi-specs/compute/32-06/desc/settings/ldap_get.md +++ b/openapi-specs/compute/32-06/desc/settings/ldap_get.md @@ -5,7 +5,7 @@ Returns the LDAP integration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/settings/ldap_post.md b/openapi-specs/compute/32-06/desc/settings/ldap_post.md index c152c7dc5..34bc06ef4 100644 --- a/openapi-specs/compute/32-06/desc/settings/ldap_post.md +++ b/openapi-specs/compute/32-06/desc/settings/ldap_post.md @@ -7,7 +7,7 @@ For more information, see [Active Directory](https://docs.paloaltonetworks.com/p Refer to the following example cURL command that enables the LDAP integration and specifies the parameters required to integrate with an Active Directory service. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/settings/license_get.md b/openapi-specs/compute/32-06/desc/settings/license_get.md index 5c792cae8..2b4b548e3 100644 --- a/openapi-specs/compute/32-06/desc/settings/license_get.md +++ b/openapi-specs/compute/32-06/desc/settings/license_get.md @@ -5,7 +5,7 @@ Returns the details about the installed license. Refer to the following example cURL request that retrieves the license details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/settings/license_post.md b/openapi-specs/compute/32-06/desc/settings/license_post.md index b77800a5f..ce74b0d0f 100644 --- a/openapi-specs/compute/32-06/desc/settings/license_post.md +++ b/openapi-specs/compute/32-06/desc/settings/license_post.md @@ -8,7 +8,7 @@ For more information, see [Licensing](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to set your license: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/settings/logging_get.md b/openapi-specs/compute/32-06/desc/settings/logging_get.md index 6eda3e484..012be5def 100644 --- a/openapi-specs/compute/32-06/desc/settings/logging_get.md +++ b/openapi-specs/compute/32-06/desc/settings/logging_get.md @@ -5,7 +5,7 @@ Returns the logging settings. Refer to the following example cURL request that uses basic auth to retrieve your logging details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/settings/logging_post.md b/openapi-specs/compute/32-06/desc/settings/logging_post.md index 3619d9c0f..8d27ee1b3 100644 --- a/openapi-specs/compute/32-06/desc/settings/logging_post.md +++ b/openapi-specs/compute/32-06/desc/settings/logging_post.md @@ -8,7 +8,7 @@ For more information, see [Logging](https://docs.paloaltonetworks.com/prisma/pri Refer to the following example cURL request that enables verbose scan output for syslog and stdout: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/settings/logon_get.md b/openapi-specs/compute/32-06/desc/settings/logon_get.md index 1559f2405..b1e9164f2 100644 --- a/openapi-specs/compute/32-06/desc/settings/logon_get.md +++ b/openapi-specs/compute/32-06/desc/settings/logon_get.md @@ -5,7 +5,7 @@ Configures the logon settings. Refer to the following example cURL request that uses basic auth to retrieve all current logon settings. ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/settings/logon_post.md b/openapi-specs/compute/32-06/desc/settings/logon_post.md index 5c2b60c9f..691e082fe 100644 --- a/openapi-specs/compute/32-06/desc/settings/logon_post.md +++ b/openapi-specs/compute/32-06/desc/settings/logon_post.md @@ -7,7 +7,7 @@ For more information, see [Logon Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that uses basic auth to set the timeout to 900 seconds (15 minutes): ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/32-06/desc/settings/oauth_get.md b/openapi-specs/compute/32-06/desc/settings/oauth_get.md index 6dcf70fb5..5d997f016 100644 --- a/openapi-specs/compute/32-06/desc/settings/oauth_get.md +++ b/openapi-specs/compute/32-06/desc/settings/oauth_get.md @@ -5,7 +5,7 @@ Returns the OAuth configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/settings/oauth_post.md b/openapi-specs/compute/32-06/desc/settings/oauth_post.md index c593b9237..da3c83d2f 100644 --- a/openapi-specs/compute/32-06/desc/settings/oauth_post.md +++ b/openapi-specs/compute/32-06/desc/settings/oauth_post.md @@ -7,7 +7,7 @@ For more information, see [GitHub OAuth](https://docs.paloaltonetworks.com/prism Refer to the following example cURL response: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/settings/oidc_get.md b/openapi-specs/compute/32-06/desc/settings/oidc_get.md index ee439622b..1f27f93ba 100644 --- a/openapi-specs/compute/32-06/desc/settings/oidc_get.md +++ b/openapi-specs/compute/32-06/desc/settings/oidc_get.md @@ -5,7 +5,7 @@ Returns the OpenID Connect configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/settings/oidc_post.md b/openapi-specs/compute/32-06/desc/settings/oidc_post.md index e0270247e..5bd3a9192 100644 --- a/openapi-specs/compute/32-06/desc/settings/oidc_post.md +++ b/openapi-specs/compute/32-06/desc/settings/oidc_post.md @@ -7,7 +7,7 @@ For more information, see [OIDC](https://docs.paloaltonetworks.com/prisma/prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/settings/pcf_get.md b/openapi-specs/compute/32-06/desc/settings/pcf_get.md index 5dc21eb17..c5e42a823 100644 --- a/openapi-specs/compute/32-06/desc/settings/pcf_get.md +++ b/openapi-specs/compute/32-06/desc/settings/pcf_get.md @@ -3,7 +3,7 @@ This endpoint will return settings for PCF (Pivotal Cloud Foundry)Blobstore scan The following example curl command uses basic auth to retrieve the current PCF Blobstore scanning settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/settings/pcf_post.md b/openapi-specs/compute/32-06/desc/settings/pcf_post.md index 139e947cb..657e14f27 100644 --- a/openapi-specs/compute/32-06/desc/settings/pcf_post.md +++ b/openapi-specs/compute/32-06/desc/settings/pcf_post.md @@ -3,7 +3,7 @@ This endpoint will allow for updating settings for PCF (Pivotal Cloud Foundry) B The following example curl command uses basic auth to set up a PCF Blobstore scanner that scans the last `5` droplets for every droplet in the PCF Blobstore: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/settings/projects_get.md b/openapi-specs/compute/32-06/desc/settings/projects_get.md index f5dd20395..bc95414a1 100644 --- a/openapi-specs/compute/32-06/desc/settings/projects_get.md +++ b/openapi-specs/compute/32-06/desc/settings/projects_get.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command retrieves the state of the Projects feature from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ All API calls must be proxied through Central Console, where the request is auto To retrieve the Projects settings from a supervisor Console, append the `project` query parameter to your request. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/settings/projects_post.md b/openapi-specs/compute/32-06/desc/settings/projects_post.md index d29f8e9d5..b3472e6b9 100644 --- a/openapi-specs/compute/32-06/desc/settings/projects_post.md +++ b/openapi-specs/compute/32-06/desc/settings/projects_post.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command designates `` as master. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/settings/proxy_get.md b/openapi-specs/compute/32-06/desc/settings/proxy_get.md index 9a4922d59..477563069 100644 --- a/openapi-specs/compute/32-06/desc/settings/proxy_get.md +++ b/openapi-specs/compute/32-06/desc/settings/proxy_get.md @@ -5,7 +5,7 @@ Returns the proxy settings for Prisma Cloud Compute containers to access the Int Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/settings/proxy_post.md b/openapi-specs/compute/32-06/desc/settings/proxy_post.md index a1bdc07ed..df926524e 100644 --- a/openapi-specs/compute/32-06/desc/settings/proxy_post.md +++ b/openapi-specs/compute/32-06/desc/settings/proxy_post.md @@ -7,7 +7,7 @@ For more information, see [Proxy Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that specifies the proxy to use to access the Internet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/settings/registry_get.md b/openapi-specs/compute/32-06/desc/settings/registry_get.md index 12745005d..64e70b698 100644 --- a/openapi-specs/compute/32-06/desc/settings/registry_get.md +++ b/openapi-specs/compute/32-06/desc/settings/registry_get.md @@ -17,7 +17,7 @@ Construct the full webhook using the publicly accessible DNS name or IP address, The following cURL command retrieves all the registries to scan and the URL suffix for the registry's webhook URL suffix. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/settings/registry_post.md b/openapi-specs/compute/32-06/desc/settings/registry_post.md index efabf4e67..decf80a65 100644 --- a/openapi-specs/compute/32-06/desc/settings/registry_post.md +++ b/openapi-specs/compute/32-06/desc/settings/registry_post.md @@ -30,7 +30,7 @@ The API response returns an HTTP 400 error if the number of registry specificati Refer to the following example cURL command that configures Prisma Cloud Compute to scan the Ubuntu 16.04 repository on Docker Hub: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -64,7 +64,7 @@ To add settings for a GitLab Container Registry, you must specify the following Refer to the following example cURL command: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/settings/registry_put.md b/openapi-specs/compute/32-06/desc/settings/registry_put.md index 3768914f6..75d6c79a2 100644 --- a/openapi-specs/compute/32-06/desc/settings/registry_put.md +++ b/openapi-specs/compute/32-06/desc/settings/registry_put.md @@ -127,7 +127,7 @@ To remove a registry from the list: To delete all entries, submit an empty `specifications` array. For example: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-06/desc/settings/saml_get.md b/openapi-specs/compute/32-06/desc/settings/saml_get.md index f2228a440..4fb940e80 100644 --- a/openapi-specs/compute/32-06/desc/settings/saml_get.md +++ b/openapi-specs/compute/32-06/desc/settings/saml_get.md @@ -5,7 +5,7 @@ Returns the configured SAML settings that is used to authenticate to the Prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/settings/saml_post.md b/openapi-specs/compute/32-06/desc/settings/saml_post.md index 0bd9c4a25..dfe8d380f 100644 --- a/openapi-specs/compute/32-06/desc/settings/saml_post.md +++ b/openapi-specs/compute/32-06/desc/settings/saml_post.md @@ -7,7 +7,7 @@ For more information, see [Okta via SAML 2.0](https://docs.paloaltonetworks.com/ Refer to the following example cURL request that uses the basic auth to set up and enable the SAML integration with Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/settings/scan_get.md b/openapi-specs/compute/32-06/desc/settings/scan_get.md index 5c1df30a2..543ea7662 100644 --- a/openapi-specs/compute/32-06/desc/settings/scan_get.md +++ b/openapi-specs/compute/32-06/desc/settings/scan_get.md @@ -5,7 +5,7 @@ Returns the global settings for image, host, container, and registry scanning. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/settings/scan_post.md b/openapi-specs/compute/32-06/desc/settings/scan_post.md index f043d1c9f..9ddb521a2 100644 --- a/openapi-specs/compute/32-06/desc/settings/scan_post.md +++ b/openapi-specs/compute/32-06/desc/settings/scan_post.md @@ -9,7 +9,7 @@ Refer to the following example cURL request that configures the following scan i * Scan images, containers, and hosts once per day. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/settings/secrets_get.md b/openapi-specs/compute/32-06/desc/settings/secrets_get.md index 75e2b32c7..339009641 100644 --- a/openapi-specs/compute/32-06/desc/settings/secrets_get.md +++ b/openapi-specs/compute/32-06/desc/settings/secrets_get.md @@ -3,7 +3,7 @@ This endpoint will return configured secret store already configured in the cons The following example curl command retrieves any configured secret stores, as well as the refresh period in hours: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/settings/secrets_post.md b/openapi-specs/compute/32-06/desc/settings/secrets_post.md index d302ecdf8..730d031bf 100644 --- a/openapi-specs/compute/32-06/desc/settings/secrets_post.md +++ b/openapi-specs/compute/32-06/desc/settings/secrets_post.md @@ -5,7 +5,7 @@ Please note the data structure returned from endpoint /settings/secrets GET to s Refer to the following example curl command that adds a CyberArk secret store to the console with the appID set to `Prisma_Cloud_Compute_Console` and set the URL to `https://services-myca.twistlock.com:10882`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/settings/serverless-scan_get.md b/openapi-specs/compute/32-06/desc/settings/serverless-scan_get.md index bb8ce06ba..eb42e4a12 100644 --- a/openapi-specs/compute/32-06/desc/settings/serverless-scan_get.md +++ b/openapi-specs/compute/32-06/desc/settings/serverless-scan_get.md @@ -8,7 +8,7 @@ This endpoint maps to the **Function scope** table data in the **Defend > Vulner Refer to the following example cURL command that retrieves a list of serverless scan scopes: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/settings/serverless_get.md b/openapi-specs/compute/32-06/desc/settings/serverless_get.md index b6122c460..8c654807c 100644 --- a/openapi-specs/compute/32-06/desc/settings/serverless_get.md +++ b/openapi-specs/compute/32-06/desc/settings/serverless_get.md @@ -3,7 +3,7 @@ This endpoint will return any configured serverless function scanners found in * The following example curl command uses basic auth to retrieve serverless settings in an array, sorted by Cloud Provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/settings/serverless_post.md b/openapi-specs/compute/32-06/desc/settings/serverless_post.md index 6e26ea1d3..c0e0f3225 100644 --- a/openapi-specs/compute/32-06/desc/settings/serverless_post.md +++ b/openapi-specs/compute/32-06/desc/settings/serverless_post.md @@ -3,7 +3,7 @@ This endpoint will add serverless function providers to scan for vulnerabilities The following example curl command uses basic auth to add a serverless account to scan for serverless functions. This is assuming that you already have the [credential](https://docs.twistlock.com/docs/latest/configure/credentials_store.html) added to the console that is needed to scan that provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/settings/system_get.md b/openapi-specs/compute/32-06/desc/settings/system_get.md index 6f893abf0..0e8a3cba3 100644 --- a/openapi-specs/compute/32-06/desc/settings/system_get.md +++ b/openapi-specs/compute/32-06/desc/settings/system_get.md @@ -3,7 +3,7 @@ This endpoint will return all system settings in JSON format. The following example curl command does exactly that: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/settings/tas_get.md b/openapi-specs/compute/32-06/desc/settings/tas_get.md index 52f392433..d2d0017f0 100644 --- a/openapi-specs/compute/32-06/desc/settings/tas_get.md +++ b/openapi-specs/compute/32-06/desc/settings/tas_get.md @@ -5,7 +5,7 @@ Retrieves Tanzu Application Service (TAS) settings. Refer to the following example cURL command that retrieves all TAS settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/settings/telemetry_get.md b/openapi-specs/compute/32-06/desc/settings/telemetry_get.md index 6460c3fc3..46a807e77 100644 --- a/openapi-specs/compute/32-06/desc/settings/telemetry_get.md +++ b/openapi-specs/compute/32-06/desc/settings/telemetry_get.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that retrieves the settings if telemetry is enabled or not: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/settings/telemetry_post.md b/openapi-specs/compute/32-06/desc/settings/telemetry_post.md index bc97a6d0f..662846f33 100644 --- a/openapi-specs/compute/32-06/desc/settings/telemetry_post.md +++ b/openapi-specs/compute/32-06/desc/settings/telemetry_post.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to turn off telemetry: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/settings/trusted_certificate_post.md b/openapi-specs/compute/32-06/desc/settings/trusted_certificate_post.md index 5a2a30bda..c54b96fa5 100644 --- a/openapi-specs/compute/32-06/desc/settings/trusted_certificate_post.md +++ b/openapi-specs/compute/32-06/desc/settings/trusted_certificate_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/trusted-certificates` endpoint. Refer to the following example cURL request that uses basic auth to add a certificate to the list: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/32-06/desc/settings/trusted_certificates_post.md b/openapi-specs/compute/32-06/desc/settings/trusted_certificates_post.md index 78c07982b..e9bdc72a1 100644 --- a/openapi-specs/compute/32-06/desc/settings/trusted_certificates_post.md +++ b/openapi-specs/compute/32-06/desc/settings/trusted_certificates_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/certificates` endpoint. Refer to the following example cURL request that uses basic auth to enable this feature: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/32-06/desc/settings/vm_get.md b/openapi-specs/compute/32-06/desc/settings/vm_get.md index 8043742f5..b98b94240 100644 --- a/openapi-specs/compute/32-06/desc/settings/vm_get.md +++ b/openapi-specs/compute/32-06/desc/settings/vm_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **VM images scope** table data in the **Defend > Vulne Refer to the following example cURL command that retrieves all the scopes used for pattern matching on VM functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/signup/post.md b/openapi-specs/compute/32-06/desc/signup/post.md index 1db21df29..67344a0b1 100644 --- a/openapi-specs/compute/32-06/desc/signup/post.md +++ b/openapi-specs/compute/32-06/desc/signup/post.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i The following cURL command creates the initial admin user with the username `admin` and password `password`. ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -X POST \ -d '{"username": "admin", "password": "password"}' \ diff --git a/openapi-specs/compute/32-06/desc/static/capabilities_get.md b/openapi-specs/compute/32-06/desc/static/capabilities_get.md index ea119d2a9..f9b60278c 100644 --- a/openapi-specs/compute/32-06/desc/static/capabilities_get.md +++ b/openapi-specs/compute/32-06/desc/static/capabilities_get.md @@ -1,7 +1,7 @@ Returns a list of capabilities used in host models. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/static/regions_get.md b/openapi-specs/compute/32-06/desc/static/regions_get.md index 4a07097ee..3b1adb5f1 100644 --- a/openapi-specs/compute/32-06/desc/static/regions_get.md +++ b/openapi-specs/compute/32-06/desc/static/regions_get.md @@ -1,7 +1,7 @@ Returns a list of regions used in cloud radar. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/static/syscalls_get.md b/openapi-specs/compute/32-06/desc/static/syscalls_get.md index 9e2ddcde7..09505ba39 100644 --- a/openapi-specs/compute/32-06/desc/static/syscalls_get.md +++ b/openapi-specs/compute/32-06/desc/static/syscalls_get.md @@ -2,7 +2,7 @@ Returns a list of the Linux kernel system calls. Runtime rules for containers can allow-list and deny-list specific system calls. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/static/vulnerabilities_get.md b/openapi-specs/compute/32-06/desc/static/vulnerabilities_get.md index cb6acab28..19809472b 100644 --- a/openapi-specs/compute/32-06/desc/static/vulnerabilities_get.md +++ b/openapi-specs/compute/32-06/desc/static/vulnerabilities_get.md @@ -3,7 +3,7 @@ This data can be used for building out reports with the API. This data can be correlated with the `/api/v1/images` endpoint, specifically the the `complianceVulnerabilities` and `cveVulnerabilities` objects, to generate more thorough reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/stats/compliance.md b/openapi-specs/compute/32-06/desc/stats/compliance.md index 5c5be3991..4f4c90071 100644 --- a/openapi-specs/compute/32-06/desc/stats/compliance.md +++ b/openapi-specs/compute/32-06/desc/stats/compliance.md @@ -5,7 +5,7 @@ For the current day, the response will also include detailed compliance stats fo The following example command that uses curl and basic auth to retrieve compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/stats/compliance_get.md b/openapi-specs/compute/32-06/desc/stats/compliance_get.md index 314f6a179..2ef2f9f75 100644 --- a/openapi-specs/compute/32-06/desc/stats/compliance_get.md +++ b/openapi-specs/compute/32-06/desc/stats/compliance_get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Compliance > Compliance explorer* Refer to the following example cURL command that retrieves compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/stats/compliance_refresh.md b/openapi-specs/compute/32-06/desc/stats/compliance_refresh.md index b75491a69..d8ce211a8 100644 --- a/openapi-specs/compute/32-06/desc/stats/compliance_refresh.md +++ b/openapi-specs/compute/32-06/desc/stats/compliance_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/compliance endpoint return The following example command that uses curl and basic auth to refresh compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/stats/compliance_refresh_post.md b/openapi-specs/compute/32-06/desc/stats/compliance_refresh_post.md index 541a54d16..0f329d1db 100644 --- a/openapi-specs/compute/32-06/desc/stats/compliance_refresh_post.md +++ b/openapi-specs/compute/32-06/desc/stats/compliance_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/compliance`, b Refer to the following example cURL command that refreshes compliance statistics for the current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/stats/daily.md b/openapi-specs/compute/32-06/desc/stats/daily.md index 082f58a27..9fd4c6138 100644 --- a/openapi-specs/compute/32-06/desc/stats/daily.md +++ b/openapi-specs/compute/32-06/desc/stats/daily.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/stats/daily_get.md b/openapi-specs/compute/32-06/desc/stats/daily_get.md index 0db89bdc3..fe852126c 100644 --- a/openapi-specs/compute/32-06/desc/stats/daily_get.md +++ b/openapi-specs/compute/32-06/desc/stats/daily_get.md @@ -3,7 +3,7 @@ Returns a historical list of per-day statistics for the resources protected by P The following example command uses curl and basic auth to retrieve the daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/stats/dashboard.md b/openapi-specs/compute/32-06/desc/stats/dashboard.md index be90a2d32..1e5fabf08 100644 --- a/openapi-specs/compute/32-06/desc/stats/dashboard.md +++ b/openapi-specs/compute/32-06/desc/stats/dashboard.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/stats/dashboard_get.md b/openapi-specs/compute/32-06/desc/stats/dashboard_get.md index 601769645..8f0bc827c 100644 --- a/openapi-specs/compute/32-06/desc/stats/dashboard_get.md +++ b/openapi-specs/compute/32-06/desc/stats/dashboard_get.md @@ -5,7 +5,7 @@ Returns statistics about the resources protected by Prisma Cloud Compute, includ Refer to the following example cURL command that retrieves dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/stats/events_get.md b/openapi-specs/compute/32-06/desc/stats/events_get.md index 3be5eb4e7..e64f98e57 100644 --- a/openapi-specs/compute/32-06/desc/stats/events_get.md +++ b/openapi-specs/compute/32-06/desc/stats/events_get.md @@ -5,7 +5,7 @@ Returns events statistics for your environment. Refer to the following example cURL command retrieves event stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/stats/vulnerabilities.md b/openapi-specs/compute/32-06/desc/stats/vulnerabilities.md index 40c4dd1f1..199cfab62 100644 --- a/openapi-specs/compute/32-06/desc/stats/vulnerabilities.md +++ b/openapi-specs/compute/32-06/desc/stats/vulnerabilities.md @@ -5,7 +5,7 @@ For the current day, the response will also include descriptions of the CVEs cur The following example command that uses curl and basic auth to retrieve vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/stats/vulnerabilities_download_get.md b/openapi-specs/compute/32-06/desc/stats/vulnerabilities_download_get.md index 753af8c7f..9930a636b 100644 --- a/openapi-specs/compute/32-06/desc/stats/vulnerabilities_download_get.md +++ b/openapi-specs/compute/32-06/desc/stats/vulnerabilities_download_get.md @@ -17,7 +17,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a summary count of the CVEs and detailed descriptions for each CVE in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/stats/vulnerabilities_get.md b/openapi-specs/compute/32-06/desc/stats/vulnerabilities_get.md index 1a6f1c152..aaa5a907b 100644 --- a/openapi-specs/compute/32-06/desc/stats/vulnerabilities_get.md +++ b/openapi-specs/compute/32-06/desc/stats/vulnerabilities_get.md @@ -19,7 +19,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a summary count of the CVEs and detailed descriptions for each CVE: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/stats/vulnerabilities_impacted_resources_download_get.md b/openapi-specs/compute/32-06/desc/stats/vulnerabilities_impacted_resources_download_get.md index 0821d6a9f..502c09a6c 100644 --- a/openapi-specs/compute/32-06/desc/stats/vulnerabilities_impacted_resources_download_get.md +++ b/openapi-specs/compute/32-06/desc/stats/vulnerabilities_impacted_resources_download_get.md @@ -15,7 +15,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a list of impacted resources for `CVE-2015-0313` in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/stats/vulnerabilities_impacted_resources_get.md b/openapi-specs/compute/32-06/desc/stats/vulnerabilities_impacted_resources_get.md index c1e6d0ba2..014a5f4a2 100644 --- a/openapi-specs/compute/32-06/desc/stats/vulnerabilities_impacted_resources_get.md +++ b/openapi-specs/compute/32-06/desc/stats/vulnerabilities_impacted_resources_get.md @@ -18,7 +18,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a list of impacted resources for `CVE-2022-28391`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -95,7 +95,7 @@ Refer to the following example JSON response that shows the risk tree for the im Refer to the following example cURL command that retrieves a the impacted registry images `CVE-2015-0313` by using an optional query parameter `resourceType`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -108,7 +108,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a paginated list of impacted resources for `CVE-2015-0313` by using optional query parameters `limit` and `offset`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/stats/vulnerabilities_refresh.md b/openapi-specs/compute/32-06/desc/stats/vulnerabilities_refresh.md index 505a99d98..2aa7da8a1 100644 --- a/openapi-specs/compute/32-06/desc/stats/vulnerabilities_refresh.md +++ b/openapi-specs/compute/32-06/desc/stats/vulnerabilities_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/vulnerabilities endpoint r The following example command that uses curl and basic auth to refresh vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/stats/vulnerabilities_refresh_post.md b/openapi-specs/compute/32-06/desc/stats/vulnerabilities_refresh_post.md index 1e3210e18..85e3ddd7a 100644 --- a/openapi-specs/compute/32-06/desc/stats/vulnerabilities_refresh_post.md +++ b/openapi-specs/compute/32-06/desc/stats/vulnerabilities_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/vulnerabilitie Refer to the following example cURL command that refreshes the vulnerability statistics for current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/stats/workload_get.md b/openapi-specs/compute/32-06/desc/stats/workload_get.md index a25deed5c..940a835ee 100644 --- a/openapi-specs/compute/32-06/desc/stats/workload_get.md +++ b/openapi-specs/compute/32-06/desc/stats/workload_get.md @@ -1,7 +1,7 @@ Returns the workload statistics from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/statuses/intelligence.md b/openapi-specs/compute/32-06/desc/statuses/intelligence.md index 74da8c7ff..ac102e81f 100644 --- a/openapi-specs/compute/32-06/desc/statuses/intelligence.md +++ b/openapi-specs/compute/32-06/desc/statuses/intelligence.md @@ -3,7 +3,7 @@ Returns the connection status of the intelligence stream and the last intelligen The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/statuses/intelligence_get.md b/openapi-specs/compute/32-06/desc/statuses/intelligence_get.md index c18dd9611..b5f620ad9 100644 --- a/openapi-specs/compute/32-06/desc/statuses/intelligence_get.md +++ b/openapi-specs/compute/32-06/desc/statuses/intelligence_get.md @@ -3,7 +3,7 @@ Returns the connection status for the Intelligence Stream, along with the time o The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/statuses/registry_get.md b/openapi-specs/compute/32-06/desc/statuses/registry_get.md index 427c4915c..e4fd09fe9 100644 --- a/openapi-specs/compute/32-06/desc/statuses/registry_get.md +++ b/openapi-specs/compute/32-06/desc/statuses/registry_get.md @@ -13,7 +13,7 @@ To view the more details about the progress of a regular or on-demand registry s Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/statuses/secrets_get.md b/openapi-specs/compute/32-06/desc/statuses/secrets_get.md index 510f15161..e77c5ed70 100644 --- a/openapi-specs/compute/32-06/desc/statuses/secrets_get.md +++ b/openapi-specs/compute/32-06/desc/statuses/secrets_get.md @@ -3,7 +3,7 @@ Returns the connection status of any secret stores you have configured, as well The following is an example curl using basic auth to find the secret store status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/statuses/serverless-radar_get.md b/openapi-specs/compute/32-06/desc/statuses/serverless-radar_get.md index 3bfdbb5bf..4ab5d0c1d 100644 --- a/openapi-specs/compute/32-06/desc/statuses/serverless-radar_get.md +++ b/openapi-specs/compute/32-06/desc/statuses/serverless-radar_get.md @@ -1,7 +1,7 @@ Returns the status of the serverless scans. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/tags/get.md b/openapi-specs/compute/32-06/desc/tags/get.md index 6da7ad135..604eee98e 100644 --- a/openapi-specs/compute/32-06/desc/tags/get.md +++ b/openapi-specs/compute/32-06/desc/tags/get.md @@ -5,7 +5,7 @@ Retrieves a list of tags. Refer to the following example cURL command that retrieves a list of tags: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/tags/name_delete.md b/openapi-specs/compute/32-06/desc/tags/name_delete.md index 2ed010e57..6dedfce8f 100644 --- a/openapi-specs/compute/32-06/desc/tags/name_delete.md +++ b/openapi-specs/compute/32-06/desc/tags/name_delete.md @@ -5,7 +5,7 @@ Deletes a tag from the system. Refer to the following example cURL command that deletes a tag named *my tag*: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-06/desc/tags/name_put.md b/openapi-specs/compute/32-06/desc/tags/name_put.md index cbaea40d3..a5923b8ef 100644 --- a/openapi-specs/compute/32-06/desc/tags/name_put.md +++ b/openapi-specs/compute/32-06/desc/tags/name_put.md @@ -9,7 +9,7 @@ You must define all parameters in your PUT request. Refer to the following example cURL command that updates the parameters in a tag named `my_tag`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-06/desc/tags/post.md b/openapi-specs/compute/32-06/desc/tags/post.md index d55ae8b96..8e1a493d6 100644 --- a/openapi-specs/compute/32-06/desc/tags/post.md +++ b/openapi-specs/compute/32-06/desc/tags/post.md @@ -8,7 +8,7 @@ You can use tags as policy exceptions or assign them to vulnerabilities for acti Refer to the following example cURL command that creates a tag named "my-tag": ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/tags/tag_cve_delete.md b/openapi-specs/compute/32-06/desc/tags/tag_cve_delete.md index 8caed79cf..3031029b9 100644 --- a/openapi-specs/compute/32-06/desc/tags/tag_cve_delete.md +++ b/openapi-specs/compute/32-06/desc/tags/tag_cve_delete.md @@ -6,7 +6,7 @@ When you delete a tag, the tag is deleted from a wider scope. All the packages a Refer to the following example cURL command that removes the tag named `ignored` from the CVE `CVE-2017-15088`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-06/desc/tags/tag_cve_post.md b/openapi-specs/compute/32-06/desc/tags/tag_cve_post.md index 966a80bd8..1b4ead89b 100644 --- a/openapi-specs/compute/32-06/desc/tags/tag_cve_post.md +++ b/openapi-specs/compute/32-06/desc/tags/tag_cve_post.md @@ -45,7 +45,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the source package `perl`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -72,7 +72,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2021-20305` on the binary package `gnutls`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -98,7 +98,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -120,7 +120,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `image` and to all the packages and resources. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -140,7 +140,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `host`, resource `servo-vmware71`, and to all the packages. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/tas-droplets/download_get.md b/openapi-specs/compute/32-06/desc/tas-droplets/download_get.md index 6372f0b35..f9d82820d 100644 --- a/openapi-specs/compute/32-06/desc/tas-droplets/download_get.md +++ b/openapi-specs/compute/32-06/desc/tas-droplets/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > VMware The following cURL command downloads all TAS droplets to a CSV file called `tas_droplets.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/tas-droplets/get.md b/openapi-specs/compute/32-06/desc/tas-droplets/get.md index dd2b44993..a0a97e8ca 100644 --- a/openapi-specs/compute/32-06/desc/tas-droplets/get.md +++ b/openapi-specs/compute/32-06/desc/tas-droplets/get.md @@ -10,7 +10,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > VMware Tanzu bl The following cURL command retrieves all TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/tas-droplets/get_tas_addresses.md b/openapi-specs/compute/32-06/desc/tas-droplets/get_tas_addresses.md index 91ebb2e50..04c6dccb0 100644 --- a/openapi-specs/compute/32-06/desc/tas-droplets/get_tas_addresses.md +++ b/openapi-specs/compute/32-06/desc/tas-droplets/get_tas_addresses.md @@ -9,7 +9,7 @@ You get an HTTP error response 429 if the limit exceeds. The following cURL command retrieves the Cloud Controller Addresses of scanned TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/tas-droplets/progress_get.md b/openapi-specs/compute/32-06/desc/tas-droplets/progress_get.md index 504a21e84..507d001bf 100644 --- a/openapi-specs/compute/32-06/desc/tas-droplets/progress_get.md +++ b/openapi-specs/compute/32-06/desc/tas-droplets/progress_get.md @@ -5,7 +5,7 @@ Returns the details of the TAS Droplets ongoing scan. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/tas-droplets/scan_post.md b/openapi-specs/compute/32-06/desc/tas-droplets/scan_post.md index aad2174af..13c4eeeb9 100644 --- a/openapi-specs/compute/32-06/desc/tas-droplets/scan_post.md +++ b/openapi-specs/compute/32-06/desc/tas-droplets/scan_post.md @@ -5,7 +5,7 @@ Scans the TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/tas-droplets/stop_post.md b/openapi-specs/compute/32-06/desc/tas-droplets/stop_post.md index 5f5a019b1..53d709ec7 100644 --- a/openapi-specs/compute/32-06/desc/tas-droplets/stop_post.md +++ b/openapi-specs/compute/32-06/desc/tas-droplets/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing scan of TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/trust/data_get.md b/openapi-specs/compute/32-06/desc/trust/data_get.md index dd55d47a3..88983f139 100644 --- a/openapi-specs/compute/32-06/desc/trust/data_get.md +++ b/openapi-specs/compute/32-06/desc/trust/data_get.md @@ -5,7 +5,7 @@ Returns the trusted registries, repositories, and images. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/trust/data_put.md b/openapi-specs/compute/32-06/desc/trust/data_put.md index 0e6a0ba49..733514505 100644 --- a/openapi-specs/compute/32-06/desc/trust/data_put.md +++ b/openapi-specs/compute/32-06/desc/trust/data_put.md @@ -6,7 +6,7 @@ Specify trusted images using either the image name or layers properties. Refer to the following example cURL command that uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -19,7 +19,7 @@ To edit a trust group based on image base layers, use PUT to specify a list of S Refer to the following example that specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-06/desc/trust/get.md b/openapi-specs/compute/32-06/desc/trust/get.md index 1226cd0a3..57ff5bdb5 100644 --- a/openapi-specs/compute/32-06/desc/trust/get.md +++ b/openapi-specs/compute/32-06/desc/trust/get.md @@ -3,7 +3,7 @@ Retrieves a list of all trusted images. The following example curl command uses basic auth to retrieve all trusted images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/trust/id_delete.md b/openapi-specs/compute/32-06/desc/trust/id_delete.md index b3114775f..d63cdf71a 100644 --- a/openapi-specs/compute/32-06/desc/trust/id_delete.md +++ b/openapi-specs/compute/32-06/desc/trust/id_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to specify a image trust grou ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-06/desc/trust/id_put.md b/openapi-specs/compute/32-06/desc/trust/id_put.md index 44d2c8b8b..c98617bcd 100644 --- a/openapi-specs/compute/32-06/desc/trust/id_put.md +++ b/openapi-specs/compute/32-06/desc/trust/id_put.md @@ -9,7 +9,7 @@ For more information about handles, see the `_id` in the response body for the G The following example curl command uses basic auth to modify the image property for an existing trusted image entry, where the handle for the entry is `docker-ubuntu-group`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-06/desc/trust/learn_get.md b/openapi-specs/compute/32-06/desc/trust/learn_get.md index d8a3414d0..004b16b02 100644 --- a/openapi-specs/compute/32-06/desc/trust/learn_get.md +++ b/openapi-specs/compute/32-06/desc/trust/learn_get.md @@ -1,7 +1,7 @@ Returns the state of the trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/trust/learn_post.md b/openapi-specs/compute/32-06/desc/trust/learn_post.md index 094817738..008657fa2 100644 --- a/openapi-specs/compute/32-06/desc/trust/learn_post.md +++ b/openapi-specs/compute/32-06/desc/trust/learn_post.md @@ -1,7 +1,7 @@ Sets the state of trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/trust/post.md b/openapi-specs/compute/32-06/desc/trust/post.md index 1072275a1..23a324c6c 100644 --- a/openapi-specs/compute/32-06/desc/trust/post.md +++ b/openapi-specs/compute/32-06/desc/trust/post.md @@ -7,7 +7,7 @@ For more information about handles, see the `_id` key in the response body for t The following example curl command uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ To create a trust group based on image base layers, POST a list of SHA256 hashes The following example specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/users/get.md b/openapi-specs/compute/32-06/desc/users/get.md index e4e6966ec..cd5a661ba 100644 --- a/openapi-specs/compute/32-06/desc/users/get.md +++ b/openapi-specs/compute/32-06/desc/users/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Manage > Authentication > Users** in the Console UI. The following cURL command retrieves all users. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/users/id_delete.md b/openapi-specs/compute/32-06/desc/users/id_delete.md index 1cfa5642d..66a1102f9 100644 --- a/openapi-specs/compute/32-06/desc/users/id_delete.md +++ b/openapi-specs/compute/32-06/desc/users/id_delete.md @@ -17,7 +17,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes user `ID` from the system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-06/desc/util/osx_twistcli_arm64_get.md b/openapi-specs/compute/32-06/desc/util/osx_twistcli_arm64_get.md index b385d0d3b..a30686374 100644 --- a/openapi-specs/compute/32-06/desc/util/osx_twistcli_arm64_get.md +++ b/openapi-specs/compute/32-06/desc/util/osx_twistcli_arm64_get.md @@ -7,7 +7,7 @@ Downloads the twistcli binary executable for MacOS platforms based on ARM64 arch Refer to the following example cURL command that downloads and saves the “twistcli” binary executable for ARM64 bit MacOS platforms to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/compute/32-06/desc/util/osx_twistcli_get.md b/openapi-specs/compute/32-06/desc/util/osx_twistcli_get.md index c49f96c41..2353ea338 100644 --- a/openapi-specs/compute/32-06/desc/util/osx_twistcli_get.md +++ b/openapi-specs/compute/32-06/desc/util/osx_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **MacOS platform** hyperlink in **Manage > System > Ut The following cURL command downloads the twistcli binary executable for MacOS platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli \ diff --git a/openapi-specs/compute/32-06/desc/util/twistcli_arm64_get.md b/openapi-specs/compute/32-06/desc/util/twistcli_arm64_get.md index 7ec36d3f5..a3d7318ab 100644 --- a/openapi-specs/compute/32-06/desc/util/twistcli_arm64_get.md +++ b/openapi-specs/compute/32-06/desc/util/twistcli_arm64_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/compute/32-06/desc/util/twistcli_get.md b/openapi-specs/compute/32-06/desc/util/twistcli_get.md index f9d2d295c..08a3ae8aa 100644 --- a/openapi-specs/compute/32-06/desc/util/twistcli_get.md +++ b/openapi-specs/compute/32-06/desc/util/twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -X GET -o \ 'https:///api/v/util/twistcli' diff --git a/openapi-specs/compute/32-06/desc/util/twistlock_jenkins_plugin_get.md b/openapi-specs/compute/32-06/desc/util/twistlock_jenkins_plugin_get.md index 9fb8d4a02..c9f180e5e 100644 --- a/openapi-specs/compute/32-06/desc/util/twistlock_jenkins_plugin_get.md +++ b/openapi-specs/compute/32-06/desc/util/twistlock_jenkins_plugin_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-jenkins-plugin.hpi \ diff --git a/openapi-specs/compute/32-06/desc/util/twistlock_tas_tile_get.md b/openapi-specs/compute/32-06/desc/util/twistlock_tas_tile_get.md index fea28aaad..3fd114e2d 100644 --- a/openapi-specs/compute/32-06/desc/util/twistlock_tas_tile_get.md +++ b/openapi-specs/compute/32-06/desc/util/twistlock_tas_tile_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-tile.pivotal \ diff --git a/openapi-specs/compute/32-06/desc/util/windows_twistcli_get.md b/openapi-specs/compute/32-06/desc/util/windows_twistcli_get.md index 1c545dbbb..38c609b08 100644 --- a/openapi-specs/compute/32-06/desc/util/windows_twistcli_get.md +++ b/openapi-specs/compute/32-06/desc/util/windows_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Windows platform** hyperlink in **Manage > System > The following cURL command downloads the twistcli binary executable for Windows platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli.exe \ diff --git a/openapi-specs/compute/32-06/desc/version/get.md b/openapi-specs/compute/32-06/desc/version/get.md index 28be315e0..5787e90fd 100644 --- a/openapi-specs/compute/32-06/desc/version/get.md +++ b/openapi-specs/compute/32-06/desc/version/get.md @@ -5,7 +5,7 @@ Retrieves the version number for Console. The following cURL command retrieves the version number for Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/vms/download_get.md b/openapi-specs/compute/32-06/desc/vms/download_get.md index e65e4efc9..3cc813bc5 100644 --- a/openapi-specs/compute/32-06/desc/vms/download_get.md +++ b/openapi-specs/compute/32-06/desc/vms/download_get.md @@ -7,7 +7,7 @@ Returns all VM image scan reports in CSV format. Refer to the following example cURL command that retrieves all VM image scan reports and saves the results in a CSV file called `vm_images_scan.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/vms/get.md b/openapi-specs/compute/32-06/desc/vms/get.md index d44d9d801..ad9938124 100644 --- a/openapi-specs/compute/32-06/desc/vms/get.md +++ b/openapi-specs/compute/32-06/desc/vms/get.md @@ -10,7 +10,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > Hosts > VM imag Refer to the following example cURL command that retrieves all VM image scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/vms/labels_get.md b/openapi-specs/compute/32-06/desc/vms/labels_get.md index ad678b30d..eb2674bf6 100644 --- a/openapi-specs/compute/32-06/desc/vms/labels_get.md +++ b/openapi-specs/compute/32-06/desc/vms/labels_get.md @@ -5,7 +5,7 @@ Returns an array of strings containing all AWS tags of the scanned VM images. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-06/desc/vms/names_get.md b/openapi-specs/compute/32-06/desc/vms/names_get.md index 0283ed28e..0b905c37b 100644 --- a/openapi-specs/compute/32-06/desc/vms/names_get.md +++ b/openapi-specs/compute/32-06/desc/vms/names_get.md @@ -6,7 +6,7 @@ Returns an array of strings containing VM image names. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-06/desc/vms/scan_post.md b/openapi-specs/compute/32-06/desc/vms/scan_post.md index 1caa2dcaf..4d4de3ab1 100644 --- a/openapi-specs/compute/32-06/desc/vms/scan_post.md +++ b/openapi-specs/compute/32-06/desc/vms/scan_post.md @@ -5,7 +5,7 @@ Re-scans all VM images immediately. This endpoint returns the time that the scan Refer to the following example cURL command that forces Prisma Cloud to re-scan all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-06/desc/vms/stop_post.md b/openapi-specs/compute/32-06/desc/vms/stop_post.md index 4a74743eb..49b2b26f9 100644 --- a/openapi-specs/compute/32-06/desc/vms/stop_post.md +++ b/openapi-specs/compute/32-06/desc/vms/stop_post.md @@ -7,7 +7,7 @@ Note: It might take a few minutes for the scan to stop completely. Refer to the following example cURL command that forces Prisma Cloud to stop scanning all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/SCAP/get.md b/openapi-specs/compute/32-07/desc/SCAP/get.md index a25abe94e..f5870d822 100644 --- a/openapi-specs/compute/32-07/desc/SCAP/get.md +++ b/openapi-specs/compute/32-07/desc/SCAP/get.md @@ -3,7 +3,7 @@ This endpoint will return any SCAP datastreams uploaded to the console. This end The following is an example curl command that uses basic auth to retrieve any uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/SCAP/id_delete.md b/openapi-specs/compute/32-07/desc/SCAP/id_delete.md index 39f1b0132..52923f20a 100644 --- a/openapi-specs/compute/32-07/desc/SCAP/id_delete.md +++ b/openapi-specs/compute/32-07/desc/SCAP/id_delete.md @@ -3,7 +3,7 @@ This endpoint will delete any SCAP datastreams uploaded to the console. You can The following is an example curl command that uses basic auth to delete an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-07/desc/SCAP/post.md b/openapi-specs/compute/32-07/desc/SCAP/post.md index d459a0e97..c45fd6b4e 100644 --- a/openapi-specs/compute/32-07/desc/SCAP/post.md +++ b/openapi-specs/compute/32-07/desc/SCAP/post.md @@ -3,7 +3,7 @@ This endpoint will allow you to add a SCAP datastream to the console. The following is an example curl command that uses basic auth to add an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/_ping/get.md b/openapi-specs/compute/32-07/desc/_ping/get.md index 8e143ef67..b7ffdc653 100644 --- a/openapi-specs/compute/32-07/desc/_ping/get.md +++ b/openapi-specs/compute/32-07/desc/_ping/get.md @@ -5,7 +5,7 @@ Checks if Console is reachable from your network host. Refer to the following cURL example command that pings Console and prints the HTTP response code: ```bash -$ curl -k \ +$ curl \ -s \ -o /dev/null \ -w "%{http_code}\n" \ diff --git a/openapi-specs/compute/32-07/desc/agentless/get_agentless_progress.md b/openapi-specs/compute/32-07/desc/agentless/get_agentless_progress.md index b98ed9da5..78396eec6 100644 --- a/openapi-specs/compute/32-07/desc/agentless/get_agentless_progress.md +++ b/openapi-specs/compute/32-07/desc/agentless/get_agentless_progress.md @@ -5,7 +5,7 @@ Shows the progress of an ongoing scan on hosts or containers for vulnerabilities Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/agentless/post_agentless_scan.md b/openapi-specs/compute/32-07/desc/agentless/post_agentless_scan.md index f1295cdc4..e2f8a4e11 100644 --- a/openapi-specs/compute/32-07/desc/agentless/post_agentless_scan.md +++ b/openapi-specs/compute/32-07/desc/agentless/post_agentless_scan.md @@ -9,7 +9,7 @@ Make sure that you download (use the agentless/templates API) and apply the perm Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/agentless/post_agentless_stop.md b/openapi-specs/compute/32-07/desc/agentless/post_agentless_stop.md index ab83960cc..ddee6ec7a 100644 --- a/openapi-specs/compute/32-07/desc/agentless/post_agentless_stop.md +++ b/openapi-specs/compute/32-07/desc/agentless/post_agentless_stop.md @@ -5,7 +5,7 @@ Stops an ongoing scan on hosts or containers for vulnerabilities and compliance. Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/agentless/post_agentless_templates.md b/openapi-specs/compute/32-07/desc/agentless/post_agentless_templates.md index 96be32555..5159c439a 100644 --- a/openapi-specs/compute/32-07/desc/agentless/post_agentless_templates.md +++ b/openapi-specs/compute/32-07/desc/agentless/post_agentless_templates.md @@ -31,7 +31,7 @@ Add the supported cloud accounts (AWS, Azure, GCP, and OCI) in Prisma Cloud Comp Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/alert-profiles/get.md b/openapi-specs/compute/32-07/desc/alert-profiles/get.md index 82647e248..f17191ac4 100644 --- a/openapi-specs/compute/32-07/desc/alert-profiles/get.md +++ b/openapi-specs/compute/32-07/desc/alert-profiles/get.md @@ -3,7 +3,7 @@ Retrieve a list of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/alert-profiles/id_delete.md b/openapi-specs/compute/32-07/desc/alert-profiles/id_delete.md index 1a67fe20e..2cf21b57e 100644 --- a/openapi-specs/compute/32-07/desc/alert-profiles/id_delete.md +++ b/openapi-specs/compute/32-07/desc/alert-profiles/id_delete.md @@ -5,7 +5,7 @@ This method has no response data. The following example curl command deletes an existing alert profile named `PROFILE-NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-07/desc/alert-profiles/names_get.md b/openapi-specs/compute/32-07/desc/alert-profiles/names_get.md index cac14437b..38a1f78ca 100644 --- a/openapi-specs/compute/32-07/desc/alert-profiles/names_get.md +++ b/openapi-specs/compute/32-07/desc/alert-profiles/names_get.md @@ -3,7 +3,7 @@ Retrieve a list of only the names of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles' names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/alert-profiles/post.md b/openapi-specs/compute/32-07/desc/alert-profiles/post.md index 9fa643429..19db863d5 100644 --- a/openapi-specs/compute/32-07/desc/alert-profiles/post.md +++ b/openapi-specs/compute/32-07/desc/alert-profiles/post.md @@ -3,7 +3,7 @@ Update an existing alert profile created in the system. The following example curl command uses basic auth to add a Jira Alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/alert-profiles/test_post.md b/openapi-specs/compute/32-07/desc/alert-profiles/test_post.md index 1fc745efa..2205a6e73 100644 --- a/openapi-specs/compute/32-07/desc/alert-profiles/test_post.md +++ b/openapi-specs/compute/32-07/desc/alert-profiles/test_post.md @@ -3,7 +3,7 @@ Sends a test alert to verify successful configuration of the alert profile setti The following example curl command uses basic auth to send test alert for an email alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/application-control/get.md b/openapi-specs/compute/32-07/desc/application-control/get.md index 5bd600beb..535584284 100644 --- a/openapi-specs/compute/32-07/desc/application-control/get.md +++ b/openapi-specs/compute/32-07/desc/application-control/get.md @@ -3,7 +3,7 @@ Retrieves the host application control rules. The following example curl command uses basic auth to retrieve the control rules: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/access_delete.md b/openapi-specs/compute/32-07/desc/audits/access_delete.md index 37f33ca64..0450b534c 100644 --- a/openapi-specs/compute/32-07/desc/audits/access_delete.md +++ b/openapi-specs/compute/32-07/desc/audits/access_delete.md @@ -2,7 +2,7 @@ Deletes **all** access audits. This deletion cannot be undone. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-07/desc/audits/access_download_get.md b/openapi-specs/compute/32-07/desc/audits/access_download_get.md index 1700deb8d..8d8fee259 100644 --- a/openapi-specs/compute/32-07/desc/audits/access_download_get.md +++ b/openapi-specs/compute/32-07/desc/audits/access_download_get.md @@ -3,7 +3,7 @@ Returns the docker access audit events data in CSV format that are logged and ag **Note**: You can download the access events from Console under **Monitor > Events > Docker audits > Download CSV**. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/access_filters_get.md b/openapi-specs/compute/32-07/desc/audits/access_filters_get.md index 00ac061c1..4b8e9cd9b 100644 --- a/openapi-specs/compute/32-07/desc/audits/access_filters_get.md +++ b/openapi-specs/compute/32-07/desc/audits/access_filters_get.md @@ -5,7 +5,7 @@ The following example uses basic auth to list history of commands that are run o ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ The following command gives list of sudo events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -27,7 +27,7 @@ $ curl -k \ The following command gives list of SSHD events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/access_get.md b/openapi-specs/compute/32-07/desc/audits/access_get.md index 2401391c7..56e53fe12 100644 --- a/openapi-specs/compute/32-07/desc/audits/access_get.md +++ b/openapi-specs/compute/32-07/desc/audits/access_get.md @@ -8,7 +8,7 @@ You can configure Prisma Cloud Compute to log and aggregate events such as sudo Refer to the following example cURL command that gives a list of all access audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/admission_download_get.md b/openapi-specs/compute/32-07/desc/audits/admission_download_get.md index 9571c483f..d45f47c4e 100644 --- a/openapi-specs/compute/32-07/desc/audits/admission_download_get.md +++ b/openapi-specs/compute/32-07/desc/audits/admission_download_get.md @@ -4,7 +4,7 @@ Returns the access admission events data in CSV format that were alerted or bloc Refer to the following example cURL command that downloads the admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/admission_get.md b/openapi-specs/compute/32-07/desc/audits/admission_get.md index 84414496c..3640c737c 100644 --- a/openapi-specs/compute/32-07/desc/audits/admission_get.md +++ b/openapi-specs/compute/32-07/desc/audits/admission_get.md @@ -4,7 +4,7 @@ Returns all activities that were alerted or blocked by Defender functioning as O Refer to the following example cURL command that gives a list of all admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/firewall_network_container_download_get.md b/openapi-specs/compute/32-07/desc/audits/firewall_network_container_download_get.md index 29029ac6d..434e09acd 100644 --- a/openapi-specs/compute/32-07/desc/audits/firewall_network_container_download_get.md +++ b/openapi-specs/compute/32-07/desc/audits/firewall_network_container_download_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/firewall_network_container_get.md b/openapi-specs/compute/32-07/desc/audits/firewall_network_container_get.md index 454558a44..be03b2c45 100644 --- a/openapi-specs/compute/32-07/desc/audits/firewall_network_container_get.md +++ b/openapi-specs/compute/32-07/desc/audits/firewall_network_container_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/firewall_network_host_download_get.md b/openapi-specs/compute/32-07/desc/audits/firewall_network_host_download_get.md index 768dd00d7..e83e8e1c3 100644 --- a/openapi-specs/compute/32-07/desc/audits/firewall_network_host_download_get.md +++ b/openapi-specs/compute/32-07/desc/audits/firewall_network_host_download_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/firewall_network_host_get.md b/openapi-specs/compute/32-07/desc/audits/firewall_network_host_get.md index e5dc4c399..6cbda0d4b 100644 --- a/openapi-specs/compute/32-07/desc/audits/firewall_network_host_get.md +++ b/openapi-specs/compute/32-07/desc/audits/firewall_network_host_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/incidents_archive_patch.md b/openapi-specs/compute/32-07/desc/audits/incidents_archive_patch.md index a1127a001..d1f42eedd 100644 --- a/openapi-specs/compute/32-07/desc/audits/incidents_archive_patch.md +++ b/openapi-specs/compute/32-07/desc/audits/incidents_archive_patch.md @@ -7,7 +7,7 @@ You can get an incident ID from the list of incidents using the endpoint GET /ap Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/compute/32-07/desc/audits/incidents_download_get.md b/openapi-specs/compute/32-07/desc/audits/incidents_download_get.md index 2266c3471..5958756bf 100644 --- a/openapi-specs/compute/32-07/desc/audits/incidents_download_get.md +++ b/openapi-specs/compute/32-07/desc/audits/incidents_download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the **CSV** hyperlink in **Monitor > Runtime > Incident ex The following cURL command downloads all incidents and saves the result in a CSV file called `incidents.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/incidents_filters_get.md b/openapi-specs/compute/32-07/desc/audits/incidents_filters_get.md index 7d1c6f303..856881c90 100644 --- a/openapi-specs/compute/32-07/desc/audits/incidents_filters_get.md +++ b/openapi-specs/compute/32-07/desc/audits/incidents_filters_get.md @@ -3,7 +3,7 @@ This endpoint lists the incident categories found in your environment. The following example lists incident filters. ```bash -$ curl -k \ +$ curl \ -u \ https://console:8083/api/v1/audits/incidents/filters ``` diff --git a/openapi-specs/compute/32-07/desc/audits/incidents_get.md b/openapi-specs/compute/32-07/desc/audits/incidents_get.md index 7724a08c1..9b9451821 100644 --- a/openapi-specs/compute/32-07/desc/audits/incidents_get.md +++ b/openapi-specs/compute/32-07/desc/audits/incidents_get.md @@ -9,7 +9,7 @@ This endpoint maps to the table in **Monitor > Runtime > Incident explorer** in Refer to the following example cURL command that retrieves a list of unacknowledged incidents (not in the archived state): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/kubernetes_download_get.md b/openapi-specs/compute/32-07/desc/audits/kubernetes_download_get.md index 6008bd92a..62992095c 100644 --- a/openapi-specs/compute/32-07/desc/audits/kubernetes_download_get.md +++ b/openapi-specs/compute/32-07/desc/audits/kubernetes_download_get.md @@ -7,7 +7,7 @@ Returns the audit events data that occur in an integrated Kubernetes cluster tha Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/kubernetes_get.md b/openapi-specs/compute/32-07/desc/audits/kubernetes_get.md index e1ecb8a88..2e3f51b71 100644 --- a/openapi-specs/compute/32-07/desc/audits/kubernetes_get.md +++ b/openapi-specs/compute/32-07/desc/audits/kubernetes_get.md @@ -7,7 +7,7 @@ Retrieves events that occur in an integrated Kubernetes cluster that you configu Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/mgmt_download_get.md b/openapi-specs/compute/32-07/desc/audits/mgmt_download_get.md index ae3ef45b6..bcee17342 100644 --- a/openapi-specs/compute/32-07/desc/audits/mgmt_download_get.md +++ b/openapi-specs/compute/32-07/desc/audits/mgmt_download_get.md @@ -10,7 +10,7 @@ Management audits are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/mgmt_filters_get.md b/openapi-specs/compute/32-07/desc/audits/mgmt_filters_get.md index 854977b99..f910a4c2a 100644 --- a/openapi-specs/compute/32-07/desc/audits/mgmt_filters_get.md +++ b/openapi-specs/compute/32-07/desc/audits/mgmt_filters_get.md @@ -6,7 +6,7 @@ Use these filters to query management audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/mgmt_get.md b/openapi-specs/compute/32-07/desc/audits/mgmt_get.md index 5b586cb5e..abe802348 100644 --- a/openapi-specs/compute/32-07/desc/audits/mgmt_get.md +++ b/openapi-specs/compute/32-07/desc/audits/mgmt_get.md @@ -10,7 +10,7 @@ Management audit events are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/runtime_app_embedded_download_get.md b/openapi-specs/compute/32-07/desc/audits/runtime_app_embedded_download_get.md index f3d844ead..ec5ae0f2a 100644 --- a/openapi-specs/compute/32-07/desc/audits/runtime_app_embedded_download_get.md +++ b/openapi-specs/compute/32-07/desc/audits/runtime_app_embedded_download_get.md @@ -5,7 +5,7 @@ Returns the app-embedded runtime audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/runtime_app_embedded_get.md b/openapi-specs/compute/32-07/desc/audits/runtime_app_embedded_get.md index c1d72acfa..51a43b7f5 100644 --- a/openapi-specs/compute/32-07/desc/audits/runtime_app_embedded_get.md +++ b/openapi-specs/compute/32-07/desc/audits/runtime_app_embedded_get.md @@ -5,7 +5,7 @@ Retrieves all app-embedded runtime audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/runtime_container_delete.md b/openapi-specs/compute/32-07/desc/audits/runtime_container_delete.md index ddc8e82d6..62050c71f 100644 --- a/openapi-specs/compute/32-07/desc/audits/runtime_container_delete.md +++ b/openapi-specs/compute/32-07/desc/audits/runtime_container_delete.md @@ -3,7 +3,7 @@ Deletes all container runtime audits. The following example curl command uses basic auth to delete all the audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-07/desc/audits/runtime_container_download_get.md b/openapi-specs/compute/32-07/desc/audits/runtime_container_download_get.md index 20e673b5e..81286d929 100644 --- a/openapi-specs/compute/32-07/desc/audits/runtime_container_download_get.md +++ b/openapi-specs/compute/32-07/desc/audits/runtime_container_download_get.md @@ -6,7 +6,7 @@ Returns the container audit events data in CSV format when a runtime sensor such Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o \ diff --git a/openapi-specs/compute/32-07/desc/audits/runtime_container_get.md b/openapi-specs/compute/32-07/desc/audits/runtime_container_get.md index 11beffb24..a6b6ba484 100644 --- a/openapi-specs/compute/32-07/desc/audits/runtime_container_get.md +++ b/openapi-specs/compute/32-07/desc/audits/runtime_container_get.md @@ -7,7 +7,7 @@ Retrieves all container audit events when a runtime sensor such as process, netw Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/runtime_container_timeslice_get.md b/openapi-specs/compute/32-07/desc/audits/runtime_container_timeslice_get.md index f65d477af..01df48f28 100644 --- a/openapi-specs/compute/32-07/desc/audits/runtime_container_timeslice_get.md +++ b/openapi-specs/compute/32-07/desc/audits/runtime_container_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/runtime_file-integrity_download_get.md b/openapi-specs/compute/32-07/desc/audits/runtime_file-integrity_download_get.md index 99ec70c52..234c3ce32 100644 --- a/openapi-specs/compute/32-07/desc/audits/runtime_file-integrity_download_get.md +++ b/openapi-specs/compute/32-07/desc/audits/runtime_file-integrity_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for file-integrity checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/runtime_file-integrity_get.md b/openapi-specs/compute/32-07/desc/audits/runtime_file-integrity_get.md index 53fec9f9f..c31904422 100644 --- a/openapi-specs/compute/32-07/desc/audits/runtime_file-integrity_get.md +++ b/openapi-specs/compute/32-07/desc/audits/runtime_file-integrity_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for file-integrity checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/runtime_host_delete.md b/openapi-specs/compute/32-07/desc/audits/runtime_host_delete.md index 0ab1c877e..2ada9b15a 100644 --- a/openapi-specs/compute/32-07/desc/audits/runtime_host_delete.md +++ b/openapi-specs/compute/32-07/desc/audits/runtime_host_delete.md @@ -3,7 +3,7 @@ Deletes all host audits from the database. The following example curl command uses basic auth to delete all host audits: ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/audits/runtime/host diff --git a/openapi-specs/compute/32-07/desc/audits/runtime_host_download_get.md b/openapi-specs/compute/32-07/desc/audits/runtime_host_download_get.md index 4d0454f56..d85cc39d0 100644 --- a/openapi-specs/compute/32-07/desc/audits/runtime_host_download_get.md +++ b/openapi-specs/compute/32-07/desc/audits/runtime_host_download_get.md @@ -5,7 +5,7 @@ Returns the runtime host audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/runtime_host_get.md b/openapi-specs/compute/32-07/desc/audits/runtime_host_get.md index 044b8b42d..e063550d6 100644 --- a/openapi-specs/compute/32-07/desc/audits/runtime_host_get.md +++ b/openapi-specs/compute/32-07/desc/audits/runtime_host_get.md @@ -5,7 +5,7 @@ Retrieves the runtime host audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/runtime_host_timeslice_get.md b/openapi-specs/compute/32-07/desc/audits/runtime_host_timeslice_get.md index 8933efa74..aafd869b8 100644 --- a/openapi-specs/compute/32-07/desc/audits/runtime_host_timeslice_get.md +++ b/openapi-specs/compute/32-07/desc/audits/runtime_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/runtime_log-inspection_download_get.md b/openapi-specs/compute/32-07/desc/audits/runtime_log-inspection_download_get.md index f047ed96f..0aa1a5710 100644 --- a/openapi-specs/compute/32-07/desc/audits/runtime_log-inspection_download_get.md +++ b/openapi-specs/compute/32-07/desc/audits/runtime_log-inspection_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for log inspection checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/runtime_log-inspection_get.md b/openapi-specs/compute/32-07/desc/audits/runtime_log-inspection_get.md index 49f0d7be4..8292b623e 100644 --- a/openapi-specs/compute/32-07/desc/audits/runtime_log-inspection_get.md +++ b/openapi-specs/compute/32-07/desc/audits/runtime_log-inspection_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for log inspection checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/runtime_rasp_delete.md b/openapi-specs/compute/32-07/desc/audits/runtime_rasp_delete.md index 688e04038..14315c55b 100644 --- a/openapi-specs/compute/32-07/desc/audits/runtime_rasp_delete.md +++ b/openapi-specs/compute/32-07/desc/audits/runtime_rasp_delete.md @@ -1,7 +1,7 @@ Deletes all RASP Defender runtime audits. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-07/desc/audits/runtime_rasp_download_get.md b/openapi-specs/compute/32-07/desc/audits/runtime_rasp_download_get.md index 303c75858..11a85100d 100644 --- a/openapi-specs/compute/32-07/desc/audits/runtime_rasp_download_get.md +++ b/openapi-specs/compute/32-07/desc/audits/runtime_rasp_download_get.md @@ -1,7 +1,7 @@ Returns CSV data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/runtime_rasp_get.md b/openapi-specs/compute/32-07/desc/audits/runtime_rasp_get.md index 229d908b1..0475cb149 100644 --- a/openapi-specs/compute/32-07/desc/audits/runtime_rasp_get.md +++ b/openapi-specs/compute/32-07/desc/audits/runtime_rasp_get.md @@ -1,7 +1,7 @@ Returns JSON data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/runtime_serverless_delete.md b/openapi-specs/compute/32-07/desc/audits/runtime_serverless_delete.md index 99ada0515..e27ebe858 100644 --- a/openapi-specs/compute/32-07/desc/audits/runtime_serverless_delete.md +++ b/openapi-specs/compute/32-07/desc/audits/runtime_serverless_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to delete the current audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-07/desc/audits/runtime_serverless_download_get.md b/openapi-specs/compute/32-07/desc/audits/runtime_serverless_download_get.md index f829d2342..91693c145 100644 --- a/openapi-specs/compute/32-07/desc/audits/runtime_serverless_download_get.md +++ b/openapi-specs/compute/32-07/desc/audits/runtime_serverless_download_get.md @@ -5,7 +5,7 @@ Returns the scan audit events data in CSV format for any configured serverless f Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/runtime_serverless_filters_get.md b/openapi-specs/compute/32-07/desc/audits/runtime_serverless_filters_get.md index b9bf38610..babda78dd 100644 --- a/openapi-specs/compute/32-07/desc/audits/runtime_serverless_filters_get.md +++ b/openapi-specs/compute/32-07/desc/audits/runtime_serverless_filters_get.md @@ -2,7 +2,7 @@ Returns all serverless filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/runtime_serverless_get.md b/openapi-specs/compute/32-07/desc/audits/runtime_serverless_get.md index 045946886..f6aeb748e 100644 --- a/openapi-specs/compute/32-07/desc/audits/runtime_serverless_get.md +++ b/openapi-specs/compute/32-07/desc/audits/runtime_serverless_get.md @@ -5,7 +5,7 @@ Retrieves all scan events for any configured serverless functions in Prisma Clou Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/runtime_serverless_timeslice_get.md b/openapi-specs/compute/32-07/desc/audits/runtime_serverless_timeslice_get.md index 863890174..a2456cec0 100644 --- a/openapi-specs/compute/32-07/desc/audits/runtime_serverless_timeslice_get.md +++ b/openapi-specs/compute/32-07/desc/audits/runtime_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/trust_delete.md b/openapi-specs/compute/32-07/desc/audits/trust_delete.md index 0bfb2bd81..4aaeef3fe 100644 --- a/openapi-specs/compute/32-07/desc/audits/trust_delete.md +++ b/openapi-specs/compute/32-07/desc/audits/trust_delete.md @@ -1,7 +1,7 @@ Deletes all the trust audits from the events page in Console. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-07/desc/audits/trust_download_get.md b/openapi-specs/compute/32-07/desc/audits/trust_download_get.md index 21c0e55a2..234089449 100644 --- a/openapi-specs/compute/32-07/desc/audits/trust_download_get.md +++ b/openapi-specs/compute/32-07/desc/audits/trust_download_get.md @@ -5,7 +5,7 @@ Returns the trust audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/trust_get.md b/openapi-specs/compute/32-07/desc/audits/trust_get.md index 8fb3a341d..de7d47e96 100644 --- a/openapi-specs/compute/32-07/desc/audits/trust_get.md +++ b/openapi-specs/compute/32-07/desc/audits/trust_get.md @@ -4,7 +4,7 @@ Retrieves all the trust audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/waas_agentless_download_get.md b/openapi-specs/compute/32-07/desc/audits/waas_agentless_download_get.md index bbfcd12f5..f930ef6b3 100644 --- a/openapi-specs/compute/32-07/desc/audits/waas_agentless_download_get.md +++ b/openapi-specs/compute/32-07/desc/audits/waas_agentless_download_get.md @@ -7,7 +7,7 @@ Returns the agentless Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/waas_agentless_get.md b/openapi-specs/compute/32-07/desc/audits/waas_agentless_get.md index ad40ae497..b257b0385 100644 --- a/openapi-specs/compute/32-07/desc/audits/waas_agentless_get.md +++ b/openapi-specs/compute/32-07/desc/audits/waas_agentless_get.md @@ -7,7 +7,7 @@ Retrieves all agentless Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/waas_agentless_timeslice_get.md b/openapi-specs/compute/32-07/desc/audits/waas_agentless_timeslice_get.md index 007c6dba3..3eaf34b25 100644 --- a/openapi-specs/compute/32-07/desc/audits/waas_agentless_timeslice_get.md +++ b/openapi-specs/compute/32-07/desc/audits/waas_agentless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/waas_app_embedded_download_get.md b/openapi-specs/compute/32-07/desc/audits/waas_app_embedded_download_get.md index 149c10376..c94aa87b0 100644 --- a/openapi-specs/compute/32-07/desc/audits/waas_app_embedded_download_get.md +++ b/openapi-specs/compute/32-07/desc/audits/waas_app_embedded_download_get.md @@ -6,7 +6,7 @@ Returns the app-embedded WAAS audit events data in CSV format for the specified Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/waas_app_embedded_get.md b/openapi-specs/compute/32-07/desc/audits/waas_app_embedded_get.md index 400fa447d..6318fb299 100644 --- a/openapi-specs/compute/32-07/desc/audits/waas_app_embedded_get.md +++ b/openapi-specs/compute/32-07/desc/audits/waas_app_embedded_get.md @@ -6,7 +6,7 @@ Returns all app-embedded WAAS audit events for the specified query parameters. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/waas_app_embedded_timeslice_get.md b/openapi-specs/compute/32-07/desc/audits/waas_app_embedded_timeslice_get.md index 79a60038e..42a76d08c 100644 --- a/openapi-specs/compute/32-07/desc/audits/waas_app_embedded_timeslice_get.md +++ b/openapi-specs/compute/32-07/desc/audits/waas_app_embedded_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the app-embedded WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/waas_container_download_get.md b/openapi-specs/compute/32-07/desc/audits/waas_container_download_get.md index 9a5e04fad..7d26c34f4 100644 --- a/openapi-specs/compute/32-07/desc/audits/waas_container_download_get.md +++ b/openapi-specs/compute/32-07/desc/audits/waas_container_download_get.md @@ -6,7 +6,7 @@ Returns the container Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that downloads the WAAS container audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/waas_container_get.md b/openapi-specs/compute/32-07/desc/audits/waas_container_get.md index ac0df80fd..c1ad08f3c 100644 --- a/openapi-specs/compute/32-07/desc/audits/waas_container_get.md +++ b/openapi-specs/compute/32-07/desc/audits/waas_container_get.md @@ -6,7 +6,7 @@ Retrieves all container Web-Application and API Security (WAAS) audits. Refer to the following example cURL command that retrieves all container WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/waas_container_timeslice_get.md b/openapi-specs/compute/32-07/desc/audits/waas_container_timeslice_get.md index a56b4c48f..be56260d6 100644 --- a/openapi-specs/compute/32-07/desc/audits/waas_container_timeslice_get.md +++ b/openapi-specs/compute/32-07/desc/audits/waas_container_timeslice_get.md @@ -11,7 +11,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the container WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s):: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/waas_host_download_get.md b/openapi-specs/compute/32-07/desc/audits/waas_host_download_get.md index 4bc66202b..71692e682 100644 --- a/openapi-specs/compute/32-07/desc/audits/waas_host_download_get.md +++ b/openapi-specs/compute/32-07/desc/audits/waas_host_download_get.md @@ -7,7 +7,7 @@ Returns the host Web-Application and API Security (WAAS) audit events data in CS Refer to the following example cURL command that downloads the host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/waas_host_get.md b/openapi-specs/compute/32-07/desc/audits/waas_host_get.md index 14c967594..f6e3df050 100644 --- a/openapi-specs/compute/32-07/desc/audits/waas_host_get.md +++ b/openapi-specs/compute/32-07/desc/audits/waas_host_get.md @@ -7,7 +7,7 @@ Retrieves all host Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/waas_host_timeslice_get.md b/openapi-specs/compute/32-07/desc/audits/waas_host_timeslice_get.md index e28ed7b7a..67b3a54c3 100644 --- a/openapi-specs/compute/32-07/desc/audits/waas_host_timeslice_get.md +++ b/openapi-specs/compute/32-07/desc/audits/waas_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves host WAAS audit events for a specific time frame: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/waas_serverless_download_get.md b/openapi-specs/compute/32-07/desc/audits/waas_serverless_download_get.md index da05504df..0c0dbe698 100644 --- a/openapi-specs/compute/32-07/desc/audits/waas_serverless_download_get.md +++ b/openapi-specs/compute/32-07/desc/audits/waas_serverless_download_get.md @@ -7,7 +7,7 @@ Returns the serverless function Web-Application and API Security (WAAS) audit ev Refer to the following example cURL command that downloads the serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/waas_serverless_get.md b/openapi-specs/compute/32-07/desc/audits/waas_serverless_get.md index fe482a3f3..82488f7ee 100644 --- a/openapi-specs/compute/32-07/desc/audits/waas_serverless_get.md +++ b/openapi-specs/compute/32-07/desc/audits/waas_serverless_get.md @@ -7,7 +7,7 @@ Retrieves all serverless function Web-Application and API Security (WAAS) audit Refer to the following example cURL command that retrieves all serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/audits/waas_serverless_timeslice_get.md b/openapi-specs/compute/32-07/desc/audits/waas_serverless_timeslice_get.md index ec9ff3df1..a0a9a1368 100644 --- a/openapi-specs/compute/32-07/desc/audits/waas_serverless_timeslice_get.md +++ b/openapi-specs/compute/32-07/desc/audits/waas_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the serverless WAAS audit events for a : ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/authenticate-client/post.md b/openapi-specs/compute/32-07/desc/authenticate-client/post.md index bc493d04e..ce6f00afe 100644 --- a/openapi-specs/compute/32-07/desc/authenticate-client/post.md +++ b/openapi-specs/compute/32-07/desc/authenticate-client/post.md @@ -8,7 +8,7 @@ This endpoint checks the supplied client certificate and authorizes the user bas Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X POST \ --cert \ https:///api/v/authenticate-client diff --git a/openapi-specs/compute/32-07/desc/authenticate/post.md b/openapi-specs/compute/32-07/desc/authenticate/post.md index cb018de64..4f85c5d34 100644 --- a/openapi-specs/compute/32-07/desc/authenticate/post.md +++ b/openapi-specs/compute/32-07/desc/authenticate/post.md @@ -9,7 +9,7 @@ You can set the validity period in Console under **Manage > Authentication > Log Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H "Content-Type: application/json" \ -X POST \ -d \ diff --git a/openapi-specs/compute/32-07/desc/authenticate/renew_get.md b/openapi-specs/compute/32-07/desc/authenticate/renew_get.md index 6040d58e1..3458b500a 100644 --- a/openapi-specs/compute/32-07/desc/authenticate/renew_get.md +++ b/openapi-specs/compute/32-07/desc/authenticate/renew_get.md @@ -5,7 +5,7 @@ Renews an old (unexpired) access token and returns a new token. The following cURL command retrieves a new access token using an old access token. ```bash -$ curl -k \ +$ curl \ -H "Authorization: Bearer " \ https:///api/v1/authenticate/renew ``` diff --git a/openapi-specs/compute/32-07/desc/certs/capem_get.md b/openapi-specs/compute/32-07/desc/certs/capem_get.md index f0f0f1bf3..945476c9b 100644 --- a/openapi-specs/compute/32-07/desc/certs/capem_get.md +++ b/openapi-specs/compute/32-07/desc/certs/capem_get.md @@ -5,7 +5,7 @@ Retrieves the Base64-encoded SSL root certificate self-signed by primary certifi Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/certs/client-certs_get.md b/openapi-specs/compute/32-07/desc/certs/client-certs_get.md index d099b3e3d..279d196b1 100644 --- a/openapi-specs/compute/32-07/desc/certs/client-certs_get.md +++ b/openapi-specs/compute/32-07/desc/certs/client-certs_get.md @@ -3,7 +3,7 @@ Downloads a script that installs a client certificate, client private key, and c The following example curl command uses basic auth to download and run the install script for your client certs: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/certs/client-certs.sh | sh diff --git a/openapi-specs/compute/32-07/desc/certs/server-certs_get.md b/openapi-specs/compute/32-07/desc/certs/server-certs_get.md index 0bb13f51d..118a4d9b0 100644 --- a/openapi-specs/compute/32-07/desc/certs/server-certs_get.md +++ b/openapi-specs/compute/32-07/desc/certs/server-certs_get.md @@ -12,7 +12,7 @@ Retrieves the server certificate bundle from Prisma Cloud Compute that contains Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -u \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/cloud/compliance_download_get.md b/openapi-specs/compute/32-07/desc/cloud/compliance_download_get.md index 7b1ec9fea..14f2725b1 100644 --- a/openapi-specs/compute/32-07/desc/cloud/compliance_download_get.md +++ b/openapi-specs/compute/32-07/desc/cloud/compliance_download_get.md @@ -2,7 +2,7 @@ Download all cloud scan data in CSV format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/cloud/compliance_get.md b/openapi-specs/compute/32-07/desc/cloud/compliance_get.md index 48c2fe5bb..ad47e0998 100644 --- a/openapi-specs/compute/32-07/desc/cloud/compliance_get.md +++ b/openapi-specs/compute/32-07/desc/cloud/compliance_get.md @@ -2,7 +2,7 @@ Returns a list of all cloud compliance scan results. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/cloud/compliance_scan_post.md b/openapi-specs/compute/32-07/desc/cloud/compliance_scan_post.md index 7f87bf1f4..7321c3b9d 100644 --- a/openapi-specs/compute/32-07/desc/cloud/compliance_scan_post.md +++ b/openapi-specs/compute/32-07/desc/cloud/compliance_scan_post.md @@ -2,7 +2,7 @@ Initiates a new cloud compliance scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/cloud/compliance_stop_post.md b/openapi-specs/compute/32-07/desc/cloud/compliance_stop_post.md index df0febb56..60c31dc51 100644 --- a/openapi-specs/compute/32-07/desc/cloud/compliance_stop_post.md +++ b/openapi-specs/compute/32-07/desc/cloud/compliance_stop_post.md @@ -2,7 +2,7 @@ Terminates a cloud compliance scan that's in progress.. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/cloud/discovery_download_get.md b/openapi-specs/compute/32-07/desc/cloud/discovery_download_get.md index 44d60a113..a667c8471 100644 --- a/openapi-specs/compute/32-07/desc/cloud/discovery_download_get.md +++ b/openapi-specs/compute/32-07/desc/cloud/discovery_download_get.md @@ -5,7 +5,7 @@ Downloads all cloud scan data in a CSV file. Refer to the following cURL example command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/cloud/discovery_entities_get.md b/openapi-specs/compute/32-07/desc/cloud/discovery_entities_get.md index a7abbdfb6..85f1be971 100644 --- a/openapi-specs/compute/32-07/desc/cloud/discovery_entities_get.md +++ b/openapi-specs/compute/32-07/desc/cloud/discovery_entities_get.md @@ -7,7 +7,7 @@ Use this API endpoint along with the `GET, api/vVERSION/cloud/discovery` to get Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/cloud/discovery_get.md b/openapi-specs/compute/32-07/desc/cloud/discovery_get.md index 28025f140..c2b4c6e3c 100644 --- a/openapi-specs/compute/32-07/desc/cloud/discovery_get.md +++ b/openapi-specs/compute/32-07/desc/cloud/discovery_get.md @@ -8,7 +8,7 @@ Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/cloud/discovery_scan_post.md b/openapi-specs/compute/32-07/desc/cloud/discovery_scan_post.md index 51799ebdb..0717096f8 100644 --- a/openapi-specs/compute/32-07/desc/cloud/discovery_scan_post.md +++ b/openapi-specs/compute/32-07/desc/cloud/discovery_scan_post.md @@ -5,7 +5,7 @@ Initiates a new cloud discovery scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/cloud/discovery_stop_post.md b/openapi-specs/compute/32-07/desc/cloud/discovery_stop_post.md index 6a6c7a5a5..73dbf46e7 100644 --- a/openapi-specs/compute/32-07/desc/cloud/discovery_stop_post.md +++ b/openapi-specs/compute/32-07/desc/cloud/discovery_stop_post.md @@ -5,7 +5,7 @@ Terminates a cloud discovery scan that's in progress. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/cloud/discovery_vms_get.md b/openapi-specs/compute/32-07/desc/cloud/discovery_vms_get.md index 6766f4e5a..2264a27fe 100644 --- a/openapi-specs/compute/32-07/desc/cloud/discovery_vms_get.md +++ b/openapi-specs/compute/32-07/desc/cloud/discovery_vms_get.md @@ -5,7 +5,7 @@ Returns the discovered cloud VM instances. Refer to the following example cURL command that retrieves all the discovered cloud VM instances: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/coderepos/download_get.md b/openapi-specs/compute/32-07/desc/coderepos/download_get.md index 4ec0197bb..b06dd9f17 100644 --- a/openapi-specs/compute/32-07/desc/coderepos/download_get.md +++ b/openapi-specs/compute/32-07/desc/coderepos/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Code re The following cURL command generates a CSV file containing the reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/coderepos/get.md b/openapi-specs/compute/32-07/desc/coderepos/get.md index 54c4e99bf..42dc16fb6 100644 --- a/openapi-specs/compute/32-07/desc/coderepos/get.md +++ b/openapi-specs/compute/32-07/desc/coderepos/get.md @@ -10,7 +10,7 @@ This endpoint maps to the **Code repositories** table in **Monitor > Vulnerabili The following cURL command retrieves all code repository scan reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/collections/get.md b/openapi-specs/compute/32-07/desc/collections/get.md index 99120d17d..5a9e8a50c 100755 --- a/openapi-specs/compute/32-07/desc/collections/get.md +++ b/openapi-specs/compute/32-07/desc/collections/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table in **Manage > Collections and Tags > Collections Refer to the following example cURL command that returns a list of collections: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/collections/name_delete.md b/openapi-specs/compute/32-07/desc/collections/name_delete.md index 3e2debd01..033358000 100755 --- a/openapi-specs/compute/32-07/desc/collections/name_delete.md +++ b/openapi-specs/compute/32-07/desc/collections/name_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that deletes a collection with the name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-07/desc/collections/name_usages_get.md b/openapi-specs/compute/32-07/desc/collections/name_usages_get.md index 5c9c40424..89e383cce 100755 --- a/openapi-specs/compute/32-07/desc/collections/name_usages_get.md +++ b/openapi-specs/compute/32-07/desc/collections/name_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that retrieves all policies with name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/containers/count_get.md b/openapi-specs/compute/32-07/desc/containers/count_get.md index 4c6ecdcb4..aca59a913 100644 --- a/openapi-specs/compute/32-07/desc/containers/count_get.md +++ b/openapi-specs/compute/32-07/desc/containers/count_get.md @@ -5,7 +5,7 @@ Returns an integer representing the number of containers in your environment. Refer to the following example cURL command that returns the number of containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/containers/download_get.md b/openapi-specs/compute/32-07/desc/containers/download_get.md index 5c0811d7c..5ed3fec35 100644 --- a/openapi-specs/compute/32-07/desc/containers/download_get.md +++ b/openapi-specs/compute/32-07/desc/containers/download_get.md @@ -9,7 +9,7 @@ You can download the container scan reports in CSV format in Console under **Mon Refer to the following example cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/containers/filters_get.md b/openapi-specs/compute/32-07/desc/containers/filters_get.md index c8a1dfca4..6c2777819 100644 --- a/openapi-specs/compute/32-07/desc/containers/filters_get.md +++ b/openapi-specs/compute/32-07/desc/containers/filters_get.md @@ -1,7 +1,7 @@ Returns all container filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/containers/get.md b/openapi-specs/compute/32-07/desc/containers/get.md index 4cacdde60..3de9dd4af 100644 --- a/openapi-specs/compute/32-07/desc/containers/get.md +++ b/openapi-specs/compute/32-07/desc/containers/get.md @@ -16,7 +16,7 @@ Refer to the following available options for the `fields` query parameters: Refer to the following example cURL command that retrieves a scan report for all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -26,7 +26,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a scan report for a container with the collection ``: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/containers/labels_get.md b/openapi-specs/compute/32-07/desc/containers/labels_get.md index eb40a748d..7a63ab6fb 100644 --- a/openapi-specs/compute/32-07/desc/containers/labels_get.md +++ b/openapi-specs/compute/32-07/desc/containers/labels_get.md @@ -1,7 +1,7 @@ Returns an array of strings containing all of the labels. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/containers/names_get.md b/openapi-specs/compute/32-07/desc/containers/names_get.md index 8b32465d5..9025e2e10 100644 --- a/openapi-specs/compute/32-07/desc/containers/names_get.md +++ b/openapi-specs/compute/32-07/desc/containers/names_get.md @@ -5,7 +5,7 @@ Returns an array of strings containing all container names. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/containers/scan_post.md b/openapi-specs/compute/32-07/desc/containers/scan_post.md index 6b2bdaaba..56137cf64 100644 --- a/openapi-specs/compute/32-07/desc/containers/scan_post.md +++ b/openapi-specs/compute/32-07/desc/containers/scan_post.md @@ -4,7 +4,7 @@ This endpoint returns the time that the scans were initiated. The following example command uses curl and basic auth to force Prisma Cloud Compute to re-scan all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/credentials/get.md b/openapi-specs/compute/32-07/desc/credentials/get.md index ee4309dee..b807ce8f3 100644 --- a/openapi-specs/compute/32-07/desc/credentials/get.md +++ b/openapi-specs/compute/32-07/desc/credentials/get.md @@ -6,7 +6,7 @@ This endpoint maps to **Manage > Authentication > Credentials store** in the Con Refer to the following example cURL command that retrieves all credentials: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/credentials/id_delete.md b/openapi-specs/compute/32-07/desc/credentials/id_delete.md index e5c70259e..27f090158 100644 --- a/openapi-specs/compute/32-07/desc/credentials/id_delete.md +++ b/openapi-specs/compute/32-07/desc/credentials/id_delete.md @@ -14,7 +14,7 @@ To invoke this endpoint in the Prisma Cloud Compute user interface: Refer to the following example cURL command that deletes an existing credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-07/desc/credentials/id_usages_get.md b/openapi-specs/compute/32-07/desc/credentials/id_usages_get.md index 76c1099aa..ca2ce6216 100644 --- a/openapi-specs/compute/32-07/desc/credentials/id_usages_get.md +++ b/openapi-specs/compute/32-07/desc/credentials/id_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following cURL command that retrieves all usages for a credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/curl_examples.md b/openapi-specs/compute/32-07/desc/curl_examples.md index 3d4fcd468..745d21db3 100644 --- a/openapi-specs/compute/32-07/desc/curl_examples.md +++ b/openapi-specs/compute/32-07/desc/curl_examples.md @@ -6,7 +6,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -17,7 +17,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -29,7 +29,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/compute/32-07/desc/custom-compliance/get.md b/openapi-specs/compute/32-07/desc/custom-compliance/get.md index 9022a87b7..9dddcff4e 100644 --- a/openapi-specs/compute/32-07/desc/custom-compliance/get.md +++ b/openapi-specs/compute/32-07/desc/custom-compliance/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example curl command that gets the list of custom compliance checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/custom-compliance/id_delete.md b/openapi-specs/compute/32-07/desc/custom-compliance/id_delete.md index 72c7183ee..f6536e51d 100644 --- a/openapi-specs/compute/32-07/desc/custom-compliance/id_delete.md +++ b/openapi-specs/compute/32-07/desc/custom-compliance/id_delete.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example cURL command that uses basic auth to delete the compliance check with id 9000: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-07/desc/custom-compliance/put.md b/openapi-specs/compute/32-07/desc/custom-compliance/put.md index 480e41b54..b8760a11f 100644 --- a/openapi-specs/compute/32-07/desc/custom-compliance/put.md +++ b/openapi-specs/compute/32-07/desc/custom-compliance/put.md @@ -21,7 +21,7 @@ Create `custom_check.json` file (example): Refer to the following example curl command that uses basic auth to update the checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-07/desc/custom-rules/get.md b/openapi-specs/compute/32-07/desc/custom-rules/get.md index f0385f81a..f77924be8 100644 --- a/openapi-specs/compute/32-07/desc/custom-rules/get.md +++ b/openapi-specs/compute/32-07/desc/custom-rules/get.md @@ -7,7 +7,7 @@ This endpoint maps to the policy table in **Defend > Custom rules** in the Conso Refer to the following example cURL command that retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/custom-rules/id_delete.md b/openapi-specs/compute/32-07/desc/custom-rules/id_delete.md index c0d6dc8b0..01412abf3 100644 --- a/openapi-specs/compute/32-07/desc/custom-rules/id_delete.md +++ b/openapi-specs/compute/32-07/desc/custom-rules/id_delete.md @@ -5,7 +5,7 @@ Deletes a custom rule. Refer to the following example cURL command that deletes a custom rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-07/desc/cves/distribution_get.md b/openapi-specs/compute/32-07/desc/cves/distribution_get.md index aecddce23..7365e1a5e 100644 --- a/openapi-specs/compute/32-07/desc/cves/distribution_get.md +++ b/openapi-specs/compute/32-07/desc/cves/distribution_get.md @@ -3,7 +3,7 @@ Retrieves CVEs from the vulnerability database grouped into distribution where y The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/cves/get.md b/openapi-specs/compute/32-07/desc/cves/get.md index 469ea4b28..f81223298 100644 --- a/openapi-specs/compute/32-07/desc/cves/get.md +++ b/openapi-specs/compute/32-07/desc/cves/get.md @@ -6,7 +6,7 @@ A null response indicates that the CVE is not in our database. The following example curl command queries the Prisma Cloud Compute database for `CVE-2018-1102`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/defenders/app_embedded_post.md b/openapi-specs/compute/32-07/desc/defenders/app_embedded_post.md index 9167469d0..7999cbadb 100644 --- a/openapi-specs/compute/32-07/desc/defenders/app_embedded_post.md +++ b/openapi-specs/compute/32-07/desc/defenders/app_embedded_post.md @@ -5,7 +5,7 @@ Creates an augmented Dockerfile with Defender and dependencies included as a ZIP Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/defenders/daemonset_yaml_get.md b/openapi-specs/compute/32-07/desc/defenders/daemonset_yaml_get.md index 678901a8a..b68869081 100644 --- a/openapi-specs/compute/32-07/desc/defenders/daemonset_yaml_get.md +++ b/openapi-specs/compute/32-07/desc/defenders/daemonset_yaml_get.md @@ -10,7 +10,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https://:8083/api/v1/defenders/daemonset.yaml?consoleaddr=&listener=none&namespace=twistlock&orchestration=kubernetes' diff --git a/openapi-specs/compute/32-07/desc/defenders/daemonset_yaml_post.md b/openapi-specs/compute/32-07/desc/defenders/daemonset_yaml_post.md index 8dcf30639..91abe241f 100644 --- a/openapi-specs/compute/32-07/desc/defenders/daemonset_yaml_post.md +++ b/openapi-specs/compute/32-07/desc/defenders/daemonset_yaml_post.md @@ -5,7 +5,7 @@ Creates a DaemonSet deployment file in YAML format that you can use to deploy De Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/defenders/download_get.md b/openapi-specs/compute/32-07/desc/defenders/download_get.md index 2d9435506..67f08c0e5 100644 --- a/openapi-specs/compute/32-07/desc/defenders/download_get.md +++ b/openapi-specs/compute/32-07/desc/defenders/download_get.md @@ -8,7 +8,7 @@ Use the query parameters to filter what data is returned. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o \ diff --git a/openapi-specs/compute/32-07/desc/defenders/fargate_json_post.md b/openapi-specs/compute/32-07/desc/defenders/fargate_json_post.md index 5128e90a1..e2e4e85ab 100644 --- a/openapi-specs/compute/32-07/desc/defenders/fargate_json_post.md +++ b/openapi-specs/compute/32-07/desc/defenders/fargate_json_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command: Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -23,7 +23,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/defenders/fargate_yaml_post.md b/openapi-specs/compute/32-07/desc/defenders/fargate_yaml_post.md index 9a8306a1b..95560526a 100644 --- a/openapi-specs/compute/32-07/desc/defenders/fargate_yaml_post.md +++ b/openapi-specs/compute/32-07/desc/defenders/fargate_yaml_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.yaml` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/yaml' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/defenders/get.md b/openapi-specs/compute/32-07/desc/defenders/get.md index 471e7ef9d..8d2f5cd4c 100644 --- a/openapi-specs/compute/32-07/desc/defenders/get.md +++ b/openapi-specs/compute/32-07/desc/defenders/get.md @@ -7,7 +7,7 @@ This endpoint maps to the UI Console page in **Manage > Defenders > Defenders**. Refer to the following example cURL command that retrieves all deployed Defenders. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/defenders/helm_get.md b/openapi-specs/compute/32-07/desc/defenders/helm_get.md index b11f9c4b9..487c8b7e8 100644 --- a/openapi-specs/compute/32-07/desc/defenders/helm_get.md +++ b/openapi-specs/compute/32-07/desc/defenders/helm_get.md @@ -13,7 +13,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o twistlock-defender-helm.tar.gz \ diff --git a/openapi-specs/compute/32-07/desc/defenders/helm_post.md b/openapi-specs/compute/32-07/desc/defenders/helm_post.md index 2046e63eb..fb76807ae 100644 --- a/openapi-specs/compute/32-07/desc/defenders/helm_post.md +++ b/openapi-specs/compute/32-07/desc/defenders/helm_post.md @@ -5,7 +5,7 @@ Creates a Helm deployment file that you can use to deploy Defenders to your clus Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/defenders/id_delete.md b/openapi-specs/compute/32-07/desc/defenders/id_delete.md index f637ef850..e3ac52daf 100644 --- a/openapi-specs/compute/32-07/desc/defenders/id_delete.md +++ b/openapi-specs/compute/32-07/desc/defenders/id_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes an existing Defender on a host. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-07/desc/defenders/id_features_post.md b/openapi-specs/compute/32-07/desc/defenders/id_features_post.md index ec8e4c5f3..9b42f5fa0 100644 --- a/openapi-specs/compute/32-07/desc/defenders/id_features_post.md +++ b/openapi-specs/compute/32-07/desc/defenders/id_features_post.md @@ -3,7 +3,7 @@ Updates a deployed Defender's configuration. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/defenders/id_restart_post.md b/openapi-specs/compute/32-07/desc/defenders/id_restart_post.md index da0cc7811..7296a186b 100644 --- a/openapi-specs/compute/32-07/desc/defenders/id_restart_post.md +++ b/openapi-specs/compute/32-07/desc/defenders/id_restart_post.md @@ -3,7 +3,7 @@ Restarts Defender on a given host. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/defenders/id_upgrade_post.md b/openapi-specs/compute/32-07/desc/defenders/id_upgrade_post.md index f0d30d1e9..3e63c6414 100644 --- a/openapi-specs/compute/32-07/desc/defenders/id_upgrade_post.md +++ b/openapi-specs/compute/32-07/desc/defenders/id_upgrade_post.md @@ -7,7 +7,7 @@ Upgrades Defender on ``. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/defenders/image-name_get.md b/openapi-specs/compute/32-07/desc/defenders/image-name_get.md index e81ba3e19..19f360c07 100644 --- a/openapi-specs/compute/32-07/desc/defenders/image-name_get.md +++ b/openapi-specs/compute/32-07/desc/defenders/image-name_get.md @@ -5,7 +5,7 @@ Returns the full Docker image name for Defender. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/defenders/install-bundle_get.md b/openapi-specs/compute/32-07/desc/defenders/install-bundle_get.md index 882d0cd53..9b09e733f 100644 --- a/openapi-specs/compute/32-07/desc/defenders/install-bundle_get.md +++ b/openapi-specs/compute/32-07/desc/defenders/install-bundle_get.md @@ -5,7 +5,7 @@ Returns the certificate bundle that Defender needs to securely connect to Consol Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/defenders/names_get.md b/openapi-specs/compute/32-07/desc/defenders/names_get.md index 728eb6364..6339c1483 100644 --- a/openapi-specs/compute/32-07/desc/defenders/names_get.md +++ b/openapi-specs/compute/32-07/desc/defenders/names_get.md @@ -5,7 +5,7 @@ Retrieves a list of Defender hostnames that can be used as the `{id}` query para Refer to the following example cURL command that retrieves a list of all Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -15,7 +15,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of connected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -25,7 +25,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of disconnected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -37,7 +37,7 @@ The endpoint enlists all the connected and disconnected Defenders if do not spec Refer to the following example cURL command that retrieves a list of Defenders by type: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/defenders/rasp_post.md b/openapi-specs/compute/32-07/desc/defenders/rasp_post.md index 526a9e112..e110044dd 100644 --- a/openapi-specs/compute/32-07/desc/defenders/rasp_post.md +++ b/openapi-specs/compute/32-07/desc/defenders/rasp_post.md @@ -7,7 +7,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o rasp-defender.zip diff --git a/openapi-specs/compute/32-07/desc/defenders/serverless-bundle_post.md b/openapi-specs/compute/32-07/desc/defenders/serverless-bundle_post.md index df4f13e6a..7533e436b 100644 --- a/openapi-specs/compute/32-07/desc/defenders/serverless-bundle_post.md +++ b/openapi-specs/compute/32-07/desc/defenders/serverless-bundle_post.md @@ -5,7 +5,7 @@ Downloads a ZIP file with serverless Defender bundle. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/octet-stream' \ -o serverless_bundle.zip \ diff --git a/openapi-specs/compute/32-07/desc/defenders/summary_get.md b/openapi-specs/compute/32-07/desc/defenders/summary_get.md index 08be4ebc4..e308ef64b 100644 --- a/openapi-specs/compute/32-07/desc/defenders/summary_get.md +++ b/openapi-specs/compute/32-07/desc/defenders/summary_get.md @@ -6,7 +6,7 @@ Lists the number of Defenders in each defender category. Refer to the following example cURL command that retrieves a summary of Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/defenders/upgrade_post.md b/openapi-specs/compute/32-07/desc/defenders/upgrade_post.md index 2f0b4d39e..eacd6b779 100644 --- a/openapi-specs/compute/32-07/desc/defenders/upgrade_post.md +++ b/openapi-specs/compute/32-07/desc/defenders/upgrade_post.md @@ -9,7 +9,7 @@ To upgrade Serverless and Fargate Defenders, re-embed them. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/deployment/daemonsets_deploy_post.md b/openapi-specs/compute/32-07/desc/deployment/daemonsets_deploy_post.md index 94ec9386b..b60f28346 100644 --- a/openapi-specs/compute/32-07/desc/deployment/daemonsets_deploy_post.md +++ b/openapi-specs/compute/32-07/desc/deployment/daemonsets_deploy_post.md @@ -5,7 +5,7 @@ It identifies the cluster's API server, user, and credentials. Use the various request parameters to control the properties of the deployed DaemonSet. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/deployment/daemonsets_get.md b/openapi-specs/compute/32-07/desc/deployment/daemonsets_get.md index a0b7f3798..0385acf75 100644 --- a/openapi-specs/compute/32-07/desc/deployment/daemonsets_get.md +++ b/openapi-specs/compute/32-07/desc/deployment/daemonsets_get.md @@ -3,7 +3,7 @@ You must specify a `credentialID`, of type `kubeconfig`, which identifies your c Credentials are managed in Console's credentials store (`/api/v1/credentials`). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/feeds/custom-vulnerabilities_get.md b/openapi-specs/compute/32-07/desc/feeds/custom-vulnerabilities_get.md index 71834f19d..d661acf55 100644 --- a/openapi-specs/compute/32-07/desc/feeds/custom-vulnerabilities_get.md +++ b/openapi-specs/compute/32-07/desc/feeds/custom-vulnerabilities_get.md @@ -11,7 +11,7 @@ Vulnerability rules can be created using the Prisma Cloud Compute. Refer to the following cURL command that retrieves a list of all the custom vulnerabilities and associated rules. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/feeds/custom-vulnerabilities_put.md b/openapi-specs/compute/32-07/desc/feeds/custom-vulnerabilities_put.md index 4fe1c1898..149ada978 100644 --- a/openapi-specs/compute/32-07/desc/feeds/custom-vulnerabilities_put.md +++ b/openapi-specs/compute/32-07/desc/feeds/custom-vulnerabilities_put.md @@ -5,7 +5,7 @@ Updates all the custom vulnerabilities and associated rules simultaneously for h Refer to the following cURL command that updates a vulnerability for a library named `internal-lib`, and specifies that its versions `1.1` to `1.8` are known to be vulnerable. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -37,7 +37,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: **Note:** You will need `jq` to execute this command. ``` - $ curl -k \ + $ curl \ -u \ https:///api/v/feeds/custom/custom-vulnerabilities \ | jq '.' > custom_vulnerability_rules.json @@ -66,7 +66,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 3. Update the rules by pushing the new JSON payload. **Note:** Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -77,7 +77,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 4. Run the cURL command for the `GET /api/vVERSION/feeds/custom/custom-vulnerabilities` endpoint and you can see that the previously installed rules are now overwritten with your new rules. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/feeds/custom_vulnerabilities_digest_get.md b/openapi-specs/compute/32-07/desc/feeds/custom_vulnerabilities_digest_get.md index 0eb501d9b..02af9a3ab 100644 --- a/openapi-specs/compute/32-07/desc/feeds/custom_vulnerabilities_digest_get.md +++ b/openapi-specs/compute/32-07/desc/feeds/custom_vulnerabilities_digest_get.md @@ -5,7 +5,7 @@ Returns the unique digest for the custom vulnerabilities and associated rules fo The following cURL command retrieves the digest for the configured custom vulnerabilities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/feeds/cve_allow_list_digest_get.md b/openapi-specs/compute/32-07/desc/feeds/cve_allow_list_digest_get.md index e27f21251..911a07fd9 100644 --- a/openapi-specs/compute/32-07/desc/feeds/cve_allow_list_digest_get.md +++ b/openapi-specs/compute/32-07/desc/feeds/cve_allow_list_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the Common Vulnerabilities and Exposures (CVE) a The following cURL command retrieves the digest for the configured CVE allow list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/feeds/cve_allow_list_get.md b/openapi-specs/compute/32-07/desc/feeds/cve_allow_list_get.md index 34fb2c7f8..d73ce17c2 100644 --- a/openapi-specs/compute/32-07/desc/feeds/cve_allow_list_get.md +++ b/openapi-specs/compute/32-07/desc/feeds/cve_allow_list_get.md @@ -5,7 +5,7 @@ Retrieves the globally allow-listed Common Vulnerabilities and Exposures (CVE). The following cURL command retrieves the globally allow-listed CVEs. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/feeds/cve_allow_list_put.md b/openapi-specs/compute/32-07/desc/feeds/cve_allow_list_put.md index 850016965..c4e2ce0af 100644 --- a/openapi-specs/compute/32-07/desc/feeds/cve_allow_list_put.md +++ b/openapi-specs/compute/32-07/desc/feeds/cve_allow_list_put.md @@ -7,7 +7,7 @@ Globally allow-lists a set of Common Vulnerabilities and Exposures (CVE). The following cURL command installs a global CVE allow-list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-07/desc/feeds/ips_digest_get.md b/openapi-specs/compute/32-07/desc/feeds/ips_digest_get.md index d059271ea..ae2a09915 100644 --- a/openapi-specs/compute/32-07/desc/feeds/ips_digest_get.md +++ b/openapi-specs/compute/32-07/desc/feeds/ips_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the list of suspicious or high risk IP endpoints The following cURL command retrieves the digest for the banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/feeds/ips_get.md b/openapi-specs/compute/32-07/desc/feeds/ips_get.md index 381257d47..f51c577a7 100644 --- a/openapi-specs/compute/32-07/desc/feeds/ips_get.md +++ b/openapi-specs/compute/32-07/desc/feeds/ips_get.md @@ -5,7 +5,7 @@ Retrieves the customized list of block-listed suspicious or high-risk IP address The following cURL command retrieves the list of globally block-listed suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/feeds/ips_put.md b/openapi-specs/compute/32-07/desc/feeds/ips_put.md index 6f8fc2419..5bf791044 100644 --- a/openapi-specs/compute/32-07/desc/feeds/ips_put.md +++ b/openapi-specs/compute/32-07/desc/feeds/ips_put.md @@ -7,7 +7,7 @@ Bans a custom list of suspicious or high-risk IP addresses. The following cURL command installs a custom list of banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-07/desc/feeds/malware_digest_get.md b/openapi-specs/compute/32-07/desc/feeds/malware_digest_get.md index 005c476a2..522a59aef 100644 --- a/openapi-specs/compute/32-07/desc/feeds/malware_digest_get.md +++ b/openapi-specs/compute/32-07/desc/feeds/malware_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for all the MD5 signatures of malicious executables The following cURL command retrieves the digest for the configured list for the MD5 signatures of malicious executables. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/feeds/malware_get.md b/openapi-specs/compute/32-07/desc/feeds/malware_get.md index 2a7aa128b..72bee6594 100644 --- a/openapi-specs/compute/32-07/desc/feeds/malware_get.md +++ b/openapi-specs/compute/32-07/desc/feeds/malware_get.md @@ -5,7 +5,7 @@ Returns the customized list of MD5 signatures of malicious executables. Refer to the following cURL command that retrieves the list of MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/feeds/malware_put.md b/openapi-specs/compute/32-07/desc/feeds/malware_put.md index 7e6ec5da0..176304cb9 100644 --- a/openapi-specs/compute/32-07/desc/feeds/malware_put.md +++ b/openapi-specs/compute/32-07/desc/feeds/malware_put.md @@ -7,7 +7,7 @@ Creates a custom list of malware MD5 signatures of malicious executables. Refer to the following cURL command that installs a custom list of malware MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-07/desc/feeds/refresh_post.md b/openapi-specs/compute/32-07/desc/feeds/refresh_post.md index a83c40d10..1c756edae 100644 --- a/openapi-specs/compute/32-07/desc/feeds/refresh_post.md +++ b/openapi-specs/compute/32-07/desc/feeds/refresh_post.md @@ -1,7 +1,7 @@ Triggers Console to refresh its data from the **Intelligence Stream** ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/forensic/activities_download_get.md b/openapi-specs/compute/32-07/desc/forensic/activities_download_get.md index 8a2dbd926..1918e3790 100644 --- a/openapi-specs/compute/32-07/desc/forensic/activities_download_get.md +++ b/openapi-specs/compute/32-07/desc/forensic/activities_download_get.md @@ -3,7 +3,7 @@ Downloads all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/forensic/activities_get.md b/openapi-specs/compute/32-07/desc/forensic/activities_get.md index c8fb1d0cd..c0761aa60 100644 --- a/openapi-specs/compute/32-07/desc/forensic/activities_get.md +++ b/openapi-specs/compute/32-07/desc/forensic/activities_get.md @@ -3,7 +3,7 @@ Retrieves all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/groups/get.md b/openapi-specs/compute/32-07/desc/groups/get.md index 6a0daa2eb..34a2711e0 100644 --- a/openapi-specs/compute/32-07/desc/groups/get.md +++ b/openapi-specs/compute/32-07/desc/groups/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups. ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-07/desc/groups/id_delete.md b/openapi-specs/compute/32-07/desc/groups/id_delete.md index 5962a1135..0c3cfa1cd 100644 --- a/openapi-specs/compute/32-07/desc/groups/id_delete.md +++ b/openapi-specs/compute/32-07/desc/groups/id_delete.md @@ -13,7 +13,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes a collection with the name `{id}`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-07/desc/groups/names.md b/openapi-specs/compute/32-07/desc/groups/names.md index 80f34f536..9c2dd1089 100644 --- a/openapi-specs/compute/32-07/desc/groups/names.md +++ b/openapi-specs/compute/32-07/desc/groups/names.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-07/desc/groups/post.md b/openapi-specs/compute/32-07/desc/groups/post.md index d0fc23a6d..ebad011f4 100644 --- a/openapi-specs/compute/32-07/desc/groups/post.md +++ b/openapi-specs/compute/32-07/desc/groups/post.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that creates a new group named `my-group`: ```bash -$ curl -k \ +$ curl \ -X POST \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-07/desc/high-availability/get.md b/openapi-specs/compute/32-07/desc/high-availability/get.md index a988d47ef..83d5d9b46 100644 --- a/openapi-specs/compute/32-07/desc/high-availability/get.md +++ b/openapi-specs/compute/32-07/desc/high-availability/get.md @@ -3,7 +3,7 @@ Returns the status of high high availability. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-07/desc/hosts/download_get.md b/openapi-specs/compute/32-07/desc/hosts/download_get.md index ab691fb49..34e546573 100644 --- a/openapi-specs/compute/32-07/desc/hosts/download_get.md +++ b/openapi-specs/compute/32-07/desc/hosts/download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Hosts > Refer to the following example cURL command that downloads all host scan reports to a CSV file called `hosts_report.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o hosts_report.csv \ diff --git a/openapi-specs/compute/32-07/desc/hosts/filters_get.md b/openapi-specs/compute/32-07/desc/hosts/filters_get.md index 4bf6df5e6..a39ec8a97 100644 --- a/openapi-specs/compute/32-07/desc/hosts/filters_get.md +++ b/openapi-specs/compute/32-07/desc/hosts/filters_get.md @@ -3,7 +3,7 @@ Returns host filters such as distribution and host name. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/hosts/get.md b/openapi-specs/compute/32-07/desc/hosts/get.md index d125c9d7b..26df89cef 100644 --- a/openapi-specs/compute/32-07/desc/hosts/get.md +++ b/openapi-specs/compute/32-07/desc/hosts/get.md @@ -35,7 +35,7 @@ Refer to the following available options for the `fields` query parameters: Refer to the following cURL command that retrieves all host scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/hosts/info_get.md b/openapi-specs/compute/32-07/desc/hosts/info_get.md index be456b46b..b71c6be2f 100644 --- a/openapi-specs/compute/32-07/desc/hosts/info_get.md +++ b/openapi-specs/compute/32-07/desc/hosts/info_get.md @@ -3,7 +3,7 @@ Returns minimal information that includes hostname, distro, distro-release, coll A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/hosts/scan_post.md b/openapi-specs/compute/32-07/desc/hosts/scan_post.md index 6b72cbfa3..0e0e7b074 100644 --- a/openapi-specs/compute/32-07/desc/hosts/scan_post.md +++ b/openapi-specs/compute/32-07/desc/hosts/scan_post.md @@ -3,7 +3,7 @@ Re-scan all hosts immediately. Refer to the following example command that forces Prisma Cloud Compute to re-scan all hosts: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/hosts/scan diff --git a/openapi-specs/compute/32-07/desc/images/defender_layer_get.md b/openapi-specs/compute/32-07/desc/images/defender_layer_get.md index 1dfe3633d..4bb88d62c 100644 --- a/openapi-specs/compute/32-07/desc/images/defender_layer_get.md +++ b/openapi-specs/compute/32-07/desc/images/defender_layer_get.md @@ -5,7 +5,7 @@ Returns the the Prisma Cloud Compute Defender in as a layer that can be used in Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/compute/32-07/desc/images/defender_rasp_get.md b/openapi-specs/compute/32-07/desc/images/defender_rasp_get.md index a8e145ff7..260e271a1 100644 --- a/openapi-specs/compute/32-07/desc/images/defender_rasp_get.md +++ b/openapi-specs/compute/32-07/desc/images/defender_rasp_get.md @@ -3,7 +3,7 @@ Returns the the Prisma Cloud Compute Defender as the RASP Defender A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/compute/32-07/desc/images/download_get.md b/openapi-specs/compute/32-07/desc/images/download_get.md index 713114955..fcae06e3d 100644 --- a/openapi-specs/compute/32-07/desc/images/download_get.md +++ b/openapi-specs/compute/32-07/desc/images/download_get.md @@ -15,7 +15,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -26,7 +26,7 @@ $ curl -k \ Refer to the following example cURL command that might be useful for developers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/images/get.md b/openapi-specs/compute/32-07/desc/images/get.md index ec777ffb8..b79c298e6 100644 --- a/openapi-specs/compute/32-07/desc/images/get.md +++ b/openapi-specs/compute/32-07/desc/images/get.md @@ -24,7 +24,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that retrieves a compact scan report for all images: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -34,7 +34,7 @@ $ curl -k \ Refer to the following cURL command that retrieves a compact scan report for an Ubuntu image: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -45,7 +45,7 @@ The name query is synonymous with the filter images text field in the Console UI Refer to the following cURL command that retrieves the scan report for an image with the matching SHA-256 hash: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/images/names_get.md b/openapi-specs/compute/32-07/desc/images/names_get.md index 3db6f5429..ad5fd25dc 100644 --- a/openapi-specs/compute/32-07/desc/images/names_get.md +++ b/openapi-specs/compute/32-07/desc/images/names_get.md @@ -5,7 +5,7 @@ Returns an array of strings containing image names. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-07/desc/images/scan_post.md b/openapi-specs/compute/32-07/desc/images/scan_post.md index 8d802727a..36278249b 100644 --- a/openapi-specs/compute/32-07/desc/images/scan_post.md +++ b/openapi-specs/compute/32-07/desc/images/scan_post.md @@ -5,7 +5,7 @@ Re-scan all images immediately. This endpoint returns the time that the scans we Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all images: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/images/scan diff --git a/openapi-specs/compute/32-07/desc/images/twistlock_defender_tar_gz_get.md b/openapi-specs/compute/32-07/desc/images/twistlock_defender_tar_gz_get.md index 7852e12ba..36fb66ae8 100644 --- a/openapi-specs/compute/32-07/desc/images/twistlock_defender_tar_gz_get.md +++ b/openapi-specs/compute/32-07/desc/images/twistlock_defender_tar_gz_get.md @@ -1,7 +1,7 @@ Download the Container Defender image for Linux platforms. ```bash -$ curl -k \ +$ curl \ -u \ -H "Content-Type: application/octet-stream" \ -o twistlock_defender.tar.gz \ diff --git a/openapi-specs/compute/32-07/desc/intro.md b/openapi-specs/compute/32-07/desc/intro.md index 9038a3734..5b4ed5864 100644 --- a/openapi-specs/compute/32-07/desc/intro.md +++ b/openapi-specs/compute/32-07/desc/intro.md @@ -47,7 +47,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -58,7 +58,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -70,7 +70,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/compute/32-07/desc/kubernetes/scan_post.md b/openapi-specs/compute/32-07/desc/kubernetes/scan_post.md index 15d614c1a..ab74d5d96 100644 --- a/openapi-specs/compute/32-07/desc/kubernetes/scan_post.md +++ b/openapi-specs/compute/32-07/desc/kubernetes/scan_post.md @@ -3,7 +3,7 @@ This endpoint will trigger a Kubernetes scan. The following example curl command uses basic auth to initiate this scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/logs/console_get.md b/openapi-specs/compute/32-07/desc/logs/console_get.md index 80ece6611..113543540 100644 --- a/openapi-specs/compute/32-07/desc/logs/console_get.md +++ b/openapi-specs/compute/32-07/desc/logs/console_get.md @@ -3,7 +3,7 @@ Retrieves the latest Console log messages. The following example curl command retrieves the 10 latest Console log messages: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/logs/defender_download_get.md b/openapi-specs/compute/32-07/desc/logs/defender_download_get.md index 5d6718db0..05bbc6a75 100644 --- a/openapi-specs/compute/32-07/desc/logs/defender_download_get.md +++ b/openapi-specs/compute/32-07/desc/logs/defender_download_get.md @@ -5,7 +5,7 @@ The hostname can be returned from the endpoint `/defenders/names` The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/logs/defender_get.md b/openapi-specs/compute/32-07/desc/logs/defender_get.md index 1e733a746..f2e3b25df 100644 --- a/openapi-specs/compute/32-07/desc/logs/defender_get.md +++ b/openapi-specs/compute/32-07/desc/logs/defender_get.md @@ -7,7 +7,7 @@ Note that you must quote the URL when running the following command. Otherwise the shell misinterprets the ampersand (`&`) as the end of the command, and puts the curl command in the background. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/logs/system_download_get.md b/openapi-specs/compute/32-07/desc/logs/system_download_get.md index 1e5b5b873..43bb0abce 100644 --- a/openapi-specs/compute/32-07/desc/logs/system_download_get.md +++ b/openapi-specs/compute/32-07/desc/logs/system_download_get.md @@ -4,7 +4,7 @@ This endpoint will return the system debug logs with `tar.gz` file extension. The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/pcf-droplets/addresses_get.md b/openapi-specs/compute/32-07/desc/pcf-droplets/addresses_get.md index 257a47455..bb3365015 100644 --- a/openapi-specs/compute/32-07/desc/pcf-droplets/addresses_get.md +++ b/openapi-specs/compute/32-07/desc/pcf-droplets/addresses_get.md @@ -5,7 +5,7 @@ You can also add optional query parameters to this API call, in this example `cl The following example curl command retrieves the list of addresses: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/pcf-droplets/download_get.md b/openapi-specs/compute/32-07/desc/pcf-droplets/download_get.md index ad761e744..ac8546a25 100644 --- a/openapi-specs/compute/32-07/desc/pcf-droplets/download_get.md +++ b/openapi-specs/compute/32-07/desc/pcf-droplets/download_get.md @@ -3,7 +3,7 @@ This endpoint will download the list of configured cloud controller addresses co The following example curl command retrieves the list of addresses and outputs it to a file call `PCF_blobstores.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/pcf-droplets/get.md b/openapi-specs/compute/32-07/desc/pcf-droplets/get.md index 930d16948..aad607cba 100644 --- a/openapi-specs/compute/32-07/desc/pcf-droplets/get.md +++ b/openapi-specs/compute/32-07/desc/pcf-droplets/get.md @@ -3,7 +3,7 @@ This endpoint will return the full metadata of PCF blobstore from page **Monitor The following example curl command will retrieve this: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/pcf-droplets/scan_post.md b/openapi-specs/compute/32-07/desc/pcf-droplets/scan_post.md index 34e75b26c..d9c9df4dd 100644 --- a/openapi-specs/compute/32-07/desc/pcf-droplets/scan_post.md +++ b/openapi-specs/compute/32-07/desc/pcf-droplets/scan_post.md @@ -3,7 +3,7 @@ This endpoint will kick off a scan of the any PCF Blobstores you have configured Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/pcf-droplets/stop_post.md b/openapi-specs/compute/32-07/desc/pcf-droplets/stop_post.md index 94c376972..2c4d5264a 100644 --- a/openapi-specs/compute/32-07/desc/pcf-droplets/stop_post.md +++ b/openapi-specs/compute/32-07/desc/pcf-droplets/stop_post.md @@ -3,7 +3,7 @@ This endpoint will instruct the PFC Defenders to stop scanning. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/policies/compliance_ci_images_get.md b/openapi-specs/compute/32-07/desc/policies/compliance_ci_images_get.md index f97130a97..9a2b2abf5 100644 --- a/openapi-specs/compute/32-07/desc/policies/compliance_ci_images_get.md +++ b/openapi-specs/compute/32-07/desc/policies/compliance_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > CI** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/policies/compliance_ci_serverless_get.md b/openapi-specs/compute/32-07/desc/policies/compliance_ci_serverless_get.md index 59195f070..2f30e2d74 100644 --- a/openapi-specs/compute/32-07/desc/policies/compliance_ci_serverless_get.md +++ b/openapi-specs/compute/32-07/desc/policies/compliance_ci_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Functions > CI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/policies/compliance_container_get.md b/openapi-specs/compute/32-07/desc/policies/compliance_container_get.md index 7f10245ea..657d4f2dd 100644 --- a/openapi-specs/compute/32-07/desc/policies/compliance_container_get.md +++ b/openapi-specs/compute/32-07/desc/policies/compliance_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > Deployed** Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/policies/compliance_container_impacted_get.md b/openapi-specs/compute/32-07/desc/policies/compliance_container_impacted_get.md index 607bfa3c8..de9e0ee77 100644 --- a/openapi-specs/compute/32-07/desc/policies/compliance_container_impacted_get.md +++ b/openapi-specs/compute/32-07/desc/policies/compliance_container_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of containers captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/compliance/container/impacted?ruleName=' diff --git a/openapi-specs/compute/32-07/desc/policies/compliance_host_get.md b/openapi-specs/compute/32-07/desc/policies/compliance_host_get.md index c029ecf7f..a5e429af5 100755 --- a/openapi-specs/compute/32-07/desc/policies/compliance_host_get.md +++ b/openapi-specs/compute/32-07/desc/policies/compliance_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Hosts > Running hosts** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/policies/compliance_serverless_get.md b/openapi-specs/compute/32-07/desc/policies/compliance_serverless_get.md index c7de886c1..f559179f6 100755 --- a/openapi-specs/compute/32-07/desc/policies/compliance_serverless_get.md +++ b/openapi-specs/compute/32-07/desc/policies/compliance_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Functions > Functions** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/policies/compliance_vms_get.md b/openapi-specs/compute/32-07/desc/policies/compliance_vms_get.md index f7d7e1a49..b61d20d9d 100755 --- a/openapi-specs/compute/32-07/desc/policies/compliance_vms_get.md +++ b/openapi-specs/compute/32-07/desc/policies/compliance_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Hosts > VM ima The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/policies/compliance_vms_impacted_get.md b/openapi-specs/compute/32-07/desc/policies/compliance_vms_impacted_get.md index 9cf5b9d03..4ac3f2832 100644 --- a/openapi-specs/compute/32-07/desc/policies/compliance_vms_impacted_get.md +++ b/openapi-specs/compute/32-07/desc/policies/compliance_vms_impacted_get.md @@ -8,7 +8,7 @@ Use query parameters to retrieve the list of impacted resources by *account ID*, Refer to the following example cURL command, which retrieves a list of impacted resources: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/policies/docker_get.md b/openapi-specs/compute/32-07/desc/policies/docker_get.md index f56872c67..e8ab3d5bb 100644 --- a/openapi-specs/compute/32-07/desc/policies/docker_get.md +++ b/openapi-specs/compute/32-07/desc/policies/docker_get.md @@ -3,7 +3,7 @@ Retrieves a list of all access control rules for Docker Engine commands. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/policies/docker_put.md b/openapi-specs/compute/32-07/desc/policies/docker_put.md index 860e2bb1e..a5d0c0230 100644 --- a/openapi-specs/compute/32-07/desc/policies/docker_put.md +++ b/openapi-specs/compute/32-07/desc/policies/docker_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove Docker access control rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/docker \ | jq '.' > docker_access_control_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove Docker access control rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/32-07/desc/policies/firewall_app-embedded_get.md b/openapi-specs/compute/32-07/desc/policies/firewall_app-embedded_get.md index 3da2a7cd6..4e59c4c21 100644 --- a/openapi-specs/compute/32-07/desc/policies/firewall_app-embedded_get.md +++ b/openapi-specs/compute/32-07/desc/policies/firewall_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > App-Embedded** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/policies/firewall_app_container_get.md b/openapi-specs/compute/32-07/desc/policies/firewall_app_container_get.md index 3b8c157fa..f0486aa4c 100644 --- a/openapi-specs/compute/32-07/desc/policies/firewall_app_container_get.md +++ b/openapi-specs/compute/32-07/desc/policies/firewall_app_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Container** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/container' diff --git a/openapi-specs/compute/32-07/desc/policies/firewall_app_host_get.md b/openapi-specs/compute/32-07/desc/policies/firewall_app_host_get.md index adb90128a..75c22add4 100644 --- a/openapi-specs/compute/32-07/desc/policies/firewall_app_host_get.md +++ b/openapi-specs/compute/32-07/desc/policies/firewall_app_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Host** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/policies/firewall_app_network_list_get.md b/openapi-specs/compute/32-07/desc/policies/firewall_app_network_list_get.md index 13f7fb450..5a1f87d85 100644 --- a/openapi-specs/compute/32-07/desc/policies/firewall_app_network_list_get.md +++ b/openapi-specs/compute/32-07/desc/policies/firewall_app_network_list_get.md @@ -11,7 +11,7 @@ This endpoint maps to **Defend > WAAS > Network lists** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/network-list' diff --git a/openapi-specs/compute/32-07/desc/policies/firewall_app_out-of-band_get.md b/openapi-specs/compute/32-07/desc/policies/firewall_app_out-of-band_get.md index d4f72d041..9ae662687 100644 --- a/openapi-specs/compute/32-07/desc/policies/firewall_app_out-of-band_get.md +++ b/openapi-specs/compute/32-07/desc/policies/firewall_app_out-of-band_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/policies/firewall_app_out-of-band_impacted_get.md b/openapi-specs/compute/32-07/desc/policies/firewall_app_out-of-band_impacted_get.md index 25d2c6691..96a427f94 100644 --- a/openapi-specs/compute/32-07/desc/policies/firewall_app_out-of-band_impacted_get.md +++ b/openapi-specs/compute/32-07/desc/policies/firewall_app_out-of-band_impacted_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/policies/firewall_app_rasp_get.md b/openapi-specs/compute/32-07/desc/policies/firewall_app_rasp_get.md index 15d481cf3..a201d3beb 100644 --- a/openapi-specs/compute/32-07/desc/policies/firewall_app_rasp_get.md +++ b/openapi-specs/compute/32-07/desc/policies/firewall_app_rasp_get.md @@ -1,7 +1,7 @@ Retrieves a list of all application firewall (CNAF) rules for RASP. ``` -$ curl -k \ +$ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp ``` diff --git a/openapi-specs/compute/32-07/desc/policies/firewall_app_rasp_put.md b/openapi-specs/compute/32-07/desc/policies/firewall_app_rasp_put.md index 04ba86483..1101c7690 100644 --- a/openapi-specs/compute/32-07/desc/policies/firewall_app_rasp_put.md +++ b/openapi-specs/compute/32-07/desc/policies/firewall_app_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp \ | jq '.' > app_firewall_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/32-07/desc/policies/firewall_app_serverless_get.md b/openapi-specs/compute/32-07/desc/policies/firewall_app_serverless_get.md index d19e909f3..90cac0015 100644 --- a/openapi-specs/compute/32-07/desc/policies/firewall_app_serverless_get.md +++ b/openapi-specs/compute/32-07/desc/policies/firewall_app_serverless_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Serverless** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/serverless' diff --git a/openapi-specs/compute/32-07/desc/policies/firewall_network_container_get.md b/openapi-specs/compute/32-07/desc/policies/firewall_network_container_get.md index 3f1343b53..82e656818 100644 --- a/openapi-specs/compute/32-07/desc/policies/firewall_network_container_get.md +++ b/openapi-specs/compute/32-07/desc/policies/firewall_network_container_get.md @@ -4,7 +4,7 @@ Retrieves a list of all CNNS container and host rules. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/policies/firewall_network_container_put.md b/openapi-specs/compute/32-07/desc/policies/firewall_network_container_put.md index fd9263430..cffb3f1c4 100644 --- a/openapi-specs/compute/32-07/desc/policies/firewall_network_container_put.md +++ b/openapi-specs/compute/32-07/desc/policies/firewall_network_container_put.md @@ -9,7 +9,7 @@ The procedure to add, edit, or remove rules is: Refer to the following example cURL command that retrieves a list of all rules, pretty-print the JSON response, and save the results to a file: ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -26,7 +26,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/32-07/desc/policies/firewall_network_entities_get.md b/openapi-specs/compute/32-07/desc/policies/firewall_network_entities_get.md index 757121f70..28ed8dbcb 100644 --- a/openapi-specs/compute/32-07/desc/policies/firewall_network_entities_get.md +++ b/openapi-specs/compute/32-07/desc/policies/firewall_network_entities_get.md @@ -1,7 +1,7 @@ Retrieves a list of all CNNF network objects. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/policies/firewall_network_entities_put.md b/openapi-specs/compute/32-07/desc/policies/firewall_network_entities_put.md index 83c023286..39044ee10 100644 --- a/openapi-specs/compute/32-07/desc/policies/firewall_network_entities_put.md +++ b/openapi-specs/compute/32-07/desc/policies/firewall_network_entities_put.md @@ -3,7 +3,7 @@ Updates the list of CNNF network objects. The following example curl command updates the network objects. There is an example of all three types (images,subnets, and applications ): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-07/desc/policies/policies.md b/openapi-specs/compute/32-07/desc/policies/policies.md index 69768c03d..97be7b616 100644 --- a/openapi-specs/compute/32-07/desc/policies/policies.md +++ b/openapi-specs/compute/32-07/desc/policies/policies.md @@ -21,7 +21,7 @@ To add, edit, or remove vulnerability rules from a policy: For example, the following cURL command uses basic auth to retrieve a list of all image vulnerability rules, pretty-prints the JSON response, and saves the results to a `vulnerability_rules.json` file. ```bash - $ curl -k \ + $ curl \ -u \ https:///api/v1/policies/runtime/host \ | jq '.' > vulnerability_rules.json @@ -36,7 +36,7 @@ To add, edit, or remove vulnerability rules from a policy: **Note:** Remember to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -107,7 +107,7 @@ Use the `PUT` method to delete all rules by submitting an empty JSON object. For example, to delete all host runtime rules: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-07/desc/policies/runtime_app-embedded_get.md b/openapi-specs/compute/32-07/desc/policies/runtime_app-embedded_get.md index fcf0ba8b9..517b741bb 100755 --- a/openapi-specs/compute/32-07/desc/policies/runtime_app-embedded_get.md +++ b/openapi-specs/compute/32-07/desc/policies/runtime_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > App-Embedded policy** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/policies/runtime_container_get.md b/openapi-specs/compute/32-07/desc/policies/runtime_container_get.md index f1b50b727..65cd10660 100644 --- a/openapi-specs/compute/32-07/desc/policies/runtime_container_get.md +++ b/openapi-specs/compute/32-07/desc/policies/runtime_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Container policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/policies/runtime_container_impacted_get.md b/openapi-specs/compute/32-07/desc/policies/runtime_container_impacted_get.md index 195f75547..e026d33b9 100644 --- a/openapi-specs/compute/32-07/desc/policies/runtime_container_impacted_get.md +++ b/openapi-specs/compute/32-07/desc/policies/runtime_container_impacted_get.md @@ -6,7 +6,7 @@ In the Console UI, you can see how it works by going to the **Defend > Runtime > Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ $ curl -k \ For additional help with your `ruleName`: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/policies/runtime_host_get.md b/openapi-specs/compute/32-07/desc/policies/runtime_host_get.md index 38800596c..559ef690a 100644 --- a/openapi-specs/compute/32-07/desc/policies/runtime_host_get.md +++ b/openapi-specs/compute/32-07/desc/policies/runtime_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Host policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/policies/runtime_rasp_get.md b/openapi-specs/compute/32-07/desc/policies/runtime_rasp_get.md index 5b7a76457..55a6ff05b 100644 --- a/openapi-specs/compute/32-07/desc/policies/runtime_rasp_get.md +++ b/openapi-specs/compute/32-07/desc/policies/runtime_rasp_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your RASP runtime policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/policies/runtime_rasp_put.md b/openapi-specs/compute/32-07/desc/policies/runtime_rasp_put.md index bba60ba81..f71fb4b93 100644 --- a/openapi-specs/compute/32-07/desc/policies/runtime_rasp_put.md +++ b/openapi-specs/compute/32-07/desc/policies/runtime_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve the rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET @@ -24,7 +24,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -H "Content-Type:application/json" \ -X PUT \ diff --git a/openapi-specs/compute/32-07/desc/policies/runtime_serverless_get.md b/openapi-specs/compute/32-07/desc/policies/runtime_serverless_get.md index 44326bbf6..c98489e16 100644 --- a/openapi-specs/compute/32-07/desc/policies/runtime_serverless_get.md +++ b/openapi-specs/compute/32-07/desc/policies/runtime_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Serverless policy** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/policies/secrets_get.md b/openapi-specs/compute/32-07/desc/policies/secrets_get.md index 89e6b9c0e..cb4ecb37c 100644 --- a/openapi-specs/compute/32-07/desc/policies/secrets_get.md +++ b/openapi-specs/compute/32-07/desc/policies/secrets_get.md @@ -3,7 +3,7 @@ Retrieves a list of all secrets rules. The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/policies/secrets diff --git a/openapi-specs/compute/32-07/desc/policies/secrets_put.md b/openapi-specs/compute/32-07/desc/policies/secrets_put.md index 1e8877ca1..04fd41f24 100644 --- a/openapi-specs/compute/32-07/desc/policies/secrets_put.md +++ b/openapi-specs/compute/32-07/desc/policies/secrets_put.md @@ -10,7 +10,7 @@ The procedure to add, edit, or remove secrets rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/secrets \ | jq '.' > secrets_rules.json @@ -24,7 +24,7 @@ The procedure to add, edit, or remove secrets rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/32-07/desc/policies/trust_get.md b/openapi-specs/compute/32-07/desc/policies/trust_get.md index 8de1ba409..0805d6777 100644 --- a/openapi-specs/compute/32-07/desc/policies/trust_get.md +++ b/openapi-specs/compute/32-07/desc/policies/trust_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/policies/trust_put.md b/openapi-specs/compute/32-07/desc/policies/trust_put.md index fccd4b91e..7fec72031 100644 --- a/openapi-specs/compute/32-07/desc/policies/trust_put.md +++ b/openapi-specs/compute/32-07/desc/policies/trust_put.md @@ -1,7 +1,7 @@ Updates the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-07/desc/policies/vulnerability_ci_images_get.md b/openapi-specs/compute/32-07/desc/policies/vulnerability_ci_images_get.md index abc3da8fa..ce0d50a29 100644 --- a/openapi-specs/compute/32-07/desc/policies/vulnerability_ci_images_get.md +++ b/openapi-specs/compute/32-07/desc/policies/vulnerability_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/policies/vulnerability_ci_serverless_get.md b/openapi-specs/compute/32-07/desc/policies/vulnerability_ci_serverless_get.md index 958c86495..6fb5f93ce 100644 --- a/openapi-specs/compute/32-07/desc/policies/vulnerability_ci_serverless_get.md +++ b/openapi-specs/compute/32-07/desc/policies/vulnerability_ci_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/policies/vulnerability_coderepos_get.md b/openapi-specs/compute/32-07/desc/policies/vulnerability_coderepos_get.md index 08dfed8e1..a4ac62f33 100644 --- a/openapi-specs/compute/32-07/desc/policies/vulnerability_coderepos_get.md +++ b/openapi-specs/compute/32-07/desc/policies/vulnerability_coderepos_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Code repositories** in the Co Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/vulnerability/coderepos' diff --git a/openapi-specs/compute/32-07/desc/policies/vulnerability_coderepos_impacted_get.md b/openapi-specs/compute/32-07/desc/policies/vulnerability_coderepos_impacted_get.md index a401a12c4..e64ef768e 100644 --- a/openapi-specs/compute/32-07/desc/policies/vulnerability_coderepos_impacted_get.md +++ b/openapi-specs/compute/32-07/desc/policies/vulnerability_coderepos_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/coderepos/impacted?project=&ruleName=' ``` diff --git a/openapi-specs/compute/32-07/desc/policies/vulnerability_coderepos_put.md b/openapi-specs/compute/32-07/desc/policies/vulnerability_coderepos_put.md index 514eec136..a002415b9 100644 --- a/openapi-specs/compute/32-07/desc/policies/vulnerability_coderepos_put.md +++ b/openapi-specs/compute/32-07/desc/policies/vulnerability_coderepos_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Code repo Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT 'https:///api/v/policies/vulnerability/coderepos' \ diff --git a/openapi-specs/compute/32-07/desc/policies/vulnerability_host_get.md b/openapi-specs/compute/32-07/desc/policies/vulnerability_host_get.md index 3b9b14b9c..260da7675 100644 --- a/openapi-specs/compute/32-07/desc/policies/vulnerability_host_get.md +++ b/openapi-specs/compute/32-07/desc/policies/vulnerability_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Hosts > Running hosts** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/policies/vulnerability_host_impacted_get.md b/openapi-specs/compute/32-07/desc/policies/vulnerability_host_impacted_get.md index 346368518..f44592830 100644 --- a/openapi-specs/compute/32-07/desc/policies/vulnerability_host_impacted_get.md +++ b/openapi-specs/compute/32-07/desc/policies/vulnerability_host_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by `RULE_NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/host/impacted?project={PROJECT_NAME}&ruleName={RULE_NAME}' ``` diff --git a/openapi-specs/compute/32-07/desc/policies/vulnerability_images_get.md b/openapi-specs/compute/32-07/desc/policies/vulnerability_images_get.md index 33581be37..57359bb8f 100644 --- a/openapi-specs/compute/32-07/desc/policies/vulnerability_images_get.md +++ b/openapi-specs/compute/32-07/desc/policies/vulnerability_images_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images?project=" diff --git a/openapi-specs/compute/32-07/desc/policies/vulnerability_images_impacted_get.md b/openapi-specs/compute/32-07/desc/policies/vulnerability_images_impacted_get.md index ae1d5e396..e2a4efa23 100644 --- a/openapi-specs/compute/32-07/desc/policies/vulnerability_images_impacted_get.md +++ b/openapi-specs/compute/32-07/desc/policies/vulnerability_images_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of images caught by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images/impacted?project=&ruleName=" diff --git a/openapi-specs/compute/32-07/desc/policies/vulnerability_images_put.md b/openapi-specs/compute/32-07/desc/policies/vulnerability_images_put.md index b3330dab7..8c3cc8af2 100644 --- a/openapi-specs/compute/32-07/desc/policies/vulnerability_images_put.md +++ b/openapi-specs/compute/32-07/desc/policies/vulnerability_images_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -X PUT 'https:///api/v/policies/vulnerability/images' \ --data '{ diff --git a/openapi-specs/compute/32-07/desc/policies/vulnerability_serverless_get.md b/openapi-specs/compute/32-07/desc/policies/vulnerability_serverless_get.md index c7a8e2ef5..41c7e75d8 100644 --- a/openapi-specs/compute/32-07/desc/policies/vulnerability_serverless_get.md +++ b/openapi-specs/compute/32-07/desc/policies/vulnerability_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Functions** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/policies/vulnerability_serverless_put.md b/openapi-specs/compute/32-07/desc/policies/vulnerability_serverless_put.md index 2b567b5b1..5199f0997 100644 --- a/openapi-specs/compute/32-07/desc/policies/vulnerability_serverless_put.md +++ b/openapi-specs/compute/32-07/desc/policies/vulnerability_serverless_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k 'https:///api/v/policies/vulnerability/serverless' \ +$ curl 'https:///api/v/policies/vulnerability/serverless' \ -X PUT \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-07/desc/policies/vulnerability_vms_get.md b/openapi-specs/compute/32-07/desc/policies/vulnerability_vms_get.md index 117d2cc4a..e37c1520f 100644 --- a/openapi-specs/compute/32-07/desc/policies/vulnerability_vms_get.md +++ b/openapi-specs/compute/32-07/desc/policies/vulnerability_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Hosts > V The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/policies/vulnerability_vms_impacted_get.md b/openapi-specs/compute/32-07/desc/policies/vulnerability_vms_impacted_get.md index 29d9621ea..f1a7f7ef5 100644 --- a/openapi-specs/compute/32-07/desc/policies/vulnerability_vms_impacted_get.md +++ b/openapi-specs/compute/32-07/desc/policies/vulnerability_vms_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/vms?project=&ruleName=' ``` diff --git a/openapi-specs/compute/32-07/desc/profiles/app-embedded_download_get.md b/openapi-specs/compute/32-07/desc/profiles/app-embedded_download_get.md index 4b3f7ff8a..2e8cac56d 100644 --- a/openapi-specs/compute/32-07/desc/profiles/app-embedded_download_get.md +++ b/openapi-specs/compute/32-07/desc/profiles/app-embedded_download_get.md @@ -5,7 +5,7 @@ Downloads the app-embedded observations in a CSV format. Refer to the following example cURL command that downloads all the app-embedded runtime profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/profiles/app-embedded_get.md b/openapi-specs/compute/32-07/desc/profiles/app-embedded_get.md index f3ddb3125..c332061e5 100644 --- a/openapi-specs/compute/32-07/desc/profiles/app-embedded_get.md +++ b/openapi-specs/compute/32-07/desc/profiles/app-embedded_get.md @@ -5,7 +5,7 @@ Retrieves the app-embedded observations. Refer to the following example cURL command that lists all the app-embedded runtime: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/profiles/container_download_get.md b/openapi-specs/compute/32-07/desc/profiles/container_download_get.md index ad7a86101..ee9d5e9e4 100644 --- a/openapi-specs/compute/32-07/desc/profiles/container_download_get.md +++ b/openapi-specs/compute/32-07/desc/profiles/container_download_get.md @@ -6,7 +6,7 @@ Retrieves the details and state of all runtime models in CSV format. Refer to the following example cURL command that downloads a complete list in CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/profiles/container_filters_get.md b/openapi-specs/compute/32-07/desc/profiles/container_filters_get.md index 8b6122b80..13535b520 100644 --- a/openapi-specs/compute/32-07/desc/profiles/container_filters_get.md +++ b/openapi-specs/compute/32-07/desc/profiles/container_filters_get.md @@ -4,7 +4,7 @@ Returns a list of os and images from page monitor/runtime/container-models in Co Example curl command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/profiles/container_get.md b/openapi-specs/compute/32-07/desc/profiles/container_get.md index cdbc24c3e..59a3764fb 100644 --- a/openapi-specs/compute/32-07/desc/profiles/container_get.md +++ b/openapi-specs/compute/32-07/desc/profiles/container_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of all runtime models. Refer to the following example cURL command that lists all runtime models in a system: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/profiles/container_learn_post.md b/openapi-specs/compute/32-07/desc/profiles/container_learn_post.md index 5fef2e31e..2c1d08af1 100644 --- a/openapi-specs/compute/32-07/desc/profiles/container_learn_post.md +++ b/openapi-specs/compute/32-07/desc/profiles/container_learn_post.md @@ -7,7 +7,7 @@ For more information, refer to [Learning mode](https://docs.prismacloud.io/en/cl Refer to the following example cURL command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/profiles/host_download_get.md b/openapi-specs/compute/32-07/desc/profiles/host_download_get.md index ace270a32..2dfb51ec0 100644 --- a/openapi-specs/compute/32-07/desc/profiles/host_download_get.md +++ b/openapi-specs/compute/32-07/desc/profiles/host_download_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of each host service runtime model in CSV format Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/profiles/host_get.md b/openapi-specs/compute/32-07/desc/profiles/host_get.md index 208a24de3..55d8bf8ff 100644 --- a/openapi-specs/compute/32-07/desc/profiles/host_get.md +++ b/openapi-specs/compute/32-07/desc/profiles/host_get.md @@ -15,7 +15,7 @@ The returned JSON object has the following structure: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/profiles/host_id_rule_get.md b/openapi-specs/compute/32-07/desc/profiles/host_id_rule_get.md index 672cb4c62..8be668fca 100644 --- a/openapi-specs/compute/32-07/desc/profiles/host_id_rule_get.md +++ b/openapi-specs/compute/32-07/desc/profiles/host_id_rule_get.md @@ -10,7 +10,7 @@ This is the `PROFILE_ID`. The following example command uses curl and basic auth to specify the learning mode for a profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/profiles/service_download_get.md b/openapi-specs/compute/32-07/desc/profiles/service_download_get.md index 63dff3354..4c1c431c1 100644 --- a/openapi-specs/compute/32-07/desc/profiles/service_download_get.md +++ b/openapi-specs/compute/32-07/desc/profiles/service_download_get.md @@ -1,7 +1,7 @@ Retrieves the details and state of all host service runtime models in CSV format ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/profiles/service_get.md b/openapi-specs/compute/32-07/desc/profiles/service_get.md index a4f8c348d..5d786d919 100644 --- a/openapi-specs/compute/32-07/desc/profiles/service_get.md +++ b/openapi-specs/compute/32-07/desc/profiles/service_get.md @@ -10,7 +10,7 @@ The returned JSON object has the following structure: Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/profiles/service_id_learn_post.md b/openapi-specs/compute/32-07/desc/profiles/service_id_learn_post.md index fb338b80d..fa85fc3a2 100644 --- a/openapi-specs/compute/32-07/desc/profiles/service_id_learn_post.md +++ b/openapi-specs/compute/32-07/desc/profiles/service_id_learn_post.md @@ -11,7 +11,7 @@ The `PROFILE_ID` is typically the service's name, such as `sshd` or `ntpd`. The following example command uses curl and basic auth to specify the learning mode for a host service profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/profiles/service_learn_post.md b/openapi-specs/compute/32-07/desc/profiles/service_learn_post.md index 02a1f299e..ceff8e5a5 100644 --- a/openapi-specs/compute/32-07/desc/profiles/service_learn_post.md +++ b/openapi-specs/compute/32-07/desc/profiles/service_learn_post.md @@ -3,7 +3,7 @@ Specify the learning mode for all host service profiles. The following example command uses curl and basic auth to specify the learning mode for all host service profiles. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/profiles/service_names_get.md b/openapi-specs/compute/32-07/desc/profiles/service_names_get.md index 7da863545..afae56f0d 100644 --- a/openapi-specs/compute/32-07/desc/profiles/service_names_get.md +++ b/openapi-specs/compute/32-07/desc/profiles/service_names_get.md @@ -3,7 +3,7 @@ Retrieves the name of all host service runtime models from within the app at **M The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/projects/get.md b/openapi-specs/compute/32-07/desc/projects/get.md index 05485c24c..1ac04d2c0 100644 --- a/openapi-specs/compute/32-07/desc/projects/get.md +++ b/openapi-specs/compute/32-07/desc/projects/get.md @@ -3,7 +3,7 @@ Lists all projects visible to the given user. Assuming the given user is an admin, the following example curl command would list all projects: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/projects/name_delete.md b/openapi-specs/compute/32-07/desc/projects/name_delete.md index fba889f7e..0a34e72a2 100644 --- a/openapi-specs/compute/32-07/desc/projects/name_delete.md +++ b/openapi-specs/compute/32-07/desc/projects/name_delete.md @@ -6,7 +6,7 @@ The value for `` can be retrieved from the `_id` field in the resp The DELETE method returns the decommissioned supervisor's admin username and password. ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/compute/32-07/desc/projects/name_put.md b/openapi-specs/compute/32-07/desc/projects/name_put.md index b5a83a67d..1bde9b0c7 100644 --- a/openapi-specs/compute/32-07/desc/projects/name_put.md +++ b/openapi-specs/compute/32-07/desc/projects/name_put.md @@ -4,7 +4,7 @@ The following example curl command updates a project named ``. The value for `` can be retrieved from the `_id` field in the response object from `GET /api/v1/projects`. ```bash -$ curl -k \ +$ curl \ -u \ -X PUT \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/compute/32-07/desc/projects/post.md b/openapi-specs/compute/32-07/desc/projects/post.md index 8862c0fd4..38c574173 100644 --- a/openapi-specs/compute/32-07/desc/projects/post.md +++ b/openapi-specs/compute/32-07/desc/projects/post.md @@ -3,7 +3,7 @@ Provisions a new project. The following example curl command provisions a new project named `my-project`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ $ curl -k \ If you have installed a new instance of Console, and you have already created an initial admin user for it, then you can specify the admin username name and password when you provision the project. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/projects/projects.md b/openapi-specs/compute/32-07/desc/projects/projects.md index 7e7dcff66..19c904e9e 100644 --- a/openapi-specs/compute/32-07/desc/projects/projects.md +++ b/openapi-specs/compute/32-07/desc/projects/projects.md @@ -20,7 +20,7 @@ If `project` is not specified, it is set to `Central+Console`. For example, to retrieve the compliance policies for a tenant project named `mobile_payments_division`, use the following curl command: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/radar/container_clean_post.md b/openapi-specs/compute/32-07/desc/radar/container_clean_post.md index 662b6d53f..d4f87e91e 100644 --- a/openapi-specs/compute/32-07/desc/radar/container_clean_post.md +++ b/openapi-specs/compute/32-07/desc/radar/container_clean_post.md @@ -1,7 +1,7 @@ Cleans the container runtime profiles and Radar entities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/radar/container_delete.md b/openapi-specs/compute/32-07/desc/radar/container_delete.md index 4eabe337f..b6cc69cf2 100644 --- a/openapi-specs/compute/32-07/desc/radar/container_delete.md +++ b/openapi-specs/compute/32-07/desc/radar/container_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-07/desc/radar/container_export_get.md b/openapi-specs/compute/32-07/desc/radar/container_export_get.md index 7f577568f..f776c7e6c 100644 --- a/openapi-specs/compute/32-07/desc/radar/container_export_get.md +++ b/openapi-specs/compute/32-07/desc/radar/container_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for containers) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/radar/container_filters_get.md b/openapi-specs/compute/32-07/desc/radar/container_filters_get.md index f66463da1..8d7cd6df3 100644 --- a/openapi-specs/compute/32-07/desc/radar/container_filters_get.md +++ b/openapi-specs/compute/32-07/desc/radar/container_filters_get.md @@ -1,7 +1,7 @@ Returns the namespaces from the container view on the Radar page. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/radar/container_get.md b/openapi-specs/compute/32-07/desc/radar/container_get.md index 280d683d9..404629a25 100644 --- a/openapi-specs/compute/32-07/desc/radar/container_get.md +++ b/openapi-specs/compute/32-07/desc/radar/container_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (container view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/radar/host_delete.md b/openapi-specs/compute/32-07/desc/radar/host_delete.md index 738fa7a7c..b4910a8b7 100644 --- a/openapi-specs/compute/32-07/desc/radar/host_delete.md +++ b/openapi-specs/compute/32-07/desc/radar/host_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two apps in CNNF for hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-07/desc/radar/host_export_get.md b/openapi-specs/compute/32-07/desc/radar/host_export_get.md index dd91b5335..851d6f40f 100644 --- a/openapi-specs/compute/32-07/desc/radar/host_export_get.md +++ b/openapi-specs/compute/32-07/desc/radar/host_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for hosts) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/radar/host_get.md b/openapi-specs/compute/32-07/desc/radar/host_get.md index a12025856..222d075aa 100644 --- a/openapi-specs/compute/32-07/desc/radar/host_get.md +++ b/openapi-specs/compute/32-07/desc/radar/host_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (host view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/radar/serverless_get.md b/openapi-specs/compute/32-07/desc/radar/serverless_get.md index b2f329149..170cfb48d 100644 --- a/openapi-specs/compute/32-07/desc/radar/serverless_get.md +++ b/openapi-specs/compute/32-07/desc/radar/serverless_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/radar/serverless_progress_get.md b/openapi-specs/compute/32-07/desc/radar/serverless_progress_get.md index a11c1ae20..0808dfbf4 100644 --- a/openapi-specs/compute/32-07/desc/radar/serverless_progress_get.md +++ b/openapi-specs/compute/32-07/desc/radar/serverless_progress_get.md @@ -1,7 +1,7 @@ Returns the scan progress from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/radar/serverless_scan_post.md b/openapi-specs/compute/32-07/desc/radar/serverless_scan_post.md index 0d519ba88..2d444ac88 100644 --- a/openapi-specs/compute/32-07/desc/radar/serverless_scan_post.md +++ b/openapi-specs/compute/32-07/desc/radar/serverless_scan_post.md @@ -1,7 +1,7 @@ Initiates a serverless scan of your environments. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/radar/serverless_stop_post.md b/openapi-specs/compute/32-07/desc/radar/serverless_stop_post.md index 5c0bdf186..f15bef34d 100644 --- a/openapi-specs/compute/32-07/desc/radar/serverless_stop_post.md +++ b/openapi-specs/compute/32-07/desc/radar/serverless_stop_post.md @@ -1,7 +1,7 @@ Stops an in-progress serverless scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/rbac/role_delete.md b/openapi-specs/compute/32-07/desc/rbac/role_delete.md index 87015b6e8..46efcf9c9 100644 --- a/openapi-specs/compute/32-07/desc/rbac/role_delete.md +++ b/openapi-specs/compute/32-07/desc/rbac/role_delete.md @@ -4,7 +4,7 @@ System roles and roles assigned to users/groups cannot be deleted. The following example curl command uses basic auth to delete role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-07/desc/rbac/roles_get.md b/openapi-specs/compute/32-07/desc/rbac/roles_get.md index 4cd1d9bc7..112026937 100644 --- a/openapi-specs/compute/32-07/desc/rbac/roles_get.md +++ b/openapi-specs/compute/32-07/desc/rbac/roles_get.md @@ -3,7 +3,7 @@ This endpoint will return a list in JSON format of the roles can be found under The following example curl command uses basic auth to return: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/rbac/roles_post.md b/openapi-specs/compute/32-07/desc/rbac/roles_post.md index 1f20772ce..6988766e8 100644 --- a/openapi-specs/compute/32-07/desc/rbac/roles_post.md +++ b/openapi-specs/compute/32-07/desc/rbac/roles_post.md @@ -37,7 +37,7 @@ The added role must contain the "user" permission with read-write access. This p The following example curl command uses basic auth to create the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/rbac/roles_put.md b/openapi-specs/compute/32-07/desc/rbac/roles_put.md index 34d7b41a7..f62e34ccb 100644 --- a/openapi-specs/compute/32-07/desc/rbac/roles_put.md +++ b/openapi-specs/compute/32-07/desc/rbac/roles_put.md @@ -38,7 +38,7 @@ The updated role must contain the "user" permission with read-write access. This The following example curl command uses basic auth to update the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-07/desc/recovery/backup_get.md b/openapi-specs/compute/32-07/desc/recovery/backup_get.md index 4da46f356..bf735905a 100644 --- a/openapi-specs/compute/32-07/desc/recovery/backup_get.md +++ b/openapi-specs/compute/32-07/desc/recovery/backup_get.md @@ -3,7 +3,7 @@ Returns a list of available backups. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/recovery/backup_id_delete.md b/openapi-specs/compute/32-07/desc/recovery/backup_id_delete.md index ae9c33e90..80cd4c3f6 100644 --- a/openapi-specs/compute/32-07/desc/recovery/backup_id_delete.md +++ b/openapi-specs/compute/32-07/desc/recovery/backup_id_delete.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-07/desc/recovery/backup_id_patch.md b/openapi-specs/compute/32-07/desc/recovery/backup_id_patch.md index 4a78cd67d..b3699972f 100644 --- a/openapi-specs/compute/32-07/desc/recovery/backup_id_patch.md +++ b/openapi-specs/compute/32-07/desc/recovery/backup_id_patch.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/compute/32-07/desc/recovery/backup_post.md b/openapi-specs/compute/32-07/desc/recovery/backup_post.md index f45161712..41436fe5f 100644 --- a/openapi-specs/compute/32-07/desc/recovery/backup_post.md +++ b/openapi-specs/compute/32-07/desc/recovery/backup_post.md @@ -3,7 +3,7 @@ Creates a backup named `backup_name` by invoking the MongoDB dump process. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/recovery/restore_id_post.md b/openapi-specs/compute/32-07/desc/recovery/restore_id_post.md index 850fceeaa..e424641cc 100644 --- a/openapi-specs/compute/32-07/desc/recovery/restore_id_post.md +++ b/openapi-specs/compute/32-07/desc/recovery/restore_id_post.md @@ -5,7 +5,7 @@ Restores Prisma Cloud Compute from the given backup. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/registry/download_get.md b/openapi-specs/compute/32-07/desc/registry/download_get.md index 5a3eb0141..3eef8d50e 100644 --- a/openapi-specs/compute/32-07/desc/registry/download_get.md +++ b/openapi-specs/compute/32-07/desc/registry/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Compliance > Images > Reg Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/registry/get.md b/openapi-specs/compute/32-07/desc/registry/get.md index 96b46382e..7474b119a 100644 --- a/openapi-specs/compute/32-07/desc/registry/get.md +++ b/openapi-specs/compute/32-07/desc/registry/get.md @@ -20,7 +20,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that retrieves a scan report for all images in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -32,7 +32,7 @@ The compact query can be used to get a general overview of the number of Vulnera Refer to the following cURL command that retrieves a compact scan report for the Ubuntu image in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -43,7 +43,7 @@ The name query is synonymous with the filter registry text field in the Console Refer to the following cURL that retrieves the scan report for the image in the registry with the matching **sha256** hash: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -53,7 +53,7 @@ $ curl -k \ Refer to the following cURL command that retrieves the images in the first 10 registries: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/registry/get_registry_progress.md b/openapi-specs/compute/32-07/desc/registry/get_registry_progress.md index ddc319c1b..cc6feac3d 100644 --- a/openapi-specs/compute/32-07/desc/registry/get_registry_progress.md +++ b/openapi-specs/compute/32-07/desc/registry/get_registry_progress.md @@ -11,7 +11,7 @@ For a regular scan, use the API path only without any query parameters. Refer to the following example cURL request that retrieves the ongoing scan details for a regular registry scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -61,7 +61,7 @@ For an on-demand scan that is started using the `/registry/scan` endpoint with t Refer to the following example cURL request that retrieves the ongoing scan details for an on-demand registry scan that is started using the `/registry/scan` endpoint for the repository `alpine` with tag `3.16`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/registry/names_get.md b/openapi-specs/compute/32-07/desc/registry/names_get.md index 1e5bed727..f3b8676a8 100644 --- a/openapi-specs/compute/32-07/desc/registry/names_get.md +++ b/openapi-specs/compute/32-07/desc/registry/names_get.md @@ -5,7 +5,7 @@ Retrieves a list of image names from current scanned registry images. The base ` Refer to the following example cURL command that retrieves a list of image names from your scanned registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/registry/scan_post.md b/openapi-specs/compute/32-07/desc/registry/scan_post.md index ce7e19533..96bfd5f16 100644 --- a/openapi-specs/compute/32-07/desc/registry/scan_post.md +++ b/openapi-specs/compute/32-07/desc/registry/scan_post.md @@ -17,7 +17,7 @@ For information on scan result, see [Get Registry Scan Report](https://prisma.pa Refer to the following example cURL command that forces Prisma Cloud Compute to rescan all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -27,7 +27,7 @@ $ curl -k \ Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan a specific image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -52,7 +52,7 @@ For information on scan result, see [Get Registry Scan Report](https://pan.dev/p Refer to the following example cURL command to trigger an on-demand scan for an image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/registry/stop_post.md b/openapi-specs/compute/32-07/desc/registry/stop_post.md index 29e103ac1..05ac2f436 100644 --- a/openapi-specs/compute/32-07/desc/registry/stop_post.md +++ b/openapi-specs/compute/32-07/desc/registry/stop_post.md @@ -5,7 +5,7 @@ Stops current registry scan immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to stop scanning all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/scans/download_get.md b/openapi-specs/compute/32-07/desc/scans/download_get.md index 61a0ccc2d..3785bf562 100644 --- a/openapi-specs/compute/32-07/desc/scans/download_get.md +++ b/openapi-specs/compute/32-07/desc/scans/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Images The following cURL command retrieves and saves your Jenkins and twistcli scan reports to a CSV file called `scans_report.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/scans/filter_get.md b/openapi-specs/compute/32-07/desc/scans/filter_get.md index 58550ad35..df3e9cdb0 100644 --- a/openapi-specs/compute/32-07/desc/scans/filter_get.md +++ b/openapi-specs/compute/32-07/desc/scans/filter_get.md @@ -3,7 +3,7 @@ Retrieves the list of Jenkins projects that have been scanned by the Jenkins plu The following example curl command uses basic auth to retrieve the list of Jenkins project names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/scans/get.md b/openapi-specs/compute/32-07/desc/scans/get.md index 9bc06317f..775d9934f 100644 --- a/openapi-specs/compute/32-07/desc/scans/get.md +++ b/openapi-specs/compute/32-07/desc/scans/get.md @@ -10,7 +10,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command that retrieves the scan reports for all images scanned using the Jenkins CI plugin or the twistcli tool: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -22,7 +22,7 @@ To get the report of a specific scan, add query parameters to narrow the scope o The following cURL command retrieves the scan report for an image with a SHA256 ID of `sha256:f756e84300d8e53006090573dd33abe5b8cfac3e42d104fc4be37f435fe512f3`. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/scans/id_get.md b/openapi-specs/compute/32-07/desc/scans/id_get.md index 7a342ef60..1557b1905 100644 --- a/openapi-specs/compute/32-07/desc/scans/id_get.md +++ b/openapi-specs/compute/32-07/desc/scans/id_get.md @@ -3,7 +3,7 @@ Retrieves all scan reports for images scanned by the Jenkins plugin or twistcli The following example curl command uses basic auth to retrieve the scan report for just an image with a SHA256 ID of `5c3385fd2e76c5c16124c077`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/scripts/console_sh_get.md b/openapi-specs/compute/32-07/desc/scripts/console_sh_get.md index d8f02038f..1622321ca 100644 --- a/openapi-specs/compute/32-07/desc/scripts/console_sh_get.md +++ b/openapi-specs/compute/32-07/desc/scripts/console_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/scripts/defender_ps1_get.md b/openapi-specs/compute/32-07/desc/scripts/defender_ps1_get.md index a47616983..45e4a6133 100644 --- a/openapi-specs/compute/32-07/desc/scripts/defender_ps1_get.md +++ b/openapi-specs/compute/32-07/desc/scripts/defender_ps1_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/scripts/defender_sh_get.md b/openapi-specs/compute/32-07/desc/scripts/defender_sh_get.md index 98ad6cf62..a8a302426 100644 --- a/openapi-specs/compute/32-07/desc/scripts/defender_sh_get.md +++ b/openapi-specs/compute/32-07/desc/scripts/defender_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/serverless/download_get.md b/openapi-specs/compute/32-07/desc/serverless/download_get.md index a8e49ff25..4d7d3adc1 100644 --- a/openapi-specs/compute/32-07/desc/serverless/download_get.md +++ b/openapi-specs/compute/32-07/desc/serverless/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Functio The following cURL command retrieves a list of all serverless resources monitored by Prisma Cloud Compute and saves the results in a CSV file called `serverless.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/serverless/download' \ diff --git a/openapi-specs/compute/32-07/desc/serverless/embed_post.md b/openapi-specs/compute/32-07/desc/serverless/embed_post.md index 6cce784b8..353b5721c 100644 --- a/openapi-specs/compute/32-07/desc/serverless/embed_post.md +++ b/openapi-specs/compute/32-07/desc/serverless/embed_post.md @@ -1,7 +1,7 @@ The following curl command uses basic auth to retrieve a list of all Serverless resources that monitored by Prisma Cloud Compute, and save the results to a CSV file: ```bash -$ curl -k \ +$ curl \ -X POST \ -H "Content-Type: application/octet-stream" \ -u \ diff --git a/openapi-specs/compute/32-07/desc/serverless/get.md b/openapi-specs/compute/32-07/desc/serverless/get.md index 77a0d8a4e..c6c75c480 100644 --- a/openapi-specs/compute/32-07/desc/serverless/get.md +++ b/openapi-specs/compute/32-07/desc/serverless/get.md @@ -10,7 +10,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Functions > Scanned function Refer to the following example cURL command that retrieves the scan reports for serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/serverless/names_get.md b/openapi-specs/compute/32-07/desc/serverless/names_get.md index 62cbcd53b..ab229e0f8 100644 --- a/openapi-specs/compute/32-07/desc/serverless/names_get.md +++ b/openapi-specs/compute/32-07/desc/serverless/names_get.md @@ -1,7 +1,7 @@ The following curl command uses basic auth to retrieve a list of names of all Serverless resources monitored by Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -X GET \ -H "Content-Type: application/json" \ -u \ diff --git a/openapi-specs/compute/32-07/desc/serverless/scan_post.md b/openapi-specs/compute/32-07/desc/serverless/scan_post.md index 159285349..70a3a3b4e 100644 --- a/openapi-specs/compute/32-07/desc/serverless/scan_post.md +++ b/openapi-specs/compute/32-07/desc/serverless/scan_post.md @@ -5,7 +5,7 @@ Re-scan all serverless functions immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/scan diff --git a/openapi-specs/compute/32-07/desc/serverless/stop_post.md b/openapi-specs/compute/32-07/desc/serverless/stop_post.md index 763710842..67c0d2239 100644 --- a/openapi-specs/compute/32-07/desc/serverless/stop_post.md +++ b/openapi-specs/compute/32-07/desc/serverless/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing serverless scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/stop diff --git a/openapi-specs/compute/32-07/desc/settings/alerts_get.md b/openapi-specs/compute/32-07/desc/settings/alerts_get.md index 060114c39..2b25dc6c9 100644 --- a/openapi-specs/compute/32-07/desc/settings/alerts_get.md +++ b/openapi-specs/compute/32-07/desc/settings/alerts_get.md @@ -1,7 +1,7 @@ Retrieves a list of your alert settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/settings/alerts_options_get.md b/openapi-specs/compute/32-07/desc/settings/alerts_options_get.md index 095c1f1b7..aa7a1d250 100644 --- a/openapi-specs/compute/32-07/desc/settings/alerts_options_get.md +++ b/openapi-specs/compute/32-07/desc/settings/alerts_options_get.md @@ -3,7 +3,7 @@ This endpoint will return the alert profile configuration options that can be fo The following example curl command uses basic auth to retrieve all alert profile configuration options: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/settings/alerts_post.md b/openapi-specs/compute/32-07/desc/settings/alerts_post.md index 3acb8d543..cd303f880 100644 --- a/openapi-specs/compute/32-07/desc/settings/alerts_post.md +++ b/openapi-specs/compute/32-07/desc/settings/alerts_post.md @@ -3,7 +3,7 @@ Configure alerts. The following example curl command sets the aggregation period for alerts to one hour. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/settings/certificates_post.md b/openapi-specs/compute/32-07/desc/settings/certificates_post.md index fbdc8a5a9..bd30ea399 100644 --- a/openapi-specs/compute/32-07/desc/settings/certificates_post.md +++ b/openapi-specs/compute/32-07/desc/settings/certificates_post.md @@ -9,7 +9,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to set the validity period for client certificates to seven days: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/32-07/desc/settings/certs_get.md b/openapi-specs/compute/32-07/desc/settings/certs_get.md index ba6674a3c..dbf1d3790 100644 --- a/openapi-specs/compute/32-07/desc/settings/certs_get.md +++ b/openapi-specs/compute/32-07/desc/settings/certs_get.md @@ -6,7 +6,7 @@ Defenders use these names to connect to Console. Refer to the following example cURL request that uses basic auth to retrieve the SANs in Console's cert: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/settings/certs_post.md b/openapi-specs/compute/32-07/desc/settings/certs_post.md index a6e429006..fb2cedee5 100644 --- a/openapi-specs/compute/32-07/desc/settings/certs_post.md +++ b/openapi-specs/compute/32-07/desc/settings/certs_post.md @@ -12,7 +12,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to add `node-01.example.com` to the `subjectAltName` field in the certificate: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/32-07/desc/settings/coderepos_get.md b/openapi-specs/compute/32-07/desc/settings/coderepos_get.md index 6cbfb78cb..286a8d905 100644 --- a/openapi-specs/compute/32-07/desc/settings/coderepos_get.md +++ b/openapi-specs/compute/32-07/desc/settings/coderepos_get.md @@ -20,7 +20,7 @@ Construct the full webhook using Console's publicly accessible DNS name or IP ad Refer to the following example cURL command that retrieves all code repositories to scan, as well as the webhook URL suffix: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/settings/console-certificates_post.md b/openapi-specs/compute/32-07/desc/settings/console-certificates_post.md index 5673af840..392061c8f 100644 --- a/openapi-specs/compute/32-07/desc/settings/console-certificates_post.md +++ b/openapi-specs/compute/32-07/desc/settings/console-certificates_post.md @@ -9,7 +9,7 @@ For the custom TLS certificate for securing browser access, this file must be in Refer to the following example cURL request that uses basic auth and configures the custom certificate to use for securing browser access to the console: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/settings/custom-labels_get.md b/openapi-specs/compute/32-07/desc/settings/custom-labels_get.md index a849dd8a8..19c1cadde 100644 --- a/openapi-specs/compute/32-07/desc/settings/custom-labels_get.md +++ b/openapi-specs/compute/32-07/desc/settings/custom-labels_get.md @@ -5,7 +5,7 @@ Returns the list of alert labels configured in Prisma Cloud Compute. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/settings/custom-labels_post.md b/openapi-specs/compute/32-07/desc/settings/custom-labels_post.md index 6bb66e706..9b0702fe8 100644 --- a/openapi-specs/compute/32-07/desc/settings/custom-labels_post.md +++ b/openapi-specs/compute/32-07/desc/settings/custom-labels_post.md @@ -5,7 +5,7 @@ Creates a custom alert label to augment audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/settings/defender_get.md b/openapi-specs/compute/32-07/desc/settings/defender_get.md index ecb8b6989..cf43bb304 100644 --- a/openapi-specs/compute/32-07/desc/settings/defender_get.md +++ b/openapi-specs/compute/32-07/desc/settings/defender_get.md @@ -5,7 +5,7 @@ Returns the advanced settings for Defenders. Refer to the following example cURL command that gets all advanced settings for Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/settings/forensic_get.md b/openapi-specs/compute/32-07/desc/settings/forensic_get.md index 9c16b70b9..3486b2bf9 100644 --- a/openapi-specs/compute/32-07/desc/settings/forensic_get.md +++ b/openapi-specs/compute/32-07/desc/settings/forensic_get.md @@ -1,7 +1,7 @@ Retrieves the settings for the forensics system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/settings/forensic_post.md b/openapi-specs/compute/32-07/desc/settings/forensic_post.md index 31f809d39..8943842fb 100644 --- a/openapi-specs/compute/32-07/desc/settings/forensic_post.md +++ b/openapi-specs/compute/32-07/desc/settings/forensic_post.md @@ -3,7 +3,7 @@ Configures the forensics system. The following example curl command allocates 100 MB of local disk space for container forensic data and 10 MB for host forensics data. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/settings/initialized_get.md b/openapi-specs/compute/32-07/desc/settings/initialized_get.md index 3134912d1..2af8462f1 100644 --- a/openapi-specs/compute/32-07/desc/settings/initialized_get.md +++ b/openapi-specs/compute/32-07/desc/settings/initialized_get.md @@ -4,7 +4,7 @@ After first installing Console, the first thing you must do is create an admin a Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/settings/intelligence-windows_post.md b/openapi-specs/compute/32-07/desc/settings/intelligence-windows_post.md index c39e256d2..0721dab3b 100644 --- a/openapi-specs/compute/32-07/desc/settings/intelligence-windows_post.md +++ b/openapi-specs/compute/32-07/desc/settings/intelligence-windows_post.md @@ -3,7 +3,7 @@ This endpoint will enable or disable the Windows Intelligence Service from **Man The following example curl command uses basic auth to enable online updates of Windows vulnerabilities from the intelligence stream: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/settings/intelligence_get.md b/openapi-specs/compute/32-07/desc/settings/intelligence_get.md index 26c694246..15e9f24ae 100644 --- a/openapi-specs/compute/32-07/desc/settings/intelligence_get.md +++ b/openapi-specs/compute/32-07/desc/settings/intelligence_get.md @@ -5,7 +5,7 @@ Returns the details about the Intelligence Stream configuration. Refer to the following example cURL command that uses basic auth to retrieve your Intelligence Stream configuration settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/settings/intelligence_post.md b/openapi-specs/compute/32-07/desc/settings/intelligence_post.md index 74b06a3a0..2dbbd0168 100644 --- a/openapi-specs/compute/32-07/desc/settings/intelligence_post.md +++ b/openapi-specs/compute/32-07/desc/settings/intelligence_post.md @@ -7,7 +7,7 @@ For more information, see [Intelligence Stream](https://docs.paloaltonetworks.co Refer to the following example cURL command that uses basic auth to configure settings of your Intelligence Stream. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/settings/latest-version_get.md b/openapi-specs/compute/32-07/desc/settings/latest-version_get.md index c443fa7b5..16601fb5b 100644 --- a/openapi-specs/compute/32-07/desc/settings/latest-version_get.md +++ b/openapi-specs/compute/32-07/desc/settings/latest-version_get.md @@ -3,7 +3,7 @@ Retrieves the version number of the latest available Prisma Cloud Compute releas Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/settings/latest_version_get.md b/openapi-specs/compute/32-07/desc/settings/latest_version_get.md index 18e436668..5c64edff1 100644 --- a/openapi-specs/compute/32-07/desc/settings/latest_version_get.md +++ b/openapi-specs/compute/32-07/desc/settings/latest_version_get.md @@ -1,7 +1,7 @@ This endpoint will return the latest version of the product. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/settings/ldap_get.md b/openapi-specs/compute/32-07/desc/settings/ldap_get.md index 4ad0ad0c9..7d803ba1c 100644 --- a/openapi-specs/compute/32-07/desc/settings/ldap_get.md +++ b/openapi-specs/compute/32-07/desc/settings/ldap_get.md @@ -5,7 +5,7 @@ Returns the LDAP integration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/settings/ldap_post.md b/openapi-specs/compute/32-07/desc/settings/ldap_post.md index c152c7dc5..34bc06ef4 100644 --- a/openapi-specs/compute/32-07/desc/settings/ldap_post.md +++ b/openapi-specs/compute/32-07/desc/settings/ldap_post.md @@ -7,7 +7,7 @@ For more information, see [Active Directory](https://docs.paloaltonetworks.com/p Refer to the following example cURL command that enables the LDAP integration and specifies the parameters required to integrate with an Active Directory service. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/settings/license_get.md b/openapi-specs/compute/32-07/desc/settings/license_get.md index 5c792cae8..2b4b548e3 100644 --- a/openapi-specs/compute/32-07/desc/settings/license_get.md +++ b/openapi-specs/compute/32-07/desc/settings/license_get.md @@ -5,7 +5,7 @@ Returns the details about the installed license. Refer to the following example cURL request that retrieves the license details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/settings/license_post.md b/openapi-specs/compute/32-07/desc/settings/license_post.md index b77800a5f..ce74b0d0f 100644 --- a/openapi-specs/compute/32-07/desc/settings/license_post.md +++ b/openapi-specs/compute/32-07/desc/settings/license_post.md @@ -8,7 +8,7 @@ For more information, see [Licensing](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to set your license: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/settings/logging_get.md b/openapi-specs/compute/32-07/desc/settings/logging_get.md index 6eda3e484..012be5def 100644 --- a/openapi-specs/compute/32-07/desc/settings/logging_get.md +++ b/openapi-specs/compute/32-07/desc/settings/logging_get.md @@ -5,7 +5,7 @@ Returns the logging settings. Refer to the following example cURL request that uses basic auth to retrieve your logging details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/settings/logging_post.md b/openapi-specs/compute/32-07/desc/settings/logging_post.md index 3619d9c0f..8d27ee1b3 100644 --- a/openapi-specs/compute/32-07/desc/settings/logging_post.md +++ b/openapi-specs/compute/32-07/desc/settings/logging_post.md @@ -8,7 +8,7 @@ For more information, see [Logging](https://docs.paloaltonetworks.com/prisma/pri Refer to the following example cURL request that enables verbose scan output for syslog and stdout: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/settings/logon_get.md b/openapi-specs/compute/32-07/desc/settings/logon_get.md index 1559f2405..b1e9164f2 100644 --- a/openapi-specs/compute/32-07/desc/settings/logon_get.md +++ b/openapi-specs/compute/32-07/desc/settings/logon_get.md @@ -5,7 +5,7 @@ Configures the logon settings. Refer to the following example cURL request that uses basic auth to retrieve all current logon settings. ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/settings/logon_post.md b/openapi-specs/compute/32-07/desc/settings/logon_post.md index 5c2b60c9f..691e082fe 100644 --- a/openapi-specs/compute/32-07/desc/settings/logon_post.md +++ b/openapi-specs/compute/32-07/desc/settings/logon_post.md @@ -7,7 +7,7 @@ For more information, see [Logon Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that uses basic auth to set the timeout to 900 seconds (15 minutes): ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/32-07/desc/settings/oauth_get.md b/openapi-specs/compute/32-07/desc/settings/oauth_get.md index 6dcf70fb5..5d997f016 100644 --- a/openapi-specs/compute/32-07/desc/settings/oauth_get.md +++ b/openapi-specs/compute/32-07/desc/settings/oauth_get.md @@ -5,7 +5,7 @@ Returns the OAuth configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/settings/oauth_post.md b/openapi-specs/compute/32-07/desc/settings/oauth_post.md index c593b9237..da3c83d2f 100644 --- a/openapi-specs/compute/32-07/desc/settings/oauth_post.md +++ b/openapi-specs/compute/32-07/desc/settings/oauth_post.md @@ -7,7 +7,7 @@ For more information, see [GitHub OAuth](https://docs.paloaltonetworks.com/prism Refer to the following example cURL response: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/settings/oidc_get.md b/openapi-specs/compute/32-07/desc/settings/oidc_get.md index ee439622b..1f27f93ba 100644 --- a/openapi-specs/compute/32-07/desc/settings/oidc_get.md +++ b/openapi-specs/compute/32-07/desc/settings/oidc_get.md @@ -5,7 +5,7 @@ Returns the OpenID Connect configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/settings/oidc_post.md b/openapi-specs/compute/32-07/desc/settings/oidc_post.md index e0270247e..5bd3a9192 100644 --- a/openapi-specs/compute/32-07/desc/settings/oidc_post.md +++ b/openapi-specs/compute/32-07/desc/settings/oidc_post.md @@ -7,7 +7,7 @@ For more information, see [OIDC](https://docs.paloaltonetworks.com/prisma/prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/settings/pcf_get.md b/openapi-specs/compute/32-07/desc/settings/pcf_get.md index 5dc21eb17..c5e42a823 100644 --- a/openapi-specs/compute/32-07/desc/settings/pcf_get.md +++ b/openapi-specs/compute/32-07/desc/settings/pcf_get.md @@ -3,7 +3,7 @@ This endpoint will return settings for PCF (Pivotal Cloud Foundry)Blobstore scan The following example curl command uses basic auth to retrieve the current PCF Blobstore scanning settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/settings/pcf_post.md b/openapi-specs/compute/32-07/desc/settings/pcf_post.md index 139e947cb..657e14f27 100644 --- a/openapi-specs/compute/32-07/desc/settings/pcf_post.md +++ b/openapi-specs/compute/32-07/desc/settings/pcf_post.md @@ -3,7 +3,7 @@ This endpoint will allow for updating settings for PCF (Pivotal Cloud Foundry) B The following example curl command uses basic auth to set up a PCF Blobstore scanner that scans the last `5` droplets for every droplet in the PCF Blobstore: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/settings/projects_get.md b/openapi-specs/compute/32-07/desc/settings/projects_get.md index f5dd20395..bc95414a1 100644 --- a/openapi-specs/compute/32-07/desc/settings/projects_get.md +++ b/openapi-specs/compute/32-07/desc/settings/projects_get.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command retrieves the state of the Projects feature from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ All API calls must be proxied through Central Console, where the request is auto To retrieve the Projects settings from a supervisor Console, append the `project` query parameter to your request. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/settings/projects_post.md b/openapi-specs/compute/32-07/desc/settings/projects_post.md index d29f8e9d5..b3472e6b9 100644 --- a/openapi-specs/compute/32-07/desc/settings/projects_post.md +++ b/openapi-specs/compute/32-07/desc/settings/projects_post.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command designates `` as master. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/settings/proxy_get.md b/openapi-specs/compute/32-07/desc/settings/proxy_get.md index 9a4922d59..477563069 100644 --- a/openapi-specs/compute/32-07/desc/settings/proxy_get.md +++ b/openapi-specs/compute/32-07/desc/settings/proxy_get.md @@ -5,7 +5,7 @@ Returns the proxy settings for Prisma Cloud Compute containers to access the Int Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/settings/proxy_post.md b/openapi-specs/compute/32-07/desc/settings/proxy_post.md index a1bdc07ed..df926524e 100644 --- a/openapi-specs/compute/32-07/desc/settings/proxy_post.md +++ b/openapi-specs/compute/32-07/desc/settings/proxy_post.md @@ -7,7 +7,7 @@ For more information, see [Proxy Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that specifies the proxy to use to access the Internet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/settings/registry_get.md b/openapi-specs/compute/32-07/desc/settings/registry_get.md index 12745005d..64e70b698 100644 --- a/openapi-specs/compute/32-07/desc/settings/registry_get.md +++ b/openapi-specs/compute/32-07/desc/settings/registry_get.md @@ -17,7 +17,7 @@ Construct the full webhook using the publicly accessible DNS name or IP address, The following cURL command retrieves all the registries to scan and the URL suffix for the registry's webhook URL suffix. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/settings/registry_post.md b/openapi-specs/compute/32-07/desc/settings/registry_post.md index efabf4e67..decf80a65 100644 --- a/openapi-specs/compute/32-07/desc/settings/registry_post.md +++ b/openapi-specs/compute/32-07/desc/settings/registry_post.md @@ -30,7 +30,7 @@ The API response returns an HTTP 400 error if the number of registry specificati Refer to the following example cURL command that configures Prisma Cloud Compute to scan the Ubuntu 16.04 repository on Docker Hub: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -64,7 +64,7 @@ To add settings for a GitLab Container Registry, you must specify the following Refer to the following example cURL command: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/settings/registry_put.md b/openapi-specs/compute/32-07/desc/settings/registry_put.md index 3768914f6..75d6c79a2 100644 --- a/openapi-specs/compute/32-07/desc/settings/registry_put.md +++ b/openapi-specs/compute/32-07/desc/settings/registry_put.md @@ -127,7 +127,7 @@ To remove a registry from the list: To delete all entries, submit an empty `specifications` array. For example: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-07/desc/settings/saml_get.md b/openapi-specs/compute/32-07/desc/settings/saml_get.md index f2228a440..4fb940e80 100644 --- a/openapi-specs/compute/32-07/desc/settings/saml_get.md +++ b/openapi-specs/compute/32-07/desc/settings/saml_get.md @@ -5,7 +5,7 @@ Returns the configured SAML settings that is used to authenticate to the Prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/settings/saml_post.md b/openapi-specs/compute/32-07/desc/settings/saml_post.md index 0bd9c4a25..dfe8d380f 100644 --- a/openapi-specs/compute/32-07/desc/settings/saml_post.md +++ b/openapi-specs/compute/32-07/desc/settings/saml_post.md @@ -7,7 +7,7 @@ For more information, see [Okta via SAML 2.0](https://docs.paloaltonetworks.com/ Refer to the following example cURL request that uses the basic auth to set up and enable the SAML integration with Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/settings/scan_get.md b/openapi-specs/compute/32-07/desc/settings/scan_get.md index 5c1df30a2..543ea7662 100644 --- a/openapi-specs/compute/32-07/desc/settings/scan_get.md +++ b/openapi-specs/compute/32-07/desc/settings/scan_get.md @@ -5,7 +5,7 @@ Returns the global settings for image, host, container, and registry scanning. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/settings/scan_post.md b/openapi-specs/compute/32-07/desc/settings/scan_post.md index f043d1c9f..9ddb521a2 100644 --- a/openapi-specs/compute/32-07/desc/settings/scan_post.md +++ b/openapi-specs/compute/32-07/desc/settings/scan_post.md @@ -9,7 +9,7 @@ Refer to the following example cURL request that configures the following scan i * Scan images, containers, and hosts once per day. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/settings/secrets_get.md b/openapi-specs/compute/32-07/desc/settings/secrets_get.md index 75e2b32c7..339009641 100644 --- a/openapi-specs/compute/32-07/desc/settings/secrets_get.md +++ b/openapi-specs/compute/32-07/desc/settings/secrets_get.md @@ -3,7 +3,7 @@ This endpoint will return configured secret store already configured in the cons The following example curl command retrieves any configured secret stores, as well as the refresh period in hours: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/settings/secrets_post.md b/openapi-specs/compute/32-07/desc/settings/secrets_post.md index d302ecdf8..730d031bf 100644 --- a/openapi-specs/compute/32-07/desc/settings/secrets_post.md +++ b/openapi-specs/compute/32-07/desc/settings/secrets_post.md @@ -5,7 +5,7 @@ Please note the data structure returned from endpoint /settings/secrets GET to s Refer to the following example curl command that adds a CyberArk secret store to the console with the appID set to `Prisma_Cloud_Compute_Console` and set the URL to `https://services-myca.twistlock.com:10882`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/settings/serverless-scan_get.md b/openapi-specs/compute/32-07/desc/settings/serverless-scan_get.md index bb8ce06ba..eb42e4a12 100644 --- a/openapi-specs/compute/32-07/desc/settings/serverless-scan_get.md +++ b/openapi-specs/compute/32-07/desc/settings/serverless-scan_get.md @@ -8,7 +8,7 @@ This endpoint maps to the **Function scope** table data in the **Defend > Vulner Refer to the following example cURL command that retrieves a list of serverless scan scopes: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/settings/serverless_get.md b/openapi-specs/compute/32-07/desc/settings/serverless_get.md index b6122c460..8c654807c 100644 --- a/openapi-specs/compute/32-07/desc/settings/serverless_get.md +++ b/openapi-specs/compute/32-07/desc/settings/serverless_get.md @@ -3,7 +3,7 @@ This endpoint will return any configured serverless function scanners found in * The following example curl command uses basic auth to retrieve serverless settings in an array, sorted by Cloud Provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/settings/serverless_post.md b/openapi-specs/compute/32-07/desc/settings/serverless_post.md index 6e26ea1d3..c0e0f3225 100644 --- a/openapi-specs/compute/32-07/desc/settings/serverless_post.md +++ b/openapi-specs/compute/32-07/desc/settings/serverless_post.md @@ -3,7 +3,7 @@ This endpoint will add serverless function providers to scan for vulnerabilities The following example curl command uses basic auth to add a serverless account to scan for serverless functions. This is assuming that you already have the [credential](https://docs.twistlock.com/docs/latest/configure/credentials_store.html) added to the console that is needed to scan that provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/settings/system_get.md b/openapi-specs/compute/32-07/desc/settings/system_get.md index 6f893abf0..0e8a3cba3 100644 --- a/openapi-specs/compute/32-07/desc/settings/system_get.md +++ b/openapi-specs/compute/32-07/desc/settings/system_get.md @@ -3,7 +3,7 @@ This endpoint will return all system settings in JSON format. The following example curl command does exactly that: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/settings/tas_get.md b/openapi-specs/compute/32-07/desc/settings/tas_get.md index 52f392433..d2d0017f0 100644 --- a/openapi-specs/compute/32-07/desc/settings/tas_get.md +++ b/openapi-specs/compute/32-07/desc/settings/tas_get.md @@ -5,7 +5,7 @@ Retrieves Tanzu Application Service (TAS) settings. Refer to the following example cURL command that retrieves all TAS settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/settings/telemetry_get.md b/openapi-specs/compute/32-07/desc/settings/telemetry_get.md index 6460c3fc3..46a807e77 100644 --- a/openapi-specs/compute/32-07/desc/settings/telemetry_get.md +++ b/openapi-specs/compute/32-07/desc/settings/telemetry_get.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that retrieves the settings if telemetry is enabled or not: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/settings/telemetry_post.md b/openapi-specs/compute/32-07/desc/settings/telemetry_post.md index bc97a6d0f..662846f33 100644 --- a/openapi-specs/compute/32-07/desc/settings/telemetry_post.md +++ b/openapi-specs/compute/32-07/desc/settings/telemetry_post.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to turn off telemetry: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/settings/trusted_certificate_post.md b/openapi-specs/compute/32-07/desc/settings/trusted_certificate_post.md index 5a2a30bda..c54b96fa5 100644 --- a/openapi-specs/compute/32-07/desc/settings/trusted_certificate_post.md +++ b/openapi-specs/compute/32-07/desc/settings/trusted_certificate_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/trusted-certificates` endpoint. Refer to the following example cURL request that uses basic auth to add a certificate to the list: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/32-07/desc/settings/trusted_certificates_post.md b/openapi-specs/compute/32-07/desc/settings/trusted_certificates_post.md index 78c07982b..e9bdc72a1 100644 --- a/openapi-specs/compute/32-07/desc/settings/trusted_certificates_post.md +++ b/openapi-specs/compute/32-07/desc/settings/trusted_certificates_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/certificates` endpoint. Refer to the following example cURL request that uses basic auth to enable this feature: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/32-07/desc/settings/vm_get.md b/openapi-specs/compute/32-07/desc/settings/vm_get.md index 8043742f5..b98b94240 100644 --- a/openapi-specs/compute/32-07/desc/settings/vm_get.md +++ b/openapi-specs/compute/32-07/desc/settings/vm_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **VM images scope** table data in the **Defend > Vulne Refer to the following example cURL command that retrieves all the scopes used for pattern matching on VM functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/signup/post.md b/openapi-specs/compute/32-07/desc/signup/post.md index 1db21df29..67344a0b1 100644 --- a/openapi-specs/compute/32-07/desc/signup/post.md +++ b/openapi-specs/compute/32-07/desc/signup/post.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i The following cURL command creates the initial admin user with the username `admin` and password `password`. ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -X POST \ -d '{"username": "admin", "password": "password"}' \ diff --git a/openapi-specs/compute/32-07/desc/static/capabilities_get.md b/openapi-specs/compute/32-07/desc/static/capabilities_get.md index ea119d2a9..f9b60278c 100644 --- a/openapi-specs/compute/32-07/desc/static/capabilities_get.md +++ b/openapi-specs/compute/32-07/desc/static/capabilities_get.md @@ -1,7 +1,7 @@ Returns a list of capabilities used in host models. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/static/regions_get.md b/openapi-specs/compute/32-07/desc/static/regions_get.md index 4a07097ee..3b1adb5f1 100644 --- a/openapi-specs/compute/32-07/desc/static/regions_get.md +++ b/openapi-specs/compute/32-07/desc/static/regions_get.md @@ -1,7 +1,7 @@ Returns a list of regions used in cloud radar. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/static/syscalls_get.md b/openapi-specs/compute/32-07/desc/static/syscalls_get.md index 9e2ddcde7..09505ba39 100644 --- a/openapi-specs/compute/32-07/desc/static/syscalls_get.md +++ b/openapi-specs/compute/32-07/desc/static/syscalls_get.md @@ -2,7 +2,7 @@ Returns a list of the Linux kernel system calls. Runtime rules for containers can allow-list and deny-list specific system calls. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/static/vulnerabilities_get.md b/openapi-specs/compute/32-07/desc/static/vulnerabilities_get.md index cb6acab28..19809472b 100644 --- a/openapi-specs/compute/32-07/desc/static/vulnerabilities_get.md +++ b/openapi-specs/compute/32-07/desc/static/vulnerabilities_get.md @@ -3,7 +3,7 @@ This data can be used for building out reports with the API. This data can be correlated with the `/api/v1/images` endpoint, specifically the the `complianceVulnerabilities` and `cveVulnerabilities` objects, to generate more thorough reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/stats/compliance.md b/openapi-specs/compute/32-07/desc/stats/compliance.md index 5c5be3991..4f4c90071 100644 --- a/openapi-specs/compute/32-07/desc/stats/compliance.md +++ b/openapi-specs/compute/32-07/desc/stats/compliance.md @@ -5,7 +5,7 @@ For the current day, the response will also include detailed compliance stats fo The following example command that uses curl and basic auth to retrieve compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/stats/compliance_get.md b/openapi-specs/compute/32-07/desc/stats/compliance_get.md index 314f6a179..2ef2f9f75 100644 --- a/openapi-specs/compute/32-07/desc/stats/compliance_get.md +++ b/openapi-specs/compute/32-07/desc/stats/compliance_get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Compliance > Compliance explorer* Refer to the following example cURL command that retrieves compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/stats/compliance_refresh.md b/openapi-specs/compute/32-07/desc/stats/compliance_refresh.md index b75491a69..d8ce211a8 100644 --- a/openapi-specs/compute/32-07/desc/stats/compliance_refresh.md +++ b/openapi-specs/compute/32-07/desc/stats/compliance_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/compliance endpoint return The following example command that uses curl and basic auth to refresh compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/stats/compliance_refresh_post.md b/openapi-specs/compute/32-07/desc/stats/compliance_refresh_post.md index 541a54d16..0f329d1db 100644 --- a/openapi-specs/compute/32-07/desc/stats/compliance_refresh_post.md +++ b/openapi-specs/compute/32-07/desc/stats/compliance_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/compliance`, b Refer to the following example cURL command that refreshes compliance statistics for the current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/stats/daily.md b/openapi-specs/compute/32-07/desc/stats/daily.md index 082f58a27..9fd4c6138 100644 --- a/openapi-specs/compute/32-07/desc/stats/daily.md +++ b/openapi-specs/compute/32-07/desc/stats/daily.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/stats/daily_get.md b/openapi-specs/compute/32-07/desc/stats/daily_get.md index 0db89bdc3..fe852126c 100644 --- a/openapi-specs/compute/32-07/desc/stats/daily_get.md +++ b/openapi-specs/compute/32-07/desc/stats/daily_get.md @@ -3,7 +3,7 @@ Returns a historical list of per-day statistics for the resources protected by P The following example command uses curl and basic auth to retrieve the daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/stats/dashboard.md b/openapi-specs/compute/32-07/desc/stats/dashboard.md index be90a2d32..1e5fabf08 100644 --- a/openapi-specs/compute/32-07/desc/stats/dashboard.md +++ b/openapi-specs/compute/32-07/desc/stats/dashboard.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/stats/dashboard_get.md b/openapi-specs/compute/32-07/desc/stats/dashboard_get.md index 601769645..8f0bc827c 100644 --- a/openapi-specs/compute/32-07/desc/stats/dashboard_get.md +++ b/openapi-specs/compute/32-07/desc/stats/dashboard_get.md @@ -5,7 +5,7 @@ Returns statistics about the resources protected by Prisma Cloud Compute, includ Refer to the following example cURL command that retrieves dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/stats/events_get.md b/openapi-specs/compute/32-07/desc/stats/events_get.md index 3be5eb4e7..e64f98e57 100644 --- a/openapi-specs/compute/32-07/desc/stats/events_get.md +++ b/openapi-specs/compute/32-07/desc/stats/events_get.md @@ -5,7 +5,7 @@ Returns events statistics for your environment. Refer to the following example cURL command retrieves event stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/stats/vulnerabilities.md b/openapi-specs/compute/32-07/desc/stats/vulnerabilities.md index 40c4dd1f1..199cfab62 100644 --- a/openapi-specs/compute/32-07/desc/stats/vulnerabilities.md +++ b/openapi-specs/compute/32-07/desc/stats/vulnerabilities.md @@ -5,7 +5,7 @@ For the current day, the response will also include descriptions of the CVEs cur The following example command that uses curl and basic auth to retrieve vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/stats/vulnerabilities_download_get.md b/openapi-specs/compute/32-07/desc/stats/vulnerabilities_download_get.md index 753af8c7f..9930a636b 100644 --- a/openapi-specs/compute/32-07/desc/stats/vulnerabilities_download_get.md +++ b/openapi-specs/compute/32-07/desc/stats/vulnerabilities_download_get.md @@ -17,7 +17,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a summary count of the CVEs and detailed descriptions for each CVE in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/stats/vulnerabilities_get.md b/openapi-specs/compute/32-07/desc/stats/vulnerabilities_get.md index 1a6f1c152..aaa5a907b 100644 --- a/openapi-specs/compute/32-07/desc/stats/vulnerabilities_get.md +++ b/openapi-specs/compute/32-07/desc/stats/vulnerabilities_get.md @@ -19,7 +19,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a summary count of the CVEs and detailed descriptions for each CVE: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/stats/vulnerabilities_impacted_resources_download_get.md b/openapi-specs/compute/32-07/desc/stats/vulnerabilities_impacted_resources_download_get.md index 0821d6a9f..502c09a6c 100644 --- a/openapi-specs/compute/32-07/desc/stats/vulnerabilities_impacted_resources_download_get.md +++ b/openapi-specs/compute/32-07/desc/stats/vulnerabilities_impacted_resources_download_get.md @@ -15,7 +15,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a list of impacted resources for `CVE-2015-0313` in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/stats/vulnerabilities_impacted_resources_get.md b/openapi-specs/compute/32-07/desc/stats/vulnerabilities_impacted_resources_get.md index c1e6d0ba2..014a5f4a2 100644 --- a/openapi-specs/compute/32-07/desc/stats/vulnerabilities_impacted_resources_get.md +++ b/openapi-specs/compute/32-07/desc/stats/vulnerabilities_impacted_resources_get.md @@ -18,7 +18,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a list of impacted resources for `CVE-2022-28391`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -95,7 +95,7 @@ Refer to the following example JSON response that shows the risk tree for the im Refer to the following example cURL command that retrieves a the impacted registry images `CVE-2015-0313` by using an optional query parameter `resourceType`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -108,7 +108,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a paginated list of impacted resources for `CVE-2015-0313` by using optional query parameters `limit` and `offset`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/stats/vulnerabilities_refresh.md b/openapi-specs/compute/32-07/desc/stats/vulnerabilities_refresh.md index 505a99d98..2aa7da8a1 100644 --- a/openapi-specs/compute/32-07/desc/stats/vulnerabilities_refresh.md +++ b/openapi-specs/compute/32-07/desc/stats/vulnerabilities_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/vulnerabilities endpoint r The following example command that uses curl and basic auth to refresh vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/stats/vulnerabilities_refresh_post.md b/openapi-specs/compute/32-07/desc/stats/vulnerabilities_refresh_post.md index 1e3210e18..85e3ddd7a 100644 --- a/openapi-specs/compute/32-07/desc/stats/vulnerabilities_refresh_post.md +++ b/openapi-specs/compute/32-07/desc/stats/vulnerabilities_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/vulnerabilitie Refer to the following example cURL command that refreshes the vulnerability statistics for current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/stats/workload_get.md b/openapi-specs/compute/32-07/desc/stats/workload_get.md index a25deed5c..940a835ee 100644 --- a/openapi-specs/compute/32-07/desc/stats/workload_get.md +++ b/openapi-specs/compute/32-07/desc/stats/workload_get.md @@ -1,7 +1,7 @@ Returns the workload statistics from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/statuses/intelligence.md b/openapi-specs/compute/32-07/desc/statuses/intelligence.md index 74da8c7ff..ac102e81f 100644 --- a/openapi-specs/compute/32-07/desc/statuses/intelligence.md +++ b/openapi-specs/compute/32-07/desc/statuses/intelligence.md @@ -3,7 +3,7 @@ Returns the connection status of the intelligence stream and the last intelligen The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/statuses/intelligence_get.md b/openapi-specs/compute/32-07/desc/statuses/intelligence_get.md index c18dd9611..b5f620ad9 100644 --- a/openapi-specs/compute/32-07/desc/statuses/intelligence_get.md +++ b/openapi-specs/compute/32-07/desc/statuses/intelligence_get.md @@ -3,7 +3,7 @@ Returns the connection status for the Intelligence Stream, along with the time o The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/statuses/registry_get.md b/openapi-specs/compute/32-07/desc/statuses/registry_get.md index 427c4915c..e4fd09fe9 100644 --- a/openapi-specs/compute/32-07/desc/statuses/registry_get.md +++ b/openapi-specs/compute/32-07/desc/statuses/registry_get.md @@ -13,7 +13,7 @@ To view the more details about the progress of a regular or on-demand registry s Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/statuses/secrets_get.md b/openapi-specs/compute/32-07/desc/statuses/secrets_get.md index 510f15161..e77c5ed70 100644 --- a/openapi-specs/compute/32-07/desc/statuses/secrets_get.md +++ b/openapi-specs/compute/32-07/desc/statuses/secrets_get.md @@ -3,7 +3,7 @@ Returns the connection status of any secret stores you have configured, as well The following is an example curl using basic auth to find the secret store status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/statuses/serverless-radar_get.md b/openapi-specs/compute/32-07/desc/statuses/serverless-radar_get.md index 3bfdbb5bf..4ab5d0c1d 100644 --- a/openapi-specs/compute/32-07/desc/statuses/serverless-radar_get.md +++ b/openapi-specs/compute/32-07/desc/statuses/serverless-radar_get.md @@ -1,7 +1,7 @@ Returns the status of the serverless scans. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/tags/get.md b/openapi-specs/compute/32-07/desc/tags/get.md index 6da7ad135..604eee98e 100644 --- a/openapi-specs/compute/32-07/desc/tags/get.md +++ b/openapi-specs/compute/32-07/desc/tags/get.md @@ -5,7 +5,7 @@ Retrieves a list of tags. Refer to the following example cURL command that retrieves a list of tags: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/tags/name_delete.md b/openapi-specs/compute/32-07/desc/tags/name_delete.md index 2ed010e57..6dedfce8f 100644 --- a/openapi-specs/compute/32-07/desc/tags/name_delete.md +++ b/openapi-specs/compute/32-07/desc/tags/name_delete.md @@ -5,7 +5,7 @@ Deletes a tag from the system. Refer to the following example cURL command that deletes a tag named *my tag*: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-07/desc/tags/name_put.md b/openapi-specs/compute/32-07/desc/tags/name_put.md index cbaea40d3..a5923b8ef 100644 --- a/openapi-specs/compute/32-07/desc/tags/name_put.md +++ b/openapi-specs/compute/32-07/desc/tags/name_put.md @@ -9,7 +9,7 @@ You must define all parameters in your PUT request. Refer to the following example cURL command that updates the parameters in a tag named `my_tag`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-07/desc/tags/post.md b/openapi-specs/compute/32-07/desc/tags/post.md index d55ae8b96..8e1a493d6 100644 --- a/openapi-specs/compute/32-07/desc/tags/post.md +++ b/openapi-specs/compute/32-07/desc/tags/post.md @@ -8,7 +8,7 @@ You can use tags as policy exceptions or assign them to vulnerabilities for acti Refer to the following example cURL command that creates a tag named "my-tag": ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/tags/tag_cve_delete.md b/openapi-specs/compute/32-07/desc/tags/tag_cve_delete.md index 8caed79cf..3031029b9 100644 --- a/openapi-specs/compute/32-07/desc/tags/tag_cve_delete.md +++ b/openapi-specs/compute/32-07/desc/tags/tag_cve_delete.md @@ -6,7 +6,7 @@ When you delete a tag, the tag is deleted from a wider scope. All the packages a Refer to the following example cURL command that removes the tag named `ignored` from the CVE `CVE-2017-15088`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-07/desc/tags/tag_cve_post.md b/openapi-specs/compute/32-07/desc/tags/tag_cve_post.md index 966a80bd8..1b4ead89b 100644 --- a/openapi-specs/compute/32-07/desc/tags/tag_cve_post.md +++ b/openapi-specs/compute/32-07/desc/tags/tag_cve_post.md @@ -45,7 +45,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the source package `perl`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -72,7 +72,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2021-20305` on the binary package `gnutls`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -98,7 +98,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -120,7 +120,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `image` and to all the packages and resources. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -140,7 +140,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `host`, resource `servo-vmware71`, and to all the packages. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/tas-droplets/download_get.md b/openapi-specs/compute/32-07/desc/tas-droplets/download_get.md index 6372f0b35..f9d82820d 100644 --- a/openapi-specs/compute/32-07/desc/tas-droplets/download_get.md +++ b/openapi-specs/compute/32-07/desc/tas-droplets/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > VMware The following cURL command downloads all TAS droplets to a CSV file called `tas_droplets.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/tas-droplets/get.md b/openapi-specs/compute/32-07/desc/tas-droplets/get.md index dd2b44993..a0a97e8ca 100644 --- a/openapi-specs/compute/32-07/desc/tas-droplets/get.md +++ b/openapi-specs/compute/32-07/desc/tas-droplets/get.md @@ -10,7 +10,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > VMware Tanzu bl The following cURL command retrieves all TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/tas-droplets/get_tas_addresses.md b/openapi-specs/compute/32-07/desc/tas-droplets/get_tas_addresses.md index 91ebb2e50..04c6dccb0 100644 --- a/openapi-specs/compute/32-07/desc/tas-droplets/get_tas_addresses.md +++ b/openapi-specs/compute/32-07/desc/tas-droplets/get_tas_addresses.md @@ -9,7 +9,7 @@ You get an HTTP error response 429 if the limit exceeds. The following cURL command retrieves the Cloud Controller Addresses of scanned TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/tas-droplets/progress_get.md b/openapi-specs/compute/32-07/desc/tas-droplets/progress_get.md index 504a21e84..507d001bf 100644 --- a/openapi-specs/compute/32-07/desc/tas-droplets/progress_get.md +++ b/openapi-specs/compute/32-07/desc/tas-droplets/progress_get.md @@ -5,7 +5,7 @@ Returns the details of the TAS Droplets ongoing scan. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/tas-droplets/scan_post.md b/openapi-specs/compute/32-07/desc/tas-droplets/scan_post.md index aad2174af..13c4eeeb9 100644 --- a/openapi-specs/compute/32-07/desc/tas-droplets/scan_post.md +++ b/openapi-specs/compute/32-07/desc/tas-droplets/scan_post.md @@ -5,7 +5,7 @@ Scans the TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/tas-droplets/stop_post.md b/openapi-specs/compute/32-07/desc/tas-droplets/stop_post.md index 5f5a019b1..53d709ec7 100644 --- a/openapi-specs/compute/32-07/desc/tas-droplets/stop_post.md +++ b/openapi-specs/compute/32-07/desc/tas-droplets/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing scan of TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/trust/data_get.md b/openapi-specs/compute/32-07/desc/trust/data_get.md index dd55d47a3..88983f139 100644 --- a/openapi-specs/compute/32-07/desc/trust/data_get.md +++ b/openapi-specs/compute/32-07/desc/trust/data_get.md @@ -5,7 +5,7 @@ Returns the trusted registries, repositories, and images. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/trust/data_put.md b/openapi-specs/compute/32-07/desc/trust/data_put.md index 0e6a0ba49..733514505 100644 --- a/openapi-specs/compute/32-07/desc/trust/data_put.md +++ b/openapi-specs/compute/32-07/desc/trust/data_put.md @@ -6,7 +6,7 @@ Specify trusted images using either the image name or layers properties. Refer to the following example cURL command that uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -19,7 +19,7 @@ To edit a trust group based on image base layers, use PUT to specify a list of S Refer to the following example that specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-07/desc/trust/get.md b/openapi-specs/compute/32-07/desc/trust/get.md index 1226cd0a3..57ff5bdb5 100644 --- a/openapi-specs/compute/32-07/desc/trust/get.md +++ b/openapi-specs/compute/32-07/desc/trust/get.md @@ -3,7 +3,7 @@ Retrieves a list of all trusted images. The following example curl command uses basic auth to retrieve all trusted images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/trust/id_delete.md b/openapi-specs/compute/32-07/desc/trust/id_delete.md index b3114775f..d63cdf71a 100644 --- a/openapi-specs/compute/32-07/desc/trust/id_delete.md +++ b/openapi-specs/compute/32-07/desc/trust/id_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to specify a image trust grou ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-07/desc/trust/id_put.md b/openapi-specs/compute/32-07/desc/trust/id_put.md index 44d2c8b8b..c98617bcd 100644 --- a/openapi-specs/compute/32-07/desc/trust/id_put.md +++ b/openapi-specs/compute/32-07/desc/trust/id_put.md @@ -9,7 +9,7 @@ For more information about handles, see the `_id` in the response body for the G The following example curl command uses basic auth to modify the image property for an existing trusted image entry, where the handle for the entry is `docker-ubuntu-group`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/32-07/desc/trust/learn_get.md b/openapi-specs/compute/32-07/desc/trust/learn_get.md index d8a3414d0..004b16b02 100644 --- a/openapi-specs/compute/32-07/desc/trust/learn_get.md +++ b/openapi-specs/compute/32-07/desc/trust/learn_get.md @@ -1,7 +1,7 @@ Returns the state of the trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/trust/learn_post.md b/openapi-specs/compute/32-07/desc/trust/learn_post.md index 094817738..008657fa2 100644 --- a/openapi-specs/compute/32-07/desc/trust/learn_post.md +++ b/openapi-specs/compute/32-07/desc/trust/learn_post.md @@ -1,7 +1,7 @@ Sets the state of trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/trust/post.md b/openapi-specs/compute/32-07/desc/trust/post.md index 1072275a1..23a324c6c 100644 --- a/openapi-specs/compute/32-07/desc/trust/post.md +++ b/openapi-specs/compute/32-07/desc/trust/post.md @@ -7,7 +7,7 @@ For more information about handles, see the `_id` key in the response body for t The following example curl command uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ To create a trust group based on image base layers, POST a list of SHA256 hashes The following example specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/users/get.md b/openapi-specs/compute/32-07/desc/users/get.md index e4e6966ec..cd5a661ba 100644 --- a/openapi-specs/compute/32-07/desc/users/get.md +++ b/openapi-specs/compute/32-07/desc/users/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Manage > Authentication > Users** in the Console UI. The following cURL command retrieves all users. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/users/id_delete.md b/openapi-specs/compute/32-07/desc/users/id_delete.md index 1cfa5642d..66a1102f9 100644 --- a/openapi-specs/compute/32-07/desc/users/id_delete.md +++ b/openapi-specs/compute/32-07/desc/users/id_delete.md @@ -17,7 +17,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes user `ID` from the system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/32-07/desc/util/osx_twistcli_arm64_get.md b/openapi-specs/compute/32-07/desc/util/osx_twistcli_arm64_get.md index b385d0d3b..a30686374 100644 --- a/openapi-specs/compute/32-07/desc/util/osx_twistcli_arm64_get.md +++ b/openapi-specs/compute/32-07/desc/util/osx_twistcli_arm64_get.md @@ -7,7 +7,7 @@ Downloads the twistcli binary executable for MacOS platforms based on ARM64 arch Refer to the following example cURL command that downloads and saves the “twistcli” binary executable for ARM64 bit MacOS platforms to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/compute/32-07/desc/util/osx_twistcli_get.md b/openapi-specs/compute/32-07/desc/util/osx_twistcli_get.md index c49f96c41..2353ea338 100644 --- a/openapi-specs/compute/32-07/desc/util/osx_twistcli_get.md +++ b/openapi-specs/compute/32-07/desc/util/osx_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **MacOS platform** hyperlink in **Manage > System > Ut The following cURL command downloads the twistcli binary executable for MacOS platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli \ diff --git a/openapi-specs/compute/32-07/desc/util/twistcli_arm64_get.md b/openapi-specs/compute/32-07/desc/util/twistcli_arm64_get.md index 7ec36d3f5..a3d7318ab 100644 --- a/openapi-specs/compute/32-07/desc/util/twistcli_arm64_get.md +++ b/openapi-specs/compute/32-07/desc/util/twistcli_arm64_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/compute/32-07/desc/util/twistcli_get.md b/openapi-specs/compute/32-07/desc/util/twistcli_get.md index f9d2d295c..08a3ae8aa 100644 --- a/openapi-specs/compute/32-07/desc/util/twistcli_get.md +++ b/openapi-specs/compute/32-07/desc/util/twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -X GET -o \ 'https:///api/v/util/twistcli' diff --git a/openapi-specs/compute/32-07/desc/util/twistlock_jenkins_plugin_get.md b/openapi-specs/compute/32-07/desc/util/twistlock_jenkins_plugin_get.md index 9fb8d4a02..c9f180e5e 100644 --- a/openapi-specs/compute/32-07/desc/util/twistlock_jenkins_plugin_get.md +++ b/openapi-specs/compute/32-07/desc/util/twistlock_jenkins_plugin_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-jenkins-plugin.hpi \ diff --git a/openapi-specs/compute/32-07/desc/util/twistlock_tas_tile_get.md b/openapi-specs/compute/32-07/desc/util/twistlock_tas_tile_get.md index fea28aaad..3fd114e2d 100644 --- a/openapi-specs/compute/32-07/desc/util/twistlock_tas_tile_get.md +++ b/openapi-specs/compute/32-07/desc/util/twistlock_tas_tile_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-tile.pivotal \ diff --git a/openapi-specs/compute/32-07/desc/util/windows_twistcli_get.md b/openapi-specs/compute/32-07/desc/util/windows_twistcli_get.md index 1c545dbbb..38c609b08 100644 --- a/openapi-specs/compute/32-07/desc/util/windows_twistcli_get.md +++ b/openapi-specs/compute/32-07/desc/util/windows_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Windows platform** hyperlink in **Manage > System > The following cURL command downloads the twistcli binary executable for Windows platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli.exe \ diff --git a/openapi-specs/compute/32-07/desc/version/get.md b/openapi-specs/compute/32-07/desc/version/get.md index 28be315e0..5787e90fd 100644 --- a/openapi-specs/compute/32-07/desc/version/get.md +++ b/openapi-specs/compute/32-07/desc/version/get.md @@ -5,7 +5,7 @@ Retrieves the version number for Console. The following cURL command retrieves the version number for Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/vms/download_get.md b/openapi-specs/compute/32-07/desc/vms/download_get.md index e65e4efc9..3cc813bc5 100644 --- a/openapi-specs/compute/32-07/desc/vms/download_get.md +++ b/openapi-specs/compute/32-07/desc/vms/download_get.md @@ -7,7 +7,7 @@ Returns all VM image scan reports in CSV format. Refer to the following example cURL command that retrieves all VM image scan reports and saves the results in a CSV file called `vm_images_scan.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/vms/get.md b/openapi-specs/compute/32-07/desc/vms/get.md index d44d9d801..ad9938124 100644 --- a/openapi-specs/compute/32-07/desc/vms/get.md +++ b/openapi-specs/compute/32-07/desc/vms/get.md @@ -10,7 +10,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > Hosts > VM imag Refer to the following example cURL command that retrieves all VM image scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/vms/labels_get.md b/openapi-specs/compute/32-07/desc/vms/labels_get.md index ad678b30d..eb2674bf6 100644 --- a/openapi-specs/compute/32-07/desc/vms/labels_get.md +++ b/openapi-specs/compute/32-07/desc/vms/labels_get.md @@ -5,7 +5,7 @@ Returns an array of strings containing all AWS tags of the scanned VM images. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/32-07/desc/vms/names_get.md b/openapi-specs/compute/32-07/desc/vms/names_get.md index 0283ed28e..0b905c37b 100644 --- a/openapi-specs/compute/32-07/desc/vms/names_get.md +++ b/openapi-specs/compute/32-07/desc/vms/names_get.md @@ -6,7 +6,7 @@ Returns an array of strings containing VM image names. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/32-07/desc/vms/scan_post.md b/openapi-specs/compute/32-07/desc/vms/scan_post.md index 1caa2dcaf..4d4de3ab1 100644 --- a/openapi-specs/compute/32-07/desc/vms/scan_post.md +++ b/openapi-specs/compute/32-07/desc/vms/scan_post.md @@ -5,7 +5,7 @@ Re-scans all VM images immediately. This endpoint returns the time that the scan Refer to the following example cURL command that forces Prisma Cloud to re-scan all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/32-07/desc/vms/stop_post.md b/openapi-specs/compute/32-07/desc/vms/stop_post.md index 4a74743eb..49b2b26f9 100644 --- a/openapi-specs/compute/32-07/desc/vms/stop_post.md +++ b/openapi-specs/compute/32-07/desc/vms/stop_post.md @@ -7,7 +7,7 @@ Note: It might take a few minutes for the scan to stop completely. Refer to the following example cURL command that forces Prisma Cloud to stop scanning all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/SCAP/get.md b/openapi-specs/compute/33-00/desc/SCAP/get.md index a25abe94e..f5870d822 100644 --- a/openapi-specs/compute/33-00/desc/SCAP/get.md +++ b/openapi-specs/compute/33-00/desc/SCAP/get.md @@ -3,7 +3,7 @@ This endpoint will return any SCAP datastreams uploaded to the console. This end The following is an example curl command that uses basic auth to retrieve any uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/SCAP/id_delete.md b/openapi-specs/compute/33-00/desc/SCAP/id_delete.md index 39f1b0132..52923f20a 100644 --- a/openapi-specs/compute/33-00/desc/SCAP/id_delete.md +++ b/openapi-specs/compute/33-00/desc/SCAP/id_delete.md @@ -3,7 +3,7 @@ This endpoint will delete any SCAP datastreams uploaded to the console. You can The following is an example curl command that uses basic auth to delete an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-00/desc/SCAP/post.md b/openapi-specs/compute/33-00/desc/SCAP/post.md index d459a0e97..c45fd6b4e 100644 --- a/openapi-specs/compute/33-00/desc/SCAP/post.md +++ b/openapi-specs/compute/33-00/desc/SCAP/post.md @@ -3,7 +3,7 @@ This endpoint will allow you to add a SCAP datastream to the console. The following is an example curl command that uses basic auth to add an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/_ping/get.md b/openapi-specs/compute/33-00/desc/_ping/get.md index 8e143ef67..b7ffdc653 100644 --- a/openapi-specs/compute/33-00/desc/_ping/get.md +++ b/openapi-specs/compute/33-00/desc/_ping/get.md @@ -5,7 +5,7 @@ Checks if Console is reachable from your network host. Refer to the following cURL example command that pings Console and prints the HTTP response code: ```bash -$ curl -k \ +$ curl \ -s \ -o /dev/null \ -w "%{http_code}\n" \ diff --git a/openapi-specs/compute/33-00/desc/agentless/get_agentless_progress.md b/openapi-specs/compute/33-00/desc/agentless/get_agentless_progress.md index b98ed9da5..78396eec6 100644 --- a/openapi-specs/compute/33-00/desc/agentless/get_agentless_progress.md +++ b/openapi-specs/compute/33-00/desc/agentless/get_agentless_progress.md @@ -5,7 +5,7 @@ Shows the progress of an ongoing scan on hosts or containers for vulnerabilities Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/agentless/post_agentless_scan.md b/openapi-specs/compute/33-00/desc/agentless/post_agentless_scan.md index f1295cdc4..e2f8a4e11 100644 --- a/openapi-specs/compute/33-00/desc/agentless/post_agentless_scan.md +++ b/openapi-specs/compute/33-00/desc/agentless/post_agentless_scan.md @@ -9,7 +9,7 @@ Make sure that you download (use the agentless/templates API) and apply the perm Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/agentless/post_agentless_stop.md b/openapi-specs/compute/33-00/desc/agentless/post_agentless_stop.md index ab83960cc..ddee6ec7a 100644 --- a/openapi-specs/compute/33-00/desc/agentless/post_agentless_stop.md +++ b/openapi-specs/compute/33-00/desc/agentless/post_agentless_stop.md @@ -5,7 +5,7 @@ Stops an ongoing scan on hosts or containers for vulnerabilities and compliance. Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/agentless/post_agentless_templates.md b/openapi-specs/compute/33-00/desc/agentless/post_agentless_templates.md index 96be32555..5159c439a 100644 --- a/openapi-specs/compute/33-00/desc/agentless/post_agentless_templates.md +++ b/openapi-specs/compute/33-00/desc/agentless/post_agentless_templates.md @@ -31,7 +31,7 @@ Add the supported cloud accounts (AWS, Azure, GCP, and OCI) in Prisma Cloud Comp Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/alert-profiles/get.md b/openapi-specs/compute/33-00/desc/alert-profiles/get.md index 82647e248..f17191ac4 100644 --- a/openapi-specs/compute/33-00/desc/alert-profiles/get.md +++ b/openapi-specs/compute/33-00/desc/alert-profiles/get.md @@ -3,7 +3,7 @@ Retrieve a list of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/alert-profiles/id_delete.md b/openapi-specs/compute/33-00/desc/alert-profiles/id_delete.md index 1a67fe20e..2cf21b57e 100644 --- a/openapi-specs/compute/33-00/desc/alert-profiles/id_delete.md +++ b/openapi-specs/compute/33-00/desc/alert-profiles/id_delete.md @@ -5,7 +5,7 @@ This method has no response data. The following example curl command deletes an existing alert profile named `PROFILE-NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-00/desc/alert-profiles/names_get.md b/openapi-specs/compute/33-00/desc/alert-profiles/names_get.md index cac14437b..38a1f78ca 100644 --- a/openapi-specs/compute/33-00/desc/alert-profiles/names_get.md +++ b/openapi-specs/compute/33-00/desc/alert-profiles/names_get.md @@ -3,7 +3,7 @@ Retrieve a list of only the names of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles' names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/alert-profiles/post.md b/openapi-specs/compute/33-00/desc/alert-profiles/post.md index 9fa643429..19db863d5 100644 --- a/openapi-specs/compute/33-00/desc/alert-profiles/post.md +++ b/openapi-specs/compute/33-00/desc/alert-profiles/post.md @@ -3,7 +3,7 @@ Update an existing alert profile created in the system. The following example curl command uses basic auth to add a Jira Alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/alert-profiles/test_post.md b/openapi-specs/compute/33-00/desc/alert-profiles/test_post.md index 1fc745efa..2205a6e73 100644 --- a/openapi-specs/compute/33-00/desc/alert-profiles/test_post.md +++ b/openapi-specs/compute/33-00/desc/alert-profiles/test_post.md @@ -3,7 +3,7 @@ Sends a test alert to verify successful configuration of the alert profile setti The following example curl command uses basic auth to send test alert for an email alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/application-control/get.md b/openapi-specs/compute/33-00/desc/application-control/get.md index 5bd600beb..535584284 100644 --- a/openapi-specs/compute/33-00/desc/application-control/get.md +++ b/openapi-specs/compute/33-00/desc/application-control/get.md @@ -3,7 +3,7 @@ Retrieves the host application control rules. The following example curl command uses basic auth to retrieve the control rules: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/access_delete.md b/openapi-specs/compute/33-00/desc/audits/access_delete.md index 37f33ca64..0450b534c 100644 --- a/openapi-specs/compute/33-00/desc/audits/access_delete.md +++ b/openapi-specs/compute/33-00/desc/audits/access_delete.md @@ -2,7 +2,7 @@ Deletes **all** access audits. This deletion cannot be undone. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-00/desc/audits/access_download_get.md b/openapi-specs/compute/33-00/desc/audits/access_download_get.md index 1700deb8d..8d8fee259 100644 --- a/openapi-specs/compute/33-00/desc/audits/access_download_get.md +++ b/openapi-specs/compute/33-00/desc/audits/access_download_get.md @@ -3,7 +3,7 @@ Returns the docker access audit events data in CSV format that are logged and ag **Note**: You can download the access events from Console under **Monitor > Events > Docker audits > Download CSV**. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/access_filters_get.md b/openapi-specs/compute/33-00/desc/audits/access_filters_get.md index 00ac061c1..4b8e9cd9b 100644 --- a/openapi-specs/compute/33-00/desc/audits/access_filters_get.md +++ b/openapi-specs/compute/33-00/desc/audits/access_filters_get.md @@ -5,7 +5,7 @@ The following example uses basic auth to list history of commands that are run o ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ The following command gives list of sudo events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -27,7 +27,7 @@ $ curl -k \ The following command gives list of SSHD events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/access_get.md b/openapi-specs/compute/33-00/desc/audits/access_get.md index 2401391c7..56e53fe12 100644 --- a/openapi-specs/compute/33-00/desc/audits/access_get.md +++ b/openapi-specs/compute/33-00/desc/audits/access_get.md @@ -8,7 +8,7 @@ You can configure Prisma Cloud Compute to log and aggregate events such as sudo Refer to the following example cURL command that gives a list of all access audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/admission_download_get.md b/openapi-specs/compute/33-00/desc/audits/admission_download_get.md index 9571c483f..d45f47c4e 100644 --- a/openapi-specs/compute/33-00/desc/audits/admission_download_get.md +++ b/openapi-specs/compute/33-00/desc/audits/admission_download_get.md @@ -4,7 +4,7 @@ Returns the access admission events data in CSV format that were alerted or bloc Refer to the following example cURL command that downloads the admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/admission_get.md b/openapi-specs/compute/33-00/desc/audits/admission_get.md index 84414496c..3640c737c 100644 --- a/openapi-specs/compute/33-00/desc/audits/admission_get.md +++ b/openapi-specs/compute/33-00/desc/audits/admission_get.md @@ -4,7 +4,7 @@ Returns all activities that were alerted or blocked by Defender functioning as O Refer to the following example cURL command that gives a list of all admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/firewall_network_container_download_get.md b/openapi-specs/compute/33-00/desc/audits/firewall_network_container_download_get.md index 29029ac6d..434e09acd 100644 --- a/openapi-specs/compute/33-00/desc/audits/firewall_network_container_download_get.md +++ b/openapi-specs/compute/33-00/desc/audits/firewall_network_container_download_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/firewall_network_container_get.md b/openapi-specs/compute/33-00/desc/audits/firewall_network_container_get.md index 454558a44..be03b2c45 100644 --- a/openapi-specs/compute/33-00/desc/audits/firewall_network_container_get.md +++ b/openapi-specs/compute/33-00/desc/audits/firewall_network_container_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/firewall_network_host_download_get.md b/openapi-specs/compute/33-00/desc/audits/firewall_network_host_download_get.md index 768dd00d7..e83e8e1c3 100644 --- a/openapi-specs/compute/33-00/desc/audits/firewall_network_host_download_get.md +++ b/openapi-specs/compute/33-00/desc/audits/firewall_network_host_download_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/firewall_network_host_get.md b/openapi-specs/compute/33-00/desc/audits/firewall_network_host_get.md index e5dc4c399..6cbda0d4b 100644 --- a/openapi-specs/compute/33-00/desc/audits/firewall_network_host_get.md +++ b/openapi-specs/compute/33-00/desc/audits/firewall_network_host_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/incidents_archive_patch.md b/openapi-specs/compute/33-00/desc/audits/incidents_archive_patch.md index a1127a001..d1f42eedd 100644 --- a/openapi-specs/compute/33-00/desc/audits/incidents_archive_patch.md +++ b/openapi-specs/compute/33-00/desc/audits/incidents_archive_patch.md @@ -7,7 +7,7 @@ You can get an incident ID from the list of incidents using the endpoint GET /ap Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/compute/33-00/desc/audits/incidents_download_get.md b/openapi-specs/compute/33-00/desc/audits/incidents_download_get.md index 2266c3471..5958756bf 100644 --- a/openapi-specs/compute/33-00/desc/audits/incidents_download_get.md +++ b/openapi-specs/compute/33-00/desc/audits/incidents_download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the **CSV** hyperlink in **Monitor > Runtime > Incident ex The following cURL command downloads all incidents and saves the result in a CSV file called `incidents.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/incidents_filters_get.md b/openapi-specs/compute/33-00/desc/audits/incidents_filters_get.md index 7d1c6f303..856881c90 100644 --- a/openapi-specs/compute/33-00/desc/audits/incidents_filters_get.md +++ b/openapi-specs/compute/33-00/desc/audits/incidents_filters_get.md @@ -3,7 +3,7 @@ This endpoint lists the incident categories found in your environment. The following example lists incident filters. ```bash -$ curl -k \ +$ curl \ -u \ https://console:8083/api/v1/audits/incidents/filters ``` diff --git a/openapi-specs/compute/33-00/desc/audits/incidents_get.md b/openapi-specs/compute/33-00/desc/audits/incidents_get.md index 7724a08c1..9b9451821 100644 --- a/openapi-specs/compute/33-00/desc/audits/incidents_get.md +++ b/openapi-specs/compute/33-00/desc/audits/incidents_get.md @@ -9,7 +9,7 @@ This endpoint maps to the table in **Monitor > Runtime > Incident explorer** in Refer to the following example cURL command that retrieves a list of unacknowledged incidents (not in the archived state): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/kubernetes_download_get.md b/openapi-specs/compute/33-00/desc/audits/kubernetes_download_get.md index 6008bd92a..62992095c 100644 --- a/openapi-specs/compute/33-00/desc/audits/kubernetes_download_get.md +++ b/openapi-specs/compute/33-00/desc/audits/kubernetes_download_get.md @@ -7,7 +7,7 @@ Returns the audit events data that occur in an integrated Kubernetes cluster tha Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/kubernetes_get.md b/openapi-specs/compute/33-00/desc/audits/kubernetes_get.md index e1ecb8a88..2e3f51b71 100644 --- a/openapi-specs/compute/33-00/desc/audits/kubernetes_get.md +++ b/openapi-specs/compute/33-00/desc/audits/kubernetes_get.md @@ -7,7 +7,7 @@ Retrieves events that occur in an integrated Kubernetes cluster that you configu Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/mgmt_download_get.md b/openapi-specs/compute/33-00/desc/audits/mgmt_download_get.md index ae3ef45b6..bcee17342 100644 --- a/openapi-specs/compute/33-00/desc/audits/mgmt_download_get.md +++ b/openapi-specs/compute/33-00/desc/audits/mgmt_download_get.md @@ -10,7 +10,7 @@ Management audits are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/mgmt_filters_get.md b/openapi-specs/compute/33-00/desc/audits/mgmt_filters_get.md index 854977b99..f910a4c2a 100644 --- a/openapi-specs/compute/33-00/desc/audits/mgmt_filters_get.md +++ b/openapi-specs/compute/33-00/desc/audits/mgmt_filters_get.md @@ -6,7 +6,7 @@ Use these filters to query management audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/mgmt_get.md b/openapi-specs/compute/33-00/desc/audits/mgmt_get.md index 5b586cb5e..abe802348 100644 --- a/openapi-specs/compute/33-00/desc/audits/mgmt_get.md +++ b/openapi-specs/compute/33-00/desc/audits/mgmt_get.md @@ -10,7 +10,7 @@ Management audit events are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/runtime_app_embedded_download_get.md b/openapi-specs/compute/33-00/desc/audits/runtime_app_embedded_download_get.md index f3d844ead..ec5ae0f2a 100644 --- a/openapi-specs/compute/33-00/desc/audits/runtime_app_embedded_download_get.md +++ b/openapi-specs/compute/33-00/desc/audits/runtime_app_embedded_download_get.md @@ -5,7 +5,7 @@ Returns the app-embedded runtime audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/runtime_app_embedded_get.md b/openapi-specs/compute/33-00/desc/audits/runtime_app_embedded_get.md index c1d72acfa..51a43b7f5 100644 --- a/openapi-specs/compute/33-00/desc/audits/runtime_app_embedded_get.md +++ b/openapi-specs/compute/33-00/desc/audits/runtime_app_embedded_get.md @@ -5,7 +5,7 @@ Retrieves all app-embedded runtime audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/runtime_container_delete.md b/openapi-specs/compute/33-00/desc/audits/runtime_container_delete.md index ddc8e82d6..62050c71f 100644 --- a/openapi-specs/compute/33-00/desc/audits/runtime_container_delete.md +++ b/openapi-specs/compute/33-00/desc/audits/runtime_container_delete.md @@ -3,7 +3,7 @@ Deletes all container runtime audits. The following example curl command uses basic auth to delete all the audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-00/desc/audits/runtime_container_download_get.md b/openapi-specs/compute/33-00/desc/audits/runtime_container_download_get.md index 20e673b5e..81286d929 100644 --- a/openapi-specs/compute/33-00/desc/audits/runtime_container_download_get.md +++ b/openapi-specs/compute/33-00/desc/audits/runtime_container_download_get.md @@ -6,7 +6,7 @@ Returns the container audit events data in CSV format when a runtime sensor such Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o \ diff --git a/openapi-specs/compute/33-00/desc/audits/runtime_container_get.md b/openapi-specs/compute/33-00/desc/audits/runtime_container_get.md index 11beffb24..a6b6ba484 100644 --- a/openapi-specs/compute/33-00/desc/audits/runtime_container_get.md +++ b/openapi-specs/compute/33-00/desc/audits/runtime_container_get.md @@ -7,7 +7,7 @@ Retrieves all container audit events when a runtime sensor such as process, netw Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/runtime_container_timeslice_get.md b/openapi-specs/compute/33-00/desc/audits/runtime_container_timeslice_get.md index f65d477af..01df48f28 100644 --- a/openapi-specs/compute/33-00/desc/audits/runtime_container_timeslice_get.md +++ b/openapi-specs/compute/33-00/desc/audits/runtime_container_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/runtime_file-integrity_download_get.md b/openapi-specs/compute/33-00/desc/audits/runtime_file-integrity_download_get.md index 99ec70c52..234c3ce32 100644 --- a/openapi-specs/compute/33-00/desc/audits/runtime_file-integrity_download_get.md +++ b/openapi-specs/compute/33-00/desc/audits/runtime_file-integrity_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for file-integrity checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/runtime_file-integrity_get.md b/openapi-specs/compute/33-00/desc/audits/runtime_file-integrity_get.md index 53fec9f9f..c31904422 100644 --- a/openapi-specs/compute/33-00/desc/audits/runtime_file-integrity_get.md +++ b/openapi-specs/compute/33-00/desc/audits/runtime_file-integrity_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for file-integrity checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/runtime_host_delete.md b/openapi-specs/compute/33-00/desc/audits/runtime_host_delete.md index 0ab1c877e..2ada9b15a 100644 --- a/openapi-specs/compute/33-00/desc/audits/runtime_host_delete.md +++ b/openapi-specs/compute/33-00/desc/audits/runtime_host_delete.md @@ -3,7 +3,7 @@ Deletes all host audits from the database. The following example curl command uses basic auth to delete all host audits: ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/audits/runtime/host diff --git a/openapi-specs/compute/33-00/desc/audits/runtime_host_download_get.md b/openapi-specs/compute/33-00/desc/audits/runtime_host_download_get.md index 4d0454f56..d85cc39d0 100644 --- a/openapi-specs/compute/33-00/desc/audits/runtime_host_download_get.md +++ b/openapi-specs/compute/33-00/desc/audits/runtime_host_download_get.md @@ -5,7 +5,7 @@ Returns the runtime host audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/runtime_host_get.md b/openapi-specs/compute/33-00/desc/audits/runtime_host_get.md index 044b8b42d..e063550d6 100644 --- a/openapi-specs/compute/33-00/desc/audits/runtime_host_get.md +++ b/openapi-specs/compute/33-00/desc/audits/runtime_host_get.md @@ -5,7 +5,7 @@ Retrieves the runtime host audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/runtime_host_timeslice_get.md b/openapi-specs/compute/33-00/desc/audits/runtime_host_timeslice_get.md index 8933efa74..aafd869b8 100644 --- a/openapi-specs/compute/33-00/desc/audits/runtime_host_timeslice_get.md +++ b/openapi-specs/compute/33-00/desc/audits/runtime_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/runtime_log-inspection_download_get.md b/openapi-specs/compute/33-00/desc/audits/runtime_log-inspection_download_get.md index f047ed96f..0aa1a5710 100644 --- a/openapi-specs/compute/33-00/desc/audits/runtime_log-inspection_download_get.md +++ b/openapi-specs/compute/33-00/desc/audits/runtime_log-inspection_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for log inspection checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/runtime_log-inspection_get.md b/openapi-specs/compute/33-00/desc/audits/runtime_log-inspection_get.md index 49f0d7be4..8292b623e 100644 --- a/openapi-specs/compute/33-00/desc/audits/runtime_log-inspection_get.md +++ b/openapi-specs/compute/33-00/desc/audits/runtime_log-inspection_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for log inspection checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/runtime_rasp_delete.md b/openapi-specs/compute/33-00/desc/audits/runtime_rasp_delete.md index 688e04038..14315c55b 100644 --- a/openapi-specs/compute/33-00/desc/audits/runtime_rasp_delete.md +++ b/openapi-specs/compute/33-00/desc/audits/runtime_rasp_delete.md @@ -1,7 +1,7 @@ Deletes all RASP Defender runtime audits. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-00/desc/audits/runtime_rasp_download_get.md b/openapi-specs/compute/33-00/desc/audits/runtime_rasp_download_get.md index 303c75858..11a85100d 100644 --- a/openapi-specs/compute/33-00/desc/audits/runtime_rasp_download_get.md +++ b/openapi-specs/compute/33-00/desc/audits/runtime_rasp_download_get.md @@ -1,7 +1,7 @@ Returns CSV data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/runtime_rasp_get.md b/openapi-specs/compute/33-00/desc/audits/runtime_rasp_get.md index 229d908b1..0475cb149 100644 --- a/openapi-specs/compute/33-00/desc/audits/runtime_rasp_get.md +++ b/openapi-specs/compute/33-00/desc/audits/runtime_rasp_get.md @@ -1,7 +1,7 @@ Returns JSON data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/runtime_serverless_delete.md b/openapi-specs/compute/33-00/desc/audits/runtime_serverless_delete.md index 99ada0515..e27ebe858 100644 --- a/openapi-specs/compute/33-00/desc/audits/runtime_serverless_delete.md +++ b/openapi-specs/compute/33-00/desc/audits/runtime_serverless_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to delete the current audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-00/desc/audits/runtime_serverless_download_get.md b/openapi-specs/compute/33-00/desc/audits/runtime_serverless_download_get.md index f829d2342..91693c145 100644 --- a/openapi-specs/compute/33-00/desc/audits/runtime_serverless_download_get.md +++ b/openapi-specs/compute/33-00/desc/audits/runtime_serverless_download_get.md @@ -5,7 +5,7 @@ Returns the scan audit events data in CSV format for any configured serverless f Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/runtime_serverless_filters_get.md b/openapi-specs/compute/33-00/desc/audits/runtime_serverless_filters_get.md index b9bf38610..babda78dd 100644 --- a/openapi-specs/compute/33-00/desc/audits/runtime_serverless_filters_get.md +++ b/openapi-specs/compute/33-00/desc/audits/runtime_serverless_filters_get.md @@ -2,7 +2,7 @@ Returns all serverless filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/runtime_serverless_get.md b/openapi-specs/compute/33-00/desc/audits/runtime_serverless_get.md index 045946886..f6aeb748e 100644 --- a/openapi-specs/compute/33-00/desc/audits/runtime_serverless_get.md +++ b/openapi-specs/compute/33-00/desc/audits/runtime_serverless_get.md @@ -5,7 +5,7 @@ Retrieves all scan events for any configured serverless functions in Prisma Clou Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/runtime_serverless_timeslice_get.md b/openapi-specs/compute/33-00/desc/audits/runtime_serverless_timeslice_get.md index 863890174..a2456cec0 100644 --- a/openapi-specs/compute/33-00/desc/audits/runtime_serverless_timeslice_get.md +++ b/openapi-specs/compute/33-00/desc/audits/runtime_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/trust_delete.md b/openapi-specs/compute/33-00/desc/audits/trust_delete.md index 0bfb2bd81..4aaeef3fe 100644 --- a/openapi-specs/compute/33-00/desc/audits/trust_delete.md +++ b/openapi-specs/compute/33-00/desc/audits/trust_delete.md @@ -1,7 +1,7 @@ Deletes all the trust audits from the events page in Console. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-00/desc/audits/trust_download_get.md b/openapi-specs/compute/33-00/desc/audits/trust_download_get.md index 21c0e55a2..234089449 100644 --- a/openapi-specs/compute/33-00/desc/audits/trust_download_get.md +++ b/openapi-specs/compute/33-00/desc/audits/trust_download_get.md @@ -5,7 +5,7 @@ Returns the trust audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/trust_get.md b/openapi-specs/compute/33-00/desc/audits/trust_get.md index 8fb3a341d..de7d47e96 100644 --- a/openapi-specs/compute/33-00/desc/audits/trust_get.md +++ b/openapi-specs/compute/33-00/desc/audits/trust_get.md @@ -4,7 +4,7 @@ Retrieves all the trust audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/waas_agentless_download_get.md b/openapi-specs/compute/33-00/desc/audits/waas_agentless_download_get.md index bbfcd12f5..f930ef6b3 100644 --- a/openapi-specs/compute/33-00/desc/audits/waas_agentless_download_get.md +++ b/openapi-specs/compute/33-00/desc/audits/waas_agentless_download_get.md @@ -7,7 +7,7 @@ Returns the agentless Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/waas_agentless_get.md b/openapi-specs/compute/33-00/desc/audits/waas_agentless_get.md index ad40ae497..b257b0385 100644 --- a/openapi-specs/compute/33-00/desc/audits/waas_agentless_get.md +++ b/openapi-specs/compute/33-00/desc/audits/waas_agentless_get.md @@ -7,7 +7,7 @@ Retrieves all agentless Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/waas_agentless_timeslice_get.md b/openapi-specs/compute/33-00/desc/audits/waas_agentless_timeslice_get.md index 007c6dba3..3eaf34b25 100644 --- a/openapi-specs/compute/33-00/desc/audits/waas_agentless_timeslice_get.md +++ b/openapi-specs/compute/33-00/desc/audits/waas_agentless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/waas_app_embedded_download_get.md b/openapi-specs/compute/33-00/desc/audits/waas_app_embedded_download_get.md index 149c10376..c94aa87b0 100644 --- a/openapi-specs/compute/33-00/desc/audits/waas_app_embedded_download_get.md +++ b/openapi-specs/compute/33-00/desc/audits/waas_app_embedded_download_get.md @@ -6,7 +6,7 @@ Returns the app-embedded WAAS audit events data in CSV format for the specified Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/waas_app_embedded_get.md b/openapi-specs/compute/33-00/desc/audits/waas_app_embedded_get.md index 400fa447d..6318fb299 100644 --- a/openapi-specs/compute/33-00/desc/audits/waas_app_embedded_get.md +++ b/openapi-specs/compute/33-00/desc/audits/waas_app_embedded_get.md @@ -6,7 +6,7 @@ Returns all app-embedded WAAS audit events for the specified query parameters. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/waas_app_embedded_timeslice_get.md b/openapi-specs/compute/33-00/desc/audits/waas_app_embedded_timeslice_get.md index 79a60038e..42a76d08c 100644 --- a/openapi-specs/compute/33-00/desc/audits/waas_app_embedded_timeslice_get.md +++ b/openapi-specs/compute/33-00/desc/audits/waas_app_embedded_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the app-embedded WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/waas_container_download_get.md b/openapi-specs/compute/33-00/desc/audits/waas_container_download_get.md index 9a5e04fad..7d26c34f4 100644 --- a/openapi-specs/compute/33-00/desc/audits/waas_container_download_get.md +++ b/openapi-specs/compute/33-00/desc/audits/waas_container_download_get.md @@ -6,7 +6,7 @@ Returns the container Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that downloads the WAAS container audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/waas_container_get.md b/openapi-specs/compute/33-00/desc/audits/waas_container_get.md index ac0df80fd..c1ad08f3c 100644 --- a/openapi-specs/compute/33-00/desc/audits/waas_container_get.md +++ b/openapi-specs/compute/33-00/desc/audits/waas_container_get.md @@ -6,7 +6,7 @@ Retrieves all container Web-Application and API Security (WAAS) audits. Refer to the following example cURL command that retrieves all container WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/waas_container_timeslice_get.md b/openapi-specs/compute/33-00/desc/audits/waas_container_timeslice_get.md index a56b4c48f..be56260d6 100644 --- a/openapi-specs/compute/33-00/desc/audits/waas_container_timeslice_get.md +++ b/openapi-specs/compute/33-00/desc/audits/waas_container_timeslice_get.md @@ -11,7 +11,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the container WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s):: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/waas_host_download_get.md b/openapi-specs/compute/33-00/desc/audits/waas_host_download_get.md index 4bc66202b..71692e682 100644 --- a/openapi-specs/compute/33-00/desc/audits/waas_host_download_get.md +++ b/openapi-specs/compute/33-00/desc/audits/waas_host_download_get.md @@ -7,7 +7,7 @@ Returns the host Web-Application and API Security (WAAS) audit events data in CS Refer to the following example cURL command that downloads the host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/waas_host_get.md b/openapi-specs/compute/33-00/desc/audits/waas_host_get.md index 14c967594..f6e3df050 100644 --- a/openapi-specs/compute/33-00/desc/audits/waas_host_get.md +++ b/openapi-specs/compute/33-00/desc/audits/waas_host_get.md @@ -7,7 +7,7 @@ Retrieves all host Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/waas_host_timeslice_get.md b/openapi-specs/compute/33-00/desc/audits/waas_host_timeslice_get.md index e28ed7b7a..67b3a54c3 100644 --- a/openapi-specs/compute/33-00/desc/audits/waas_host_timeslice_get.md +++ b/openapi-specs/compute/33-00/desc/audits/waas_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves host WAAS audit events for a specific time frame: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/waas_serverless_download_get.md b/openapi-specs/compute/33-00/desc/audits/waas_serverless_download_get.md index da05504df..0c0dbe698 100644 --- a/openapi-specs/compute/33-00/desc/audits/waas_serverless_download_get.md +++ b/openapi-specs/compute/33-00/desc/audits/waas_serverless_download_get.md @@ -7,7 +7,7 @@ Returns the serverless function Web-Application and API Security (WAAS) audit ev Refer to the following example cURL command that downloads the serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/waas_serverless_get.md b/openapi-specs/compute/33-00/desc/audits/waas_serverless_get.md index fe482a3f3..82488f7ee 100644 --- a/openapi-specs/compute/33-00/desc/audits/waas_serverless_get.md +++ b/openapi-specs/compute/33-00/desc/audits/waas_serverless_get.md @@ -7,7 +7,7 @@ Retrieves all serverless function Web-Application and API Security (WAAS) audit Refer to the following example cURL command that retrieves all serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/audits/waas_serverless_timeslice_get.md b/openapi-specs/compute/33-00/desc/audits/waas_serverless_timeslice_get.md index ec9ff3df1..a0a9a1368 100644 --- a/openapi-specs/compute/33-00/desc/audits/waas_serverless_timeslice_get.md +++ b/openapi-specs/compute/33-00/desc/audits/waas_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the serverless WAAS audit events for a : ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/authenticate-client/post.md b/openapi-specs/compute/33-00/desc/authenticate-client/post.md index bc493d04e..ce6f00afe 100644 --- a/openapi-specs/compute/33-00/desc/authenticate-client/post.md +++ b/openapi-specs/compute/33-00/desc/authenticate-client/post.md @@ -8,7 +8,7 @@ This endpoint checks the supplied client certificate and authorizes the user bas Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X POST \ --cert \ https:///api/v/authenticate-client diff --git a/openapi-specs/compute/33-00/desc/authenticate/post.md b/openapi-specs/compute/33-00/desc/authenticate/post.md index cb018de64..4f85c5d34 100644 --- a/openapi-specs/compute/33-00/desc/authenticate/post.md +++ b/openapi-specs/compute/33-00/desc/authenticate/post.md @@ -9,7 +9,7 @@ You can set the validity period in Console under **Manage > Authentication > Log Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H "Content-Type: application/json" \ -X POST \ -d \ diff --git a/openapi-specs/compute/33-00/desc/authenticate/renew_get.md b/openapi-specs/compute/33-00/desc/authenticate/renew_get.md index 6040d58e1..3458b500a 100644 --- a/openapi-specs/compute/33-00/desc/authenticate/renew_get.md +++ b/openapi-specs/compute/33-00/desc/authenticate/renew_get.md @@ -5,7 +5,7 @@ Renews an old (unexpired) access token and returns a new token. The following cURL command retrieves a new access token using an old access token. ```bash -$ curl -k \ +$ curl \ -H "Authorization: Bearer " \ https:///api/v1/authenticate/renew ``` diff --git a/openapi-specs/compute/33-00/desc/certs/capem_get.md b/openapi-specs/compute/33-00/desc/certs/capem_get.md index f0f0f1bf3..945476c9b 100644 --- a/openapi-specs/compute/33-00/desc/certs/capem_get.md +++ b/openapi-specs/compute/33-00/desc/certs/capem_get.md @@ -5,7 +5,7 @@ Retrieves the Base64-encoded SSL root certificate self-signed by primary certifi Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/certs/client-certs_get.md b/openapi-specs/compute/33-00/desc/certs/client-certs_get.md index d099b3e3d..279d196b1 100644 --- a/openapi-specs/compute/33-00/desc/certs/client-certs_get.md +++ b/openapi-specs/compute/33-00/desc/certs/client-certs_get.md @@ -3,7 +3,7 @@ Downloads a script that installs a client certificate, client private key, and c The following example curl command uses basic auth to download and run the install script for your client certs: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/certs/client-certs.sh | sh diff --git a/openapi-specs/compute/33-00/desc/certs/server-certs_get.md b/openapi-specs/compute/33-00/desc/certs/server-certs_get.md index 0bb13f51d..118a4d9b0 100644 --- a/openapi-specs/compute/33-00/desc/certs/server-certs_get.md +++ b/openapi-specs/compute/33-00/desc/certs/server-certs_get.md @@ -12,7 +12,7 @@ Retrieves the server certificate bundle from Prisma Cloud Compute that contains Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -u \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/cloud/compliance_download_get.md b/openapi-specs/compute/33-00/desc/cloud/compliance_download_get.md index 7b1ec9fea..14f2725b1 100644 --- a/openapi-specs/compute/33-00/desc/cloud/compliance_download_get.md +++ b/openapi-specs/compute/33-00/desc/cloud/compliance_download_get.md @@ -2,7 +2,7 @@ Download all cloud scan data in CSV format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/cloud/compliance_get.md b/openapi-specs/compute/33-00/desc/cloud/compliance_get.md index 48c2fe5bb..ad47e0998 100644 --- a/openapi-specs/compute/33-00/desc/cloud/compliance_get.md +++ b/openapi-specs/compute/33-00/desc/cloud/compliance_get.md @@ -2,7 +2,7 @@ Returns a list of all cloud compliance scan results. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/cloud/compliance_scan_post.md b/openapi-specs/compute/33-00/desc/cloud/compliance_scan_post.md index 7f87bf1f4..7321c3b9d 100644 --- a/openapi-specs/compute/33-00/desc/cloud/compliance_scan_post.md +++ b/openapi-specs/compute/33-00/desc/cloud/compliance_scan_post.md @@ -2,7 +2,7 @@ Initiates a new cloud compliance scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/cloud/compliance_stop_post.md b/openapi-specs/compute/33-00/desc/cloud/compliance_stop_post.md index df0febb56..60c31dc51 100644 --- a/openapi-specs/compute/33-00/desc/cloud/compliance_stop_post.md +++ b/openapi-specs/compute/33-00/desc/cloud/compliance_stop_post.md @@ -2,7 +2,7 @@ Terminates a cloud compliance scan that's in progress.. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/cloud/discovery_download_get.md b/openapi-specs/compute/33-00/desc/cloud/discovery_download_get.md index 44d60a113..a667c8471 100644 --- a/openapi-specs/compute/33-00/desc/cloud/discovery_download_get.md +++ b/openapi-specs/compute/33-00/desc/cloud/discovery_download_get.md @@ -5,7 +5,7 @@ Downloads all cloud scan data in a CSV file. Refer to the following cURL example command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/cloud/discovery_entities_get.md b/openapi-specs/compute/33-00/desc/cloud/discovery_entities_get.md index a7abbdfb6..85f1be971 100644 --- a/openapi-specs/compute/33-00/desc/cloud/discovery_entities_get.md +++ b/openapi-specs/compute/33-00/desc/cloud/discovery_entities_get.md @@ -7,7 +7,7 @@ Use this API endpoint along with the `GET, api/vVERSION/cloud/discovery` to get Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/cloud/discovery_get.md b/openapi-specs/compute/33-00/desc/cloud/discovery_get.md index 28025f140..c2b4c6e3c 100644 --- a/openapi-specs/compute/33-00/desc/cloud/discovery_get.md +++ b/openapi-specs/compute/33-00/desc/cloud/discovery_get.md @@ -8,7 +8,7 @@ Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/cloud/discovery_scan_post.md b/openapi-specs/compute/33-00/desc/cloud/discovery_scan_post.md index 51799ebdb..0717096f8 100644 --- a/openapi-specs/compute/33-00/desc/cloud/discovery_scan_post.md +++ b/openapi-specs/compute/33-00/desc/cloud/discovery_scan_post.md @@ -5,7 +5,7 @@ Initiates a new cloud discovery scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/cloud/discovery_stop_post.md b/openapi-specs/compute/33-00/desc/cloud/discovery_stop_post.md index 6a6c7a5a5..73dbf46e7 100644 --- a/openapi-specs/compute/33-00/desc/cloud/discovery_stop_post.md +++ b/openapi-specs/compute/33-00/desc/cloud/discovery_stop_post.md @@ -5,7 +5,7 @@ Terminates a cloud discovery scan that's in progress. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/cloud/discovery_vms_get.md b/openapi-specs/compute/33-00/desc/cloud/discovery_vms_get.md index 6766f4e5a..2264a27fe 100644 --- a/openapi-specs/compute/33-00/desc/cloud/discovery_vms_get.md +++ b/openapi-specs/compute/33-00/desc/cloud/discovery_vms_get.md @@ -5,7 +5,7 @@ Returns the discovered cloud VM instances. Refer to the following example cURL command that retrieves all the discovered cloud VM instances: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/coderepos/download_get.md b/openapi-specs/compute/33-00/desc/coderepos/download_get.md index 4ec0197bb..b06dd9f17 100644 --- a/openapi-specs/compute/33-00/desc/coderepos/download_get.md +++ b/openapi-specs/compute/33-00/desc/coderepos/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Code re The following cURL command generates a CSV file containing the reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/coderepos/get.md b/openapi-specs/compute/33-00/desc/coderepos/get.md index 54c4e99bf..42dc16fb6 100644 --- a/openapi-specs/compute/33-00/desc/coderepos/get.md +++ b/openapi-specs/compute/33-00/desc/coderepos/get.md @@ -10,7 +10,7 @@ This endpoint maps to the **Code repositories** table in **Monitor > Vulnerabili The following cURL command retrieves all code repository scan reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/collections/get.md b/openapi-specs/compute/33-00/desc/collections/get.md index 99120d17d..5a9e8a50c 100755 --- a/openapi-specs/compute/33-00/desc/collections/get.md +++ b/openapi-specs/compute/33-00/desc/collections/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table in **Manage > Collections and Tags > Collections Refer to the following example cURL command that returns a list of collections: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/collections/name_delete.md b/openapi-specs/compute/33-00/desc/collections/name_delete.md index 3e2debd01..033358000 100755 --- a/openapi-specs/compute/33-00/desc/collections/name_delete.md +++ b/openapi-specs/compute/33-00/desc/collections/name_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that deletes a collection with the name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-00/desc/collections/name_usages_get.md b/openapi-specs/compute/33-00/desc/collections/name_usages_get.md index 5c9c40424..89e383cce 100755 --- a/openapi-specs/compute/33-00/desc/collections/name_usages_get.md +++ b/openapi-specs/compute/33-00/desc/collections/name_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that retrieves all policies with name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/containers/count_get.md b/openapi-specs/compute/33-00/desc/containers/count_get.md index 4c6ecdcb4..aca59a913 100644 --- a/openapi-specs/compute/33-00/desc/containers/count_get.md +++ b/openapi-specs/compute/33-00/desc/containers/count_get.md @@ -5,7 +5,7 @@ Returns an integer representing the number of containers in your environment. Refer to the following example cURL command that returns the number of containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/containers/download_get.md b/openapi-specs/compute/33-00/desc/containers/download_get.md index 5c0811d7c..5ed3fec35 100644 --- a/openapi-specs/compute/33-00/desc/containers/download_get.md +++ b/openapi-specs/compute/33-00/desc/containers/download_get.md @@ -9,7 +9,7 @@ You can download the container scan reports in CSV format in Console under **Mon Refer to the following example cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/containers/filters_get.md b/openapi-specs/compute/33-00/desc/containers/filters_get.md index c8a1dfca4..6c2777819 100644 --- a/openapi-specs/compute/33-00/desc/containers/filters_get.md +++ b/openapi-specs/compute/33-00/desc/containers/filters_get.md @@ -1,7 +1,7 @@ Returns all container filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/containers/get.md b/openapi-specs/compute/33-00/desc/containers/get.md index 4cacdde60..3de9dd4af 100644 --- a/openapi-specs/compute/33-00/desc/containers/get.md +++ b/openapi-specs/compute/33-00/desc/containers/get.md @@ -16,7 +16,7 @@ Refer to the following available options for the `fields` query parameters: Refer to the following example cURL command that retrieves a scan report for all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -26,7 +26,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a scan report for a container with the collection ``: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/containers/labels_get.md b/openapi-specs/compute/33-00/desc/containers/labels_get.md index eb40a748d..7a63ab6fb 100644 --- a/openapi-specs/compute/33-00/desc/containers/labels_get.md +++ b/openapi-specs/compute/33-00/desc/containers/labels_get.md @@ -1,7 +1,7 @@ Returns an array of strings containing all of the labels. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/containers/names_get.md b/openapi-specs/compute/33-00/desc/containers/names_get.md index 8b32465d5..9025e2e10 100644 --- a/openapi-specs/compute/33-00/desc/containers/names_get.md +++ b/openapi-specs/compute/33-00/desc/containers/names_get.md @@ -5,7 +5,7 @@ Returns an array of strings containing all container names. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/containers/scan_post.md b/openapi-specs/compute/33-00/desc/containers/scan_post.md index 6b2bdaaba..56137cf64 100644 --- a/openapi-specs/compute/33-00/desc/containers/scan_post.md +++ b/openapi-specs/compute/33-00/desc/containers/scan_post.md @@ -4,7 +4,7 @@ This endpoint returns the time that the scans were initiated. The following example command uses curl and basic auth to force Prisma Cloud Compute to re-scan all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/credentials/get.md b/openapi-specs/compute/33-00/desc/credentials/get.md index ee4309dee..b807ce8f3 100644 --- a/openapi-specs/compute/33-00/desc/credentials/get.md +++ b/openapi-specs/compute/33-00/desc/credentials/get.md @@ -6,7 +6,7 @@ This endpoint maps to **Manage > Authentication > Credentials store** in the Con Refer to the following example cURL command that retrieves all credentials: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/credentials/id_delete.md b/openapi-specs/compute/33-00/desc/credentials/id_delete.md index e5c70259e..27f090158 100644 --- a/openapi-specs/compute/33-00/desc/credentials/id_delete.md +++ b/openapi-specs/compute/33-00/desc/credentials/id_delete.md @@ -14,7 +14,7 @@ To invoke this endpoint in the Prisma Cloud Compute user interface: Refer to the following example cURL command that deletes an existing credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-00/desc/credentials/id_usages_get.md b/openapi-specs/compute/33-00/desc/credentials/id_usages_get.md index 76c1099aa..ca2ce6216 100644 --- a/openapi-specs/compute/33-00/desc/credentials/id_usages_get.md +++ b/openapi-specs/compute/33-00/desc/credentials/id_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following cURL command that retrieves all usages for a credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/curl_examples.md b/openapi-specs/compute/33-00/desc/curl_examples.md index 3d4fcd468..745d21db3 100644 --- a/openapi-specs/compute/33-00/desc/curl_examples.md +++ b/openapi-specs/compute/33-00/desc/curl_examples.md @@ -6,7 +6,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -17,7 +17,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -29,7 +29,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/compute/33-00/desc/custom-compliance/get.md b/openapi-specs/compute/33-00/desc/custom-compliance/get.md index 9022a87b7..9dddcff4e 100644 --- a/openapi-specs/compute/33-00/desc/custom-compliance/get.md +++ b/openapi-specs/compute/33-00/desc/custom-compliance/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example curl command that gets the list of custom compliance checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/custom-compliance/id_delete.md b/openapi-specs/compute/33-00/desc/custom-compliance/id_delete.md index 72c7183ee..f6536e51d 100644 --- a/openapi-specs/compute/33-00/desc/custom-compliance/id_delete.md +++ b/openapi-specs/compute/33-00/desc/custom-compliance/id_delete.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example cURL command that uses basic auth to delete the compliance check with id 9000: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-00/desc/custom-compliance/put.md b/openapi-specs/compute/33-00/desc/custom-compliance/put.md index 480e41b54..b8760a11f 100644 --- a/openapi-specs/compute/33-00/desc/custom-compliance/put.md +++ b/openapi-specs/compute/33-00/desc/custom-compliance/put.md @@ -21,7 +21,7 @@ Create `custom_check.json` file (example): Refer to the following example curl command that uses basic auth to update the checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-00/desc/custom-rules/get.md b/openapi-specs/compute/33-00/desc/custom-rules/get.md index f0385f81a..f77924be8 100644 --- a/openapi-specs/compute/33-00/desc/custom-rules/get.md +++ b/openapi-specs/compute/33-00/desc/custom-rules/get.md @@ -7,7 +7,7 @@ This endpoint maps to the policy table in **Defend > Custom rules** in the Conso Refer to the following example cURL command that retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/custom-rules/id_delete.md b/openapi-specs/compute/33-00/desc/custom-rules/id_delete.md index c0d6dc8b0..01412abf3 100644 --- a/openapi-specs/compute/33-00/desc/custom-rules/id_delete.md +++ b/openapi-specs/compute/33-00/desc/custom-rules/id_delete.md @@ -5,7 +5,7 @@ Deletes a custom rule. Refer to the following example cURL command that deletes a custom rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-00/desc/cves/distribution_get.md b/openapi-specs/compute/33-00/desc/cves/distribution_get.md index aecddce23..7365e1a5e 100644 --- a/openapi-specs/compute/33-00/desc/cves/distribution_get.md +++ b/openapi-specs/compute/33-00/desc/cves/distribution_get.md @@ -3,7 +3,7 @@ Retrieves CVEs from the vulnerability database grouped into distribution where y The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/cves/get.md b/openapi-specs/compute/33-00/desc/cves/get.md index 469ea4b28..f81223298 100644 --- a/openapi-specs/compute/33-00/desc/cves/get.md +++ b/openapi-specs/compute/33-00/desc/cves/get.md @@ -6,7 +6,7 @@ A null response indicates that the CVE is not in our database. The following example curl command queries the Prisma Cloud Compute database for `CVE-2018-1102`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/defenders/app_embedded_post.md b/openapi-specs/compute/33-00/desc/defenders/app_embedded_post.md index 9167469d0..7999cbadb 100644 --- a/openapi-specs/compute/33-00/desc/defenders/app_embedded_post.md +++ b/openapi-specs/compute/33-00/desc/defenders/app_embedded_post.md @@ -5,7 +5,7 @@ Creates an augmented Dockerfile with Defender and dependencies included as a ZIP Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/defenders/daemonset_yaml_get.md b/openapi-specs/compute/33-00/desc/defenders/daemonset_yaml_get.md index 678901a8a..b68869081 100644 --- a/openapi-specs/compute/33-00/desc/defenders/daemonset_yaml_get.md +++ b/openapi-specs/compute/33-00/desc/defenders/daemonset_yaml_get.md @@ -10,7 +10,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https://:8083/api/v1/defenders/daemonset.yaml?consoleaddr=&listener=none&namespace=twistlock&orchestration=kubernetes' diff --git a/openapi-specs/compute/33-00/desc/defenders/daemonset_yaml_post.md b/openapi-specs/compute/33-00/desc/defenders/daemonset_yaml_post.md index 268e3ba81..af006122b 100644 --- a/openapi-specs/compute/33-00/desc/defenders/daemonset_yaml_post.md +++ b/openapi-specs/compute/33-00/desc/defenders/daemonset_yaml_post.md @@ -5,7 +5,7 @@ Creates a DaemonSet deployment file in YAML format that you can use to deploy De Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/defenders/download_get.md b/openapi-specs/compute/33-00/desc/defenders/download_get.md index 2d9435506..67f08c0e5 100644 --- a/openapi-specs/compute/33-00/desc/defenders/download_get.md +++ b/openapi-specs/compute/33-00/desc/defenders/download_get.md @@ -8,7 +8,7 @@ Use the query parameters to filter what data is returned. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o \ diff --git a/openapi-specs/compute/33-00/desc/defenders/fargate_json_post.md b/openapi-specs/compute/33-00/desc/defenders/fargate_json_post.md index 5128e90a1..e2e4e85ab 100644 --- a/openapi-specs/compute/33-00/desc/defenders/fargate_json_post.md +++ b/openapi-specs/compute/33-00/desc/defenders/fargate_json_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command: Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -23,7 +23,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/defenders/fargate_yaml_post.md b/openapi-specs/compute/33-00/desc/defenders/fargate_yaml_post.md index 9a8306a1b..95560526a 100644 --- a/openapi-specs/compute/33-00/desc/defenders/fargate_yaml_post.md +++ b/openapi-specs/compute/33-00/desc/defenders/fargate_yaml_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.yaml` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/yaml' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/defenders/get.md b/openapi-specs/compute/33-00/desc/defenders/get.md index 471e7ef9d..8d2f5cd4c 100644 --- a/openapi-specs/compute/33-00/desc/defenders/get.md +++ b/openapi-specs/compute/33-00/desc/defenders/get.md @@ -7,7 +7,7 @@ This endpoint maps to the UI Console page in **Manage > Defenders > Defenders**. Refer to the following example cURL command that retrieves all deployed Defenders. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/defenders/helm_get.md b/openapi-specs/compute/33-00/desc/defenders/helm_get.md index b11f9c4b9..487c8b7e8 100644 --- a/openapi-specs/compute/33-00/desc/defenders/helm_get.md +++ b/openapi-specs/compute/33-00/desc/defenders/helm_get.md @@ -13,7 +13,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o twistlock-defender-helm.tar.gz \ diff --git a/openapi-specs/compute/33-00/desc/defenders/helm_post.md b/openapi-specs/compute/33-00/desc/defenders/helm_post.md index 2046e63eb..fb76807ae 100644 --- a/openapi-specs/compute/33-00/desc/defenders/helm_post.md +++ b/openapi-specs/compute/33-00/desc/defenders/helm_post.md @@ -5,7 +5,7 @@ Creates a Helm deployment file that you can use to deploy Defenders to your clus Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/defenders/id_delete.md b/openapi-specs/compute/33-00/desc/defenders/id_delete.md index f637ef850..e3ac52daf 100644 --- a/openapi-specs/compute/33-00/desc/defenders/id_delete.md +++ b/openapi-specs/compute/33-00/desc/defenders/id_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes an existing Defender on a host. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-00/desc/defenders/id_features_post.md b/openapi-specs/compute/33-00/desc/defenders/id_features_post.md index ec8e4c5f3..9b42f5fa0 100644 --- a/openapi-specs/compute/33-00/desc/defenders/id_features_post.md +++ b/openapi-specs/compute/33-00/desc/defenders/id_features_post.md @@ -3,7 +3,7 @@ Updates a deployed Defender's configuration. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/defenders/id_restart_post.md b/openapi-specs/compute/33-00/desc/defenders/id_restart_post.md index da0cc7811..7296a186b 100644 --- a/openapi-specs/compute/33-00/desc/defenders/id_restart_post.md +++ b/openapi-specs/compute/33-00/desc/defenders/id_restart_post.md @@ -3,7 +3,7 @@ Restarts Defender on a given host. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/defenders/id_upgrade_post.md b/openapi-specs/compute/33-00/desc/defenders/id_upgrade_post.md index f0d30d1e9..3e63c6414 100644 --- a/openapi-specs/compute/33-00/desc/defenders/id_upgrade_post.md +++ b/openapi-specs/compute/33-00/desc/defenders/id_upgrade_post.md @@ -7,7 +7,7 @@ Upgrades Defender on ``. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/defenders/image-name_get.md b/openapi-specs/compute/33-00/desc/defenders/image-name_get.md index e81ba3e19..19f360c07 100644 --- a/openapi-specs/compute/33-00/desc/defenders/image-name_get.md +++ b/openapi-specs/compute/33-00/desc/defenders/image-name_get.md @@ -5,7 +5,7 @@ Returns the full Docker image name for Defender. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/defenders/install-bundle_get.md b/openapi-specs/compute/33-00/desc/defenders/install-bundle_get.md index 882d0cd53..9b09e733f 100644 --- a/openapi-specs/compute/33-00/desc/defenders/install-bundle_get.md +++ b/openapi-specs/compute/33-00/desc/defenders/install-bundle_get.md @@ -5,7 +5,7 @@ Returns the certificate bundle that Defender needs to securely connect to Consol Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/defenders/names_get.md b/openapi-specs/compute/33-00/desc/defenders/names_get.md index 728eb6364..6339c1483 100644 --- a/openapi-specs/compute/33-00/desc/defenders/names_get.md +++ b/openapi-specs/compute/33-00/desc/defenders/names_get.md @@ -5,7 +5,7 @@ Retrieves a list of Defender hostnames that can be used as the `{id}` query para Refer to the following example cURL command that retrieves a list of all Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -15,7 +15,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of connected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -25,7 +25,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of disconnected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -37,7 +37,7 @@ The endpoint enlists all the connected and disconnected Defenders if do not spec Refer to the following example cURL command that retrieves a list of Defenders by type: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/defenders/rasp_post.md b/openapi-specs/compute/33-00/desc/defenders/rasp_post.md index 526a9e112..e110044dd 100644 --- a/openapi-specs/compute/33-00/desc/defenders/rasp_post.md +++ b/openapi-specs/compute/33-00/desc/defenders/rasp_post.md @@ -7,7 +7,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o rasp-defender.zip diff --git a/openapi-specs/compute/33-00/desc/defenders/serverless-bundle_post.md b/openapi-specs/compute/33-00/desc/defenders/serverless-bundle_post.md index df4f13e6a..7533e436b 100644 --- a/openapi-specs/compute/33-00/desc/defenders/serverless-bundle_post.md +++ b/openapi-specs/compute/33-00/desc/defenders/serverless-bundle_post.md @@ -5,7 +5,7 @@ Downloads a ZIP file with serverless Defender bundle. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/octet-stream' \ -o serverless_bundle.zip \ diff --git a/openapi-specs/compute/33-00/desc/defenders/summary_get.md b/openapi-specs/compute/33-00/desc/defenders/summary_get.md index 08be4ebc4..e308ef64b 100644 --- a/openapi-specs/compute/33-00/desc/defenders/summary_get.md +++ b/openapi-specs/compute/33-00/desc/defenders/summary_get.md @@ -6,7 +6,7 @@ Lists the number of Defenders in each defender category. Refer to the following example cURL command that retrieves a summary of Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/defenders/upgrade_post.md b/openapi-specs/compute/33-00/desc/defenders/upgrade_post.md index 2f0b4d39e..eacd6b779 100644 --- a/openapi-specs/compute/33-00/desc/defenders/upgrade_post.md +++ b/openapi-specs/compute/33-00/desc/defenders/upgrade_post.md @@ -9,7 +9,7 @@ To upgrade Serverless and Fargate Defenders, re-embed them. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/deployment/daemonsets_deploy_post.md b/openapi-specs/compute/33-00/desc/deployment/daemonsets_deploy_post.md index 94ec9386b..b60f28346 100644 --- a/openapi-specs/compute/33-00/desc/deployment/daemonsets_deploy_post.md +++ b/openapi-specs/compute/33-00/desc/deployment/daemonsets_deploy_post.md @@ -5,7 +5,7 @@ It identifies the cluster's API server, user, and credentials. Use the various request parameters to control the properties of the deployed DaemonSet. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/deployment/daemonsets_get.md b/openapi-specs/compute/33-00/desc/deployment/daemonsets_get.md index a0b7f3798..0385acf75 100644 --- a/openapi-specs/compute/33-00/desc/deployment/daemonsets_get.md +++ b/openapi-specs/compute/33-00/desc/deployment/daemonsets_get.md @@ -3,7 +3,7 @@ You must specify a `credentialID`, of type `kubeconfig`, which identifies your c Credentials are managed in Console's credentials store (`/api/v1/credentials`). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/feeds/custom-vulnerabilities_get.md b/openapi-specs/compute/33-00/desc/feeds/custom-vulnerabilities_get.md index 71834f19d..d661acf55 100644 --- a/openapi-specs/compute/33-00/desc/feeds/custom-vulnerabilities_get.md +++ b/openapi-specs/compute/33-00/desc/feeds/custom-vulnerabilities_get.md @@ -11,7 +11,7 @@ Vulnerability rules can be created using the Prisma Cloud Compute. Refer to the following cURL command that retrieves a list of all the custom vulnerabilities and associated rules. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/feeds/custom-vulnerabilities_put.md b/openapi-specs/compute/33-00/desc/feeds/custom-vulnerabilities_put.md index 4fe1c1898..149ada978 100644 --- a/openapi-specs/compute/33-00/desc/feeds/custom-vulnerabilities_put.md +++ b/openapi-specs/compute/33-00/desc/feeds/custom-vulnerabilities_put.md @@ -5,7 +5,7 @@ Updates all the custom vulnerabilities and associated rules simultaneously for h Refer to the following cURL command that updates a vulnerability for a library named `internal-lib`, and specifies that its versions `1.1` to `1.8` are known to be vulnerable. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -37,7 +37,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: **Note:** You will need `jq` to execute this command. ``` - $ curl -k \ + $ curl \ -u \ https:///api/v/feeds/custom/custom-vulnerabilities \ | jq '.' > custom_vulnerability_rules.json @@ -66,7 +66,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 3. Update the rules by pushing the new JSON payload. **Note:** Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -77,7 +77,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 4. Run the cURL command for the `GET /api/vVERSION/feeds/custom/custom-vulnerabilities` endpoint and you can see that the previously installed rules are now overwritten with your new rules. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/feeds/custom_vulnerabilities_digest_get.md b/openapi-specs/compute/33-00/desc/feeds/custom_vulnerabilities_digest_get.md index 0eb501d9b..02af9a3ab 100644 --- a/openapi-specs/compute/33-00/desc/feeds/custom_vulnerabilities_digest_get.md +++ b/openapi-specs/compute/33-00/desc/feeds/custom_vulnerabilities_digest_get.md @@ -5,7 +5,7 @@ Returns the unique digest for the custom vulnerabilities and associated rules fo The following cURL command retrieves the digest for the configured custom vulnerabilities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/feeds/cve_allow_list_digest_get.md b/openapi-specs/compute/33-00/desc/feeds/cve_allow_list_digest_get.md index e27f21251..911a07fd9 100644 --- a/openapi-specs/compute/33-00/desc/feeds/cve_allow_list_digest_get.md +++ b/openapi-specs/compute/33-00/desc/feeds/cve_allow_list_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the Common Vulnerabilities and Exposures (CVE) a The following cURL command retrieves the digest for the configured CVE allow list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/feeds/cve_allow_list_get.md b/openapi-specs/compute/33-00/desc/feeds/cve_allow_list_get.md index 34fb2c7f8..d73ce17c2 100644 --- a/openapi-specs/compute/33-00/desc/feeds/cve_allow_list_get.md +++ b/openapi-specs/compute/33-00/desc/feeds/cve_allow_list_get.md @@ -5,7 +5,7 @@ Retrieves the globally allow-listed Common Vulnerabilities and Exposures (CVE). The following cURL command retrieves the globally allow-listed CVEs. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/feeds/cve_allow_list_put.md b/openapi-specs/compute/33-00/desc/feeds/cve_allow_list_put.md index 850016965..c4e2ce0af 100644 --- a/openapi-specs/compute/33-00/desc/feeds/cve_allow_list_put.md +++ b/openapi-specs/compute/33-00/desc/feeds/cve_allow_list_put.md @@ -7,7 +7,7 @@ Globally allow-lists a set of Common Vulnerabilities and Exposures (CVE). The following cURL command installs a global CVE allow-list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-00/desc/feeds/ips_digest_get.md b/openapi-specs/compute/33-00/desc/feeds/ips_digest_get.md index d059271ea..ae2a09915 100644 --- a/openapi-specs/compute/33-00/desc/feeds/ips_digest_get.md +++ b/openapi-specs/compute/33-00/desc/feeds/ips_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the list of suspicious or high risk IP endpoints The following cURL command retrieves the digest for the banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/feeds/ips_get.md b/openapi-specs/compute/33-00/desc/feeds/ips_get.md index 381257d47..f51c577a7 100644 --- a/openapi-specs/compute/33-00/desc/feeds/ips_get.md +++ b/openapi-specs/compute/33-00/desc/feeds/ips_get.md @@ -5,7 +5,7 @@ Retrieves the customized list of block-listed suspicious or high-risk IP address The following cURL command retrieves the list of globally block-listed suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/feeds/ips_put.md b/openapi-specs/compute/33-00/desc/feeds/ips_put.md index 6f8fc2419..5bf791044 100644 --- a/openapi-specs/compute/33-00/desc/feeds/ips_put.md +++ b/openapi-specs/compute/33-00/desc/feeds/ips_put.md @@ -7,7 +7,7 @@ Bans a custom list of suspicious or high-risk IP addresses. The following cURL command installs a custom list of banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-00/desc/feeds/malware_digest_get.md b/openapi-specs/compute/33-00/desc/feeds/malware_digest_get.md index 005c476a2..522a59aef 100644 --- a/openapi-specs/compute/33-00/desc/feeds/malware_digest_get.md +++ b/openapi-specs/compute/33-00/desc/feeds/malware_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for all the MD5 signatures of malicious executables The following cURL command retrieves the digest for the configured list for the MD5 signatures of malicious executables. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/feeds/malware_get.md b/openapi-specs/compute/33-00/desc/feeds/malware_get.md index 2a7aa128b..72bee6594 100644 --- a/openapi-specs/compute/33-00/desc/feeds/malware_get.md +++ b/openapi-specs/compute/33-00/desc/feeds/malware_get.md @@ -5,7 +5,7 @@ Returns the customized list of MD5 signatures of malicious executables. Refer to the following cURL command that retrieves the list of MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/feeds/malware_put.md b/openapi-specs/compute/33-00/desc/feeds/malware_put.md index 7e6ec5da0..176304cb9 100644 --- a/openapi-specs/compute/33-00/desc/feeds/malware_put.md +++ b/openapi-specs/compute/33-00/desc/feeds/malware_put.md @@ -7,7 +7,7 @@ Creates a custom list of malware MD5 signatures of malicious executables. Refer to the following cURL command that installs a custom list of malware MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-00/desc/feeds/refresh_post.md b/openapi-specs/compute/33-00/desc/feeds/refresh_post.md index a83c40d10..1c756edae 100644 --- a/openapi-specs/compute/33-00/desc/feeds/refresh_post.md +++ b/openapi-specs/compute/33-00/desc/feeds/refresh_post.md @@ -1,7 +1,7 @@ Triggers Console to refresh its data from the **Intelligence Stream** ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/forensic/activities_download_get.md b/openapi-specs/compute/33-00/desc/forensic/activities_download_get.md index 8a2dbd926..1918e3790 100644 --- a/openapi-specs/compute/33-00/desc/forensic/activities_download_get.md +++ b/openapi-specs/compute/33-00/desc/forensic/activities_download_get.md @@ -3,7 +3,7 @@ Downloads all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/forensic/activities_get.md b/openapi-specs/compute/33-00/desc/forensic/activities_get.md index c8fb1d0cd..c0761aa60 100644 --- a/openapi-specs/compute/33-00/desc/forensic/activities_get.md +++ b/openapi-specs/compute/33-00/desc/forensic/activities_get.md @@ -3,7 +3,7 @@ Retrieves all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/groups/get.md b/openapi-specs/compute/33-00/desc/groups/get.md index 6a0daa2eb..34a2711e0 100644 --- a/openapi-specs/compute/33-00/desc/groups/get.md +++ b/openapi-specs/compute/33-00/desc/groups/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups. ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/33-00/desc/groups/id_delete.md b/openapi-specs/compute/33-00/desc/groups/id_delete.md index 5962a1135..0c3cfa1cd 100644 --- a/openapi-specs/compute/33-00/desc/groups/id_delete.md +++ b/openapi-specs/compute/33-00/desc/groups/id_delete.md @@ -13,7 +13,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes a collection with the name `{id}`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-00/desc/groups/names.md b/openapi-specs/compute/33-00/desc/groups/names.md index 80f34f536..9c2dd1089 100644 --- a/openapi-specs/compute/33-00/desc/groups/names.md +++ b/openapi-specs/compute/33-00/desc/groups/names.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/33-00/desc/groups/post.md b/openapi-specs/compute/33-00/desc/groups/post.md index d0fc23a6d..ebad011f4 100644 --- a/openapi-specs/compute/33-00/desc/groups/post.md +++ b/openapi-specs/compute/33-00/desc/groups/post.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that creates a new group named `my-group`: ```bash -$ curl -k \ +$ curl \ -X POST \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/33-00/desc/high-availability/get.md b/openapi-specs/compute/33-00/desc/high-availability/get.md index a988d47ef..83d5d9b46 100644 --- a/openapi-specs/compute/33-00/desc/high-availability/get.md +++ b/openapi-specs/compute/33-00/desc/high-availability/get.md @@ -3,7 +3,7 @@ Returns the status of high high availability. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/33-00/desc/hosts/download_get.md b/openapi-specs/compute/33-00/desc/hosts/download_get.md index c16b00769..01bb248dc 100644 --- a/openapi-specs/compute/33-00/desc/hosts/download_get.md +++ b/openapi-specs/compute/33-00/desc/hosts/download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Hosts > Refer to the following example cURL command that downloads all host scan reports to a CSV file called `hosts_report.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o hosts_report.csv \ diff --git a/openapi-specs/compute/33-00/desc/hosts/filters_get.md b/openapi-specs/compute/33-00/desc/hosts/filters_get.md index 4bf6df5e6..a39ec8a97 100644 --- a/openapi-specs/compute/33-00/desc/hosts/filters_get.md +++ b/openapi-specs/compute/33-00/desc/hosts/filters_get.md @@ -3,7 +3,7 @@ Returns host filters such as distribution and host name. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/hosts/get.md b/openapi-specs/compute/33-00/desc/hosts/get.md index 43020558a..9bdf69c6c 100644 --- a/openapi-specs/compute/33-00/desc/hosts/get.md +++ b/openapi-specs/compute/33-00/desc/hosts/get.md @@ -37,7 +37,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following cURL command that retrieves all host scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/hosts/info_get.md b/openapi-specs/compute/33-00/desc/hosts/info_get.md index 5b3903b7e..523024735 100644 --- a/openapi-specs/compute/33-00/desc/hosts/info_get.md +++ b/openapi-specs/compute/33-00/desc/hosts/info_get.md @@ -5,7 +5,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/hosts/scan_post.md b/openapi-specs/compute/33-00/desc/hosts/scan_post.md index 6b72cbfa3..0e0e7b074 100644 --- a/openapi-specs/compute/33-00/desc/hosts/scan_post.md +++ b/openapi-specs/compute/33-00/desc/hosts/scan_post.md @@ -3,7 +3,7 @@ Re-scan all hosts immediately. Refer to the following example command that forces Prisma Cloud Compute to re-scan all hosts: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/hosts/scan diff --git a/openapi-specs/compute/33-00/desc/images/defender_layer_get.md b/openapi-specs/compute/33-00/desc/images/defender_layer_get.md index 1dfe3633d..4bb88d62c 100644 --- a/openapi-specs/compute/33-00/desc/images/defender_layer_get.md +++ b/openapi-specs/compute/33-00/desc/images/defender_layer_get.md @@ -5,7 +5,7 @@ Returns the the Prisma Cloud Compute Defender in as a layer that can be used in Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/compute/33-00/desc/images/defender_rasp_get.md b/openapi-specs/compute/33-00/desc/images/defender_rasp_get.md index a8e145ff7..260e271a1 100644 --- a/openapi-specs/compute/33-00/desc/images/defender_rasp_get.md +++ b/openapi-specs/compute/33-00/desc/images/defender_rasp_get.md @@ -3,7 +3,7 @@ Returns the the Prisma Cloud Compute Defender as the RASP Defender A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/compute/33-00/desc/images/download_get.md b/openapi-specs/compute/33-00/desc/images/download_get.md index 333f97f7c..f38a42cc4 100644 --- a/openapi-specs/compute/33-00/desc/images/download_get.md +++ b/openapi-specs/compute/33-00/desc/images/download_get.md @@ -17,7 +17,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -28,7 +28,7 @@ $ curl -k \ Refer to the following example cURL command that might be useful for developers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/images/get.md b/openapi-specs/compute/33-00/desc/images/get.md index 3f594c6c8..dcef1b0a4 100644 --- a/openapi-specs/compute/33-00/desc/images/get.md +++ b/openapi-specs/compute/33-00/desc/images/get.md @@ -26,7 +26,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following cURL command that retrieves a compact scan report for all images: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -36,7 +36,7 @@ $ curl -k \ Refer to the following cURL command that retrieves a compact scan report for an Ubuntu image: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -47,7 +47,7 @@ The name query is synonymous with the filter images text field in the Console UI Refer to the following cURL command that retrieves the scan report for an image with the matching SHA-256 hash: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/images/names_get.md b/openapi-specs/compute/33-00/desc/images/names_get.md index 3a234df98..311b33574 100644 --- a/openapi-specs/compute/33-00/desc/images/names_get.md +++ b/openapi-specs/compute/33-00/desc/images/names_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/33-00/desc/images/scan_post.md b/openapi-specs/compute/33-00/desc/images/scan_post.md index 8d802727a..36278249b 100644 --- a/openapi-specs/compute/33-00/desc/images/scan_post.md +++ b/openapi-specs/compute/33-00/desc/images/scan_post.md @@ -5,7 +5,7 @@ Re-scan all images immediately. This endpoint returns the time that the scans we Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all images: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/images/scan diff --git a/openapi-specs/compute/33-00/desc/images/twistlock_defender_tar_gz_get.md b/openapi-specs/compute/33-00/desc/images/twistlock_defender_tar_gz_get.md index 7852e12ba..36fb66ae8 100644 --- a/openapi-specs/compute/33-00/desc/images/twistlock_defender_tar_gz_get.md +++ b/openapi-specs/compute/33-00/desc/images/twistlock_defender_tar_gz_get.md @@ -1,7 +1,7 @@ Download the Container Defender image for Linux platforms. ```bash -$ curl -k \ +$ curl \ -u \ -H "Content-Type: application/octet-stream" \ -o twistlock_defender.tar.gz \ diff --git a/openapi-specs/compute/33-00/desc/intro.md b/openapi-specs/compute/33-00/desc/intro.md index 9038a3734..5b4ed5864 100644 --- a/openapi-specs/compute/33-00/desc/intro.md +++ b/openapi-specs/compute/33-00/desc/intro.md @@ -47,7 +47,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -58,7 +58,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -70,7 +70,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/compute/33-00/desc/kubernetes/scan_post.md b/openapi-specs/compute/33-00/desc/kubernetes/scan_post.md index 15d614c1a..ab74d5d96 100644 --- a/openapi-specs/compute/33-00/desc/kubernetes/scan_post.md +++ b/openapi-specs/compute/33-00/desc/kubernetes/scan_post.md @@ -3,7 +3,7 @@ This endpoint will trigger a Kubernetes scan. The following example curl command uses basic auth to initiate this scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/logs/console_get.md b/openapi-specs/compute/33-00/desc/logs/console_get.md index 80ece6611..113543540 100644 --- a/openapi-specs/compute/33-00/desc/logs/console_get.md +++ b/openapi-specs/compute/33-00/desc/logs/console_get.md @@ -3,7 +3,7 @@ Retrieves the latest Console log messages. The following example curl command retrieves the 10 latest Console log messages: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/logs/defender_download_get.md b/openapi-specs/compute/33-00/desc/logs/defender_download_get.md index 5d6718db0..05bbc6a75 100644 --- a/openapi-specs/compute/33-00/desc/logs/defender_download_get.md +++ b/openapi-specs/compute/33-00/desc/logs/defender_download_get.md @@ -5,7 +5,7 @@ The hostname can be returned from the endpoint `/defenders/names` The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/logs/defender_get.md b/openapi-specs/compute/33-00/desc/logs/defender_get.md index 1e733a746..f2e3b25df 100644 --- a/openapi-specs/compute/33-00/desc/logs/defender_get.md +++ b/openapi-specs/compute/33-00/desc/logs/defender_get.md @@ -7,7 +7,7 @@ Note that you must quote the URL when running the following command. Otherwise the shell misinterprets the ampersand (`&`) as the end of the command, and puts the curl command in the background. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/logs/system_download_get.md b/openapi-specs/compute/33-00/desc/logs/system_download_get.md index 1e5b5b873..43bb0abce 100644 --- a/openapi-specs/compute/33-00/desc/logs/system_download_get.md +++ b/openapi-specs/compute/33-00/desc/logs/system_download_get.md @@ -4,7 +4,7 @@ This endpoint will return the system debug logs with `tar.gz` file extension. The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/pcf-droplets/addresses_get.md b/openapi-specs/compute/33-00/desc/pcf-droplets/addresses_get.md index 257a47455..bb3365015 100644 --- a/openapi-specs/compute/33-00/desc/pcf-droplets/addresses_get.md +++ b/openapi-specs/compute/33-00/desc/pcf-droplets/addresses_get.md @@ -5,7 +5,7 @@ You can also add optional query parameters to this API call, in this example `cl The following example curl command retrieves the list of addresses: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/pcf-droplets/download_get.md b/openapi-specs/compute/33-00/desc/pcf-droplets/download_get.md index ad761e744..ac8546a25 100644 --- a/openapi-specs/compute/33-00/desc/pcf-droplets/download_get.md +++ b/openapi-specs/compute/33-00/desc/pcf-droplets/download_get.md @@ -3,7 +3,7 @@ This endpoint will download the list of configured cloud controller addresses co The following example curl command retrieves the list of addresses and outputs it to a file call `PCF_blobstores.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/pcf-droplets/get.md b/openapi-specs/compute/33-00/desc/pcf-droplets/get.md index 930d16948..aad607cba 100644 --- a/openapi-specs/compute/33-00/desc/pcf-droplets/get.md +++ b/openapi-specs/compute/33-00/desc/pcf-droplets/get.md @@ -3,7 +3,7 @@ This endpoint will return the full metadata of PCF blobstore from page **Monitor The following example curl command will retrieve this: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/pcf-droplets/scan_post.md b/openapi-specs/compute/33-00/desc/pcf-droplets/scan_post.md index 34e75b26c..d9c9df4dd 100644 --- a/openapi-specs/compute/33-00/desc/pcf-droplets/scan_post.md +++ b/openapi-specs/compute/33-00/desc/pcf-droplets/scan_post.md @@ -3,7 +3,7 @@ This endpoint will kick off a scan of the any PCF Blobstores you have configured Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/pcf-droplets/stop_post.md b/openapi-specs/compute/33-00/desc/pcf-droplets/stop_post.md index 94c376972..2c4d5264a 100644 --- a/openapi-specs/compute/33-00/desc/pcf-droplets/stop_post.md +++ b/openapi-specs/compute/33-00/desc/pcf-droplets/stop_post.md @@ -3,7 +3,7 @@ This endpoint will instruct the PFC Defenders to stop scanning. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/policies/compliance_ci_images_get.md b/openapi-specs/compute/33-00/desc/policies/compliance_ci_images_get.md index f97130a97..9a2b2abf5 100644 --- a/openapi-specs/compute/33-00/desc/policies/compliance_ci_images_get.md +++ b/openapi-specs/compute/33-00/desc/policies/compliance_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > CI** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/policies/compliance_ci_serverless_get.md b/openapi-specs/compute/33-00/desc/policies/compliance_ci_serverless_get.md index 59195f070..2f30e2d74 100644 --- a/openapi-specs/compute/33-00/desc/policies/compliance_ci_serverless_get.md +++ b/openapi-specs/compute/33-00/desc/policies/compliance_ci_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Functions > CI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/policies/compliance_container_get.md b/openapi-specs/compute/33-00/desc/policies/compliance_container_get.md index 7f10245ea..657d4f2dd 100644 --- a/openapi-specs/compute/33-00/desc/policies/compliance_container_get.md +++ b/openapi-specs/compute/33-00/desc/policies/compliance_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > Deployed** Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/policies/compliance_container_impacted_get.md b/openapi-specs/compute/33-00/desc/policies/compliance_container_impacted_get.md index 607bfa3c8..de9e0ee77 100644 --- a/openapi-specs/compute/33-00/desc/policies/compliance_container_impacted_get.md +++ b/openapi-specs/compute/33-00/desc/policies/compliance_container_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of containers captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/compliance/container/impacted?ruleName=' diff --git a/openapi-specs/compute/33-00/desc/policies/compliance_host_get.md b/openapi-specs/compute/33-00/desc/policies/compliance_host_get.md index c029ecf7f..a5e429af5 100755 --- a/openapi-specs/compute/33-00/desc/policies/compliance_host_get.md +++ b/openapi-specs/compute/33-00/desc/policies/compliance_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Hosts > Running hosts** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/policies/compliance_serverless_get.md b/openapi-specs/compute/33-00/desc/policies/compliance_serverless_get.md index c7de886c1..f559179f6 100755 --- a/openapi-specs/compute/33-00/desc/policies/compliance_serverless_get.md +++ b/openapi-specs/compute/33-00/desc/policies/compliance_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Functions > Functions** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/policies/compliance_vms_get.md b/openapi-specs/compute/33-00/desc/policies/compliance_vms_get.md index f7d7e1a49..b61d20d9d 100755 --- a/openapi-specs/compute/33-00/desc/policies/compliance_vms_get.md +++ b/openapi-specs/compute/33-00/desc/policies/compliance_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Hosts > VM ima The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/policies/compliance_vms_impacted_get.md b/openapi-specs/compute/33-00/desc/policies/compliance_vms_impacted_get.md index 9cf5b9d03..4ac3f2832 100644 --- a/openapi-specs/compute/33-00/desc/policies/compliance_vms_impacted_get.md +++ b/openapi-specs/compute/33-00/desc/policies/compliance_vms_impacted_get.md @@ -8,7 +8,7 @@ Use query parameters to retrieve the list of impacted resources by *account ID*, Refer to the following example cURL command, which retrieves a list of impacted resources: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/policies/docker_get.md b/openapi-specs/compute/33-00/desc/policies/docker_get.md index f56872c67..e8ab3d5bb 100644 --- a/openapi-specs/compute/33-00/desc/policies/docker_get.md +++ b/openapi-specs/compute/33-00/desc/policies/docker_get.md @@ -3,7 +3,7 @@ Retrieves a list of all access control rules for Docker Engine commands. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/policies/docker_put.md b/openapi-specs/compute/33-00/desc/policies/docker_put.md index 860e2bb1e..a5d0c0230 100644 --- a/openapi-specs/compute/33-00/desc/policies/docker_put.md +++ b/openapi-specs/compute/33-00/desc/policies/docker_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove Docker access control rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/docker \ | jq '.' > docker_access_control_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove Docker access control rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/33-00/desc/policies/firewall_app-embedded_get.md b/openapi-specs/compute/33-00/desc/policies/firewall_app-embedded_get.md index 3da2a7cd6..4e59c4c21 100644 --- a/openapi-specs/compute/33-00/desc/policies/firewall_app-embedded_get.md +++ b/openapi-specs/compute/33-00/desc/policies/firewall_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > App-Embedded** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/policies/firewall_app_container_get.md b/openapi-specs/compute/33-00/desc/policies/firewall_app_container_get.md index 3b8c157fa..f0486aa4c 100644 --- a/openapi-specs/compute/33-00/desc/policies/firewall_app_container_get.md +++ b/openapi-specs/compute/33-00/desc/policies/firewall_app_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Container** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/container' diff --git a/openapi-specs/compute/33-00/desc/policies/firewall_app_host_get.md b/openapi-specs/compute/33-00/desc/policies/firewall_app_host_get.md index adb90128a..75c22add4 100644 --- a/openapi-specs/compute/33-00/desc/policies/firewall_app_host_get.md +++ b/openapi-specs/compute/33-00/desc/policies/firewall_app_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Host** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/policies/firewall_app_network_list_get.md b/openapi-specs/compute/33-00/desc/policies/firewall_app_network_list_get.md index 13f7fb450..5a1f87d85 100644 --- a/openapi-specs/compute/33-00/desc/policies/firewall_app_network_list_get.md +++ b/openapi-specs/compute/33-00/desc/policies/firewall_app_network_list_get.md @@ -11,7 +11,7 @@ This endpoint maps to **Defend > WAAS > Network lists** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/network-list' diff --git a/openapi-specs/compute/33-00/desc/policies/firewall_app_out-of-band_get.md b/openapi-specs/compute/33-00/desc/policies/firewall_app_out-of-band_get.md index d4f72d041..9ae662687 100644 --- a/openapi-specs/compute/33-00/desc/policies/firewall_app_out-of-band_get.md +++ b/openapi-specs/compute/33-00/desc/policies/firewall_app_out-of-band_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/policies/firewall_app_out-of-band_impacted_get.md b/openapi-specs/compute/33-00/desc/policies/firewall_app_out-of-band_impacted_get.md index 25d2c6691..96a427f94 100644 --- a/openapi-specs/compute/33-00/desc/policies/firewall_app_out-of-band_impacted_get.md +++ b/openapi-specs/compute/33-00/desc/policies/firewall_app_out-of-band_impacted_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/policies/firewall_app_rasp_get.md b/openapi-specs/compute/33-00/desc/policies/firewall_app_rasp_get.md index 15d481cf3..a201d3beb 100644 --- a/openapi-specs/compute/33-00/desc/policies/firewall_app_rasp_get.md +++ b/openapi-specs/compute/33-00/desc/policies/firewall_app_rasp_get.md @@ -1,7 +1,7 @@ Retrieves a list of all application firewall (CNAF) rules for RASP. ``` -$ curl -k \ +$ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp ``` diff --git a/openapi-specs/compute/33-00/desc/policies/firewall_app_rasp_put.md b/openapi-specs/compute/33-00/desc/policies/firewall_app_rasp_put.md index 04ba86483..1101c7690 100644 --- a/openapi-specs/compute/33-00/desc/policies/firewall_app_rasp_put.md +++ b/openapi-specs/compute/33-00/desc/policies/firewall_app_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp \ | jq '.' > app_firewall_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/33-00/desc/policies/firewall_app_serverless_get.md b/openapi-specs/compute/33-00/desc/policies/firewall_app_serverless_get.md index d19e909f3..90cac0015 100644 --- a/openapi-specs/compute/33-00/desc/policies/firewall_app_serverless_get.md +++ b/openapi-specs/compute/33-00/desc/policies/firewall_app_serverless_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Serverless** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/serverless' diff --git a/openapi-specs/compute/33-00/desc/policies/firewall_network_container_get.md b/openapi-specs/compute/33-00/desc/policies/firewall_network_container_get.md index 3f1343b53..82e656818 100644 --- a/openapi-specs/compute/33-00/desc/policies/firewall_network_container_get.md +++ b/openapi-specs/compute/33-00/desc/policies/firewall_network_container_get.md @@ -4,7 +4,7 @@ Retrieves a list of all CNNS container and host rules. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/policies/firewall_network_container_put.md b/openapi-specs/compute/33-00/desc/policies/firewall_network_container_put.md index fd9263430..cffb3f1c4 100644 --- a/openapi-specs/compute/33-00/desc/policies/firewall_network_container_put.md +++ b/openapi-specs/compute/33-00/desc/policies/firewall_network_container_put.md @@ -9,7 +9,7 @@ The procedure to add, edit, or remove rules is: Refer to the following example cURL command that retrieves a list of all rules, pretty-print the JSON response, and save the results to a file: ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -26,7 +26,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/33-00/desc/policies/firewall_network_entities_get.md b/openapi-specs/compute/33-00/desc/policies/firewall_network_entities_get.md index 757121f70..28ed8dbcb 100644 --- a/openapi-specs/compute/33-00/desc/policies/firewall_network_entities_get.md +++ b/openapi-specs/compute/33-00/desc/policies/firewall_network_entities_get.md @@ -1,7 +1,7 @@ Retrieves a list of all CNNF network objects. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/policies/firewall_network_entities_put.md b/openapi-specs/compute/33-00/desc/policies/firewall_network_entities_put.md index 83c023286..39044ee10 100644 --- a/openapi-specs/compute/33-00/desc/policies/firewall_network_entities_put.md +++ b/openapi-specs/compute/33-00/desc/policies/firewall_network_entities_put.md @@ -3,7 +3,7 @@ Updates the list of CNNF network objects. The following example curl command updates the network objects. There is an example of all three types (images,subnets, and applications ): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-00/desc/policies/policies.md b/openapi-specs/compute/33-00/desc/policies/policies.md index 69768c03d..97be7b616 100644 --- a/openapi-specs/compute/33-00/desc/policies/policies.md +++ b/openapi-specs/compute/33-00/desc/policies/policies.md @@ -21,7 +21,7 @@ To add, edit, or remove vulnerability rules from a policy: For example, the following cURL command uses basic auth to retrieve a list of all image vulnerability rules, pretty-prints the JSON response, and saves the results to a `vulnerability_rules.json` file. ```bash - $ curl -k \ + $ curl \ -u \ https:///api/v1/policies/runtime/host \ | jq '.' > vulnerability_rules.json @@ -36,7 +36,7 @@ To add, edit, or remove vulnerability rules from a policy: **Note:** Remember to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -107,7 +107,7 @@ Use the `PUT` method to delete all rules by submitting an empty JSON object. For example, to delete all host runtime rules: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-00/desc/policies/runtime_app-embedded_get.md b/openapi-specs/compute/33-00/desc/policies/runtime_app-embedded_get.md index fcf0ba8b9..517b741bb 100755 --- a/openapi-specs/compute/33-00/desc/policies/runtime_app-embedded_get.md +++ b/openapi-specs/compute/33-00/desc/policies/runtime_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > App-Embedded policy** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/policies/runtime_container_get.md b/openapi-specs/compute/33-00/desc/policies/runtime_container_get.md index f1b50b727..65cd10660 100644 --- a/openapi-specs/compute/33-00/desc/policies/runtime_container_get.md +++ b/openapi-specs/compute/33-00/desc/policies/runtime_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Container policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/policies/runtime_container_impacted_get.md b/openapi-specs/compute/33-00/desc/policies/runtime_container_impacted_get.md index 195f75547..e026d33b9 100644 --- a/openapi-specs/compute/33-00/desc/policies/runtime_container_impacted_get.md +++ b/openapi-specs/compute/33-00/desc/policies/runtime_container_impacted_get.md @@ -6,7 +6,7 @@ In the Console UI, you can see how it works by going to the **Defend > Runtime > Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ $ curl -k \ For additional help with your `ruleName`: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/policies/runtime_host_get.md b/openapi-specs/compute/33-00/desc/policies/runtime_host_get.md index 38800596c..559ef690a 100644 --- a/openapi-specs/compute/33-00/desc/policies/runtime_host_get.md +++ b/openapi-specs/compute/33-00/desc/policies/runtime_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Host policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/policies/runtime_rasp_get.md b/openapi-specs/compute/33-00/desc/policies/runtime_rasp_get.md index 5b7a76457..55a6ff05b 100644 --- a/openapi-specs/compute/33-00/desc/policies/runtime_rasp_get.md +++ b/openapi-specs/compute/33-00/desc/policies/runtime_rasp_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your RASP runtime policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/policies/runtime_rasp_put.md b/openapi-specs/compute/33-00/desc/policies/runtime_rasp_put.md index bba60ba81..f71fb4b93 100644 --- a/openapi-specs/compute/33-00/desc/policies/runtime_rasp_put.md +++ b/openapi-specs/compute/33-00/desc/policies/runtime_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve the rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET @@ -24,7 +24,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -H "Content-Type:application/json" \ -X PUT \ diff --git a/openapi-specs/compute/33-00/desc/policies/runtime_serverless_get.md b/openapi-specs/compute/33-00/desc/policies/runtime_serverless_get.md index 44326bbf6..c98489e16 100644 --- a/openapi-specs/compute/33-00/desc/policies/runtime_serverless_get.md +++ b/openapi-specs/compute/33-00/desc/policies/runtime_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Serverless policy** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/policies/secrets_get.md b/openapi-specs/compute/33-00/desc/policies/secrets_get.md index 89e6b9c0e..cb4ecb37c 100644 --- a/openapi-specs/compute/33-00/desc/policies/secrets_get.md +++ b/openapi-specs/compute/33-00/desc/policies/secrets_get.md @@ -3,7 +3,7 @@ Retrieves a list of all secrets rules. The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/policies/secrets diff --git a/openapi-specs/compute/33-00/desc/policies/secrets_put.md b/openapi-specs/compute/33-00/desc/policies/secrets_put.md index 1e8877ca1..04fd41f24 100644 --- a/openapi-specs/compute/33-00/desc/policies/secrets_put.md +++ b/openapi-specs/compute/33-00/desc/policies/secrets_put.md @@ -10,7 +10,7 @@ The procedure to add, edit, or remove secrets rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/secrets \ | jq '.' > secrets_rules.json @@ -24,7 +24,7 @@ The procedure to add, edit, or remove secrets rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/33-00/desc/policies/trust_get.md b/openapi-specs/compute/33-00/desc/policies/trust_get.md index 8de1ba409..0805d6777 100644 --- a/openapi-specs/compute/33-00/desc/policies/trust_get.md +++ b/openapi-specs/compute/33-00/desc/policies/trust_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/policies/trust_put.md b/openapi-specs/compute/33-00/desc/policies/trust_put.md index fccd4b91e..7fec72031 100644 --- a/openapi-specs/compute/33-00/desc/policies/trust_put.md +++ b/openapi-specs/compute/33-00/desc/policies/trust_put.md @@ -1,7 +1,7 @@ Updates the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-00/desc/policies/vulnerability_ci_images_get.md b/openapi-specs/compute/33-00/desc/policies/vulnerability_ci_images_get.md index abc3da8fa..ce0d50a29 100644 --- a/openapi-specs/compute/33-00/desc/policies/vulnerability_ci_images_get.md +++ b/openapi-specs/compute/33-00/desc/policies/vulnerability_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/policies/vulnerability_ci_serverless_get.md b/openapi-specs/compute/33-00/desc/policies/vulnerability_ci_serverless_get.md index 958c86495..6fb5f93ce 100644 --- a/openapi-specs/compute/33-00/desc/policies/vulnerability_ci_serverless_get.md +++ b/openapi-specs/compute/33-00/desc/policies/vulnerability_ci_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/policies/vulnerability_coderepos_get.md b/openapi-specs/compute/33-00/desc/policies/vulnerability_coderepos_get.md index 08dfed8e1..a4ac62f33 100644 --- a/openapi-specs/compute/33-00/desc/policies/vulnerability_coderepos_get.md +++ b/openapi-specs/compute/33-00/desc/policies/vulnerability_coderepos_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Code repositories** in the Co Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/vulnerability/coderepos' diff --git a/openapi-specs/compute/33-00/desc/policies/vulnerability_coderepos_impacted_get.md b/openapi-specs/compute/33-00/desc/policies/vulnerability_coderepos_impacted_get.md index a401a12c4..e64ef768e 100644 --- a/openapi-specs/compute/33-00/desc/policies/vulnerability_coderepos_impacted_get.md +++ b/openapi-specs/compute/33-00/desc/policies/vulnerability_coderepos_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/coderepos/impacted?project=&ruleName=' ``` diff --git a/openapi-specs/compute/33-00/desc/policies/vulnerability_coderepos_put.md b/openapi-specs/compute/33-00/desc/policies/vulnerability_coderepos_put.md index 514eec136..a002415b9 100644 --- a/openapi-specs/compute/33-00/desc/policies/vulnerability_coderepos_put.md +++ b/openapi-specs/compute/33-00/desc/policies/vulnerability_coderepos_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Code repo Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT 'https:///api/v/policies/vulnerability/coderepos' \ diff --git a/openapi-specs/compute/33-00/desc/policies/vulnerability_host_get.md b/openapi-specs/compute/33-00/desc/policies/vulnerability_host_get.md index 3b9b14b9c..260da7675 100644 --- a/openapi-specs/compute/33-00/desc/policies/vulnerability_host_get.md +++ b/openapi-specs/compute/33-00/desc/policies/vulnerability_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Hosts > Running hosts** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/policies/vulnerability_host_impacted_get.md b/openapi-specs/compute/33-00/desc/policies/vulnerability_host_impacted_get.md index 346368518..f44592830 100644 --- a/openapi-specs/compute/33-00/desc/policies/vulnerability_host_impacted_get.md +++ b/openapi-specs/compute/33-00/desc/policies/vulnerability_host_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by `RULE_NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/host/impacted?project={PROJECT_NAME}&ruleName={RULE_NAME}' ``` diff --git a/openapi-specs/compute/33-00/desc/policies/vulnerability_images_get.md b/openapi-specs/compute/33-00/desc/policies/vulnerability_images_get.md index 33581be37..57359bb8f 100644 --- a/openapi-specs/compute/33-00/desc/policies/vulnerability_images_get.md +++ b/openapi-specs/compute/33-00/desc/policies/vulnerability_images_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images?project=" diff --git a/openapi-specs/compute/33-00/desc/policies/vulnerability_images_impacted_get.md b/openapi-specs/compute/33-00/desc/policies/vulnerability_images_impacted_get.md index ae1d5e396..e2a4efa23 100644 --- a/openapi-specs/compute/33-00/desc/policies/vulnerability_images_impacted_get.md +++ b/openapi-specs/compute/33-00/desc/policies/vulnerability_images_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of images caught by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images/impacted?project=&ruleName=" diff --git a/openapi-specs/compute/33-00/desc/policies/vulnerability_images_put.md b/openapi-specs/compute/33-00/desc/policies/vulnerability_images_put.md index b3330dab7..8c3cc8af2 100644 --- a/openapi-specs/compute/33-00/desc/policies/vulnerability_images_put.md +++ b/openapi-specs/compute/33-00/desc/policies/vulnerability_images_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -X PUT 'https:///api/v/policies/vulnerability/images' \ --data '{ diff --git a/openapi-specs/compute/33-00/desc/policies/vulnerability_serverless_get.md b/openapi-specs/compute/33-00/desc/policies/vulnerability_serverless_get.md index c7a8e2ef5..41c7e75d8 100644 --- a/openapi-specs/compute/33-00/desc/policies/vulnerability_serverless_get.md +++ b/openapi-specs/compute/33-00/desc/policies/vulnerability_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Functions** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/policies/vulnerability_serverless_put.md b/openapi-specs/compute/33-00/desc/policies/vulnerability_serverless_put.md index 2b567b5b1..5199f0997 100644 --- a/openapi-specs/compute/33-00/desc/policies/vulnerability_serverless_put.md +++ b/openapi-specs/compute/33-00/desc/policies/vulnerability_serverless_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k 'https:///api/v/policies/vulnerability/serverless' \ +$ curl 'https:///api/v/policies/vulnerability/serverless' \ -X PUT \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/33-00/desc/policies/vulnerability_vms_get.md b/openapi-specs/compute/33-00/desc/policies/vulnerability_vms_get.md index 117d2cc4a..e37c1520f 100644 --- a/openapi-specs/compute/33-00/desc/policies/vulnerability_vms_get.md +++ b/openapi-specs/compute/33-00/desc/policies/vulnerability_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Hosts > V The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/policies/vulnerability_vms_impacted_get.md b/openapi-specs/compute/33-00/desc/policies/vulnerability_vms_impacted_get.md index 29d9621ea..f1a7f7ef5 100644 --- a/openapi-specs/compute/33-00/desc/policies/vulnerability_vms_impacted_get.md +++ b/openapi-specs/compute/33-00/desc/policies/vulnerability_vms_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/vms?project=&ruleName=' ``` diff --git a/openapi-specs/compute/33-00/desc/profiles/app-embedded_download_get.md b/openapi-specs/compute/33-00/desc/profiles/app-embedded_download_get.md index 4b3f7ff8a..2e8cac56d 100644 --- a/openapi-specs/compute/33-00/desc/profiles/app-embedded_download_get.md +++ b/openapi-specs/compute/33-00/desc/profiles/app-embedded_download_get.md @@ -5,7 +5,7 @@ Downloads the app-embedded observations in a CSV format. Refer to the following example cURL command that downloads all the app-embedded runtime profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/profiles/app-embedded_get.md b/openapi-specs/compute/33-00/desc/profiles/app-embedded_get.md index f3ddb3125..c332061e5 100644 --- a/openapi-specs/compute/33-00/desc/profiles/app-embedded_get.md +++ b/openapi-specs/compute/33-00/desc/profiles/app-embedded_get.md @@ -5,7 +5,7 @@ Retrieves the app-embedded observations. Refer to the following example cURL command that lists all the app-embedded runtime: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/profiles/container_download_get.md b/openapi-specs/compute/33-00/desc/profiles/container_download_get.md index ad7a86101..ee9d5e9e4 100644 --- a/openapi-specs/compute/33-00/desc/profiles/container_download_get.md +++ b/openapi-specs/compute/33-00/desc/profiles/container_download_get.md @@ -6,7 +6,7 @@ Retrieves the details and state of all runtime models in CSV format. Refer to the following example cURL command that downloads a complete list in CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/profiles/container_filters_get.md b/openapi-specs/compute/33-00/desc/profiles/container_filters_get.md index 8b6122b80..13535b520 100644 --- a/openapi-specs/compute/33-00/desc/profiles/container_filters_get.md +++ b/openapi-specs/compute/33-00/desc/profiles/container_filters_get.md @@ -4,7 +4,7 @@ Returns a list of os and images from page monitor/runtime/container-models in Co Example curl command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/profiles/container_get.md b/openapi-specs/compute/33-00/desc/profiles/container_get.md index cdbc24c3e..59a3764fb 100644 --- a/openapi-specs/compute/33-00/desc/profiles/container_get.md +++ b/openapi-specs/compute/33-00/desc/profiles/container_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of all runtime models. Refer to the following example cURL command that lists all runtime models in a system: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/profiles/container_learn_post.md b/openapi-specs/compute/33-00/desc/profiles/container_learn_post.md index 5fef2e31e..2c1d08af1 100644 --- a/openapi-specs/compute/33-00/desc/profiles/container_learn_post.md +++ b/openapi-specs/compute/33-00/desc/profiles/container_learn_post.md @@ -7,7 +7,7 @@ For more information, refer to [Learning mode](https://docs.prismacloud.io/en/cl Refer to the following example cURL command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/profiles/host_download_get.md b/openapi-specs/compute/33-00/desc/profiles/host_download_get.md index ace270a32..2dfb51ec0 100644 --- a/openapi-specs/compute/33-00/desc/profiles/host_download_get.md +++ b/openapi-specs/compute/33-00/desc/profiles/host_download_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of each host service runtime model in CSV format Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/profiles/host_get.md b/openapi-specs/compute/33-00/desc/profiles/host_get.md index 208a24de3..55d8bf8ff 100644 --- a/openapi-specs/compute/33-00/desc/profiles/host_get.md +++ b/openapi-specs/compute/33-00/desc/profiles/host_get.md @@ -15,7 +15,7 @@ The returned JSON object has the following structure: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/profiles/host_id_rule_get.md b/openapi-specs/compute/33-00/desc/profiles/host_id_rule_get.md index 672cb4c62..8be668fca 100644 --- a/openapi-specs/compute/33-00/desc/profiles/host_id_rule_get.md +++ b/openapi-specs/compute/33-00/desc/profiles/host_id_rule_get.md @@ -10,7 +10,7 @@ This is the `PROFILE_ID`. The following example command uses curl and basic auth to specify the learning mode for a profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/profiles/service_download_get.md b/openapi-specs/compute/33-00/desc/profiles/service_download_get.md index 63dff3354..4c1c431c1 100644 --- a/openapi-specs/compute/33-00/desc/profiles/service_download_get.md +++ b/openapi-specs/compute/33-00/desc/profiles/service_download_get.md @@ -1,7 +1,7 @@ Retrieves the details and state of all host service runtime models in CSV format ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/profiles/service_get.md b/openapi-specs/compute/33-00/desc/profiles/service_get.md index a4f8c348d..5d786d919 100644 --- a/openapi-specs/compute/33-00/desc/profiles/service_get.md +++ b/openapi-specs/compute/33-00/desc/profiles/service_get.md @@ -10,7 +10,7 @@ The returned JSON object has the following structure: Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/profiles/service_id_learn_post.md b/openapi-specs/compute/33-00/desc/profiles/service_id_learn_post.md index fb338b80d..fa85fc3a2 100644 --- a/openapi-specs/compute/33-00/desc/profiles/service_id_learn_post.md +++ b/openapi-specs/compute/33-00/desc/profiles/service_id_learn_post.md @@ -11,7 +11,7 @@ The `PROFILE_ID` is typically the service's name, such as `sshd` or `ntpd`. The following example command uses curl and basic auth to specify the learning mode for a host service profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/profiles/service_learn_post.md b/openapi-specs/compute/33-00/desc/profiles/service_learn_post.md index 02a1f299e..ceff8e5a5 100644 --- a/openapi-specs/compute/33-00/desc/profiles/service_learn_post.md +++ b/openapi-specs/compute/33-00/desc/profiles/service_learn_post.md @@ -3,7 +3,7 @@ Specify the learning mode for all host service profiles. The following example command uses curl and basic auth to specify the learning mode for all host service profiles. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/profiles/service_names_get.md b/openapi-specs/compute/33-00/desc/profiles/service_names_get.md index 7da863545..afae56f0d 100644 --- a/openapi-specs/compute/33-00/desc/profiles/service_names_get.md +++ b/openapi-specs/compute/33-00/desc/profiles/service_names_get.md @@ -3,7 +3,7 @@ Retrieves the name of all host service runtime models from within the app at **M The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/projects/get.md b/openapi-specs/compute/33-00/desc/projects/get.md index 05485c24c..1ac04d2c0 100644 --- a/openapi-specs/compute/33-00/desc/projects/get.md +++ b/openapi-specs/compute/33-00/desc/projects/get.md @@ -3,7 +3,7 @@ Lists all projects visible to the given user. Assuming the given user is an admin, the following example curl command would list all projects: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/projects/name_delete.md b/openapi-specs/compute/33-00/desc/projects/name_delete.md index fba889f7e..0a34e72a2 100644 --- a/openapi-specs/compute/33-00/desc/projects/name_delete.md +++ b/openapi-specs/compute/33-00/desc/projects/name_delete.md @@ -6,7 +6,7 @@ The value for `` can be retrieved from the `_id` field in the resp The DELETE method returns the decommissioned supervisor's admin username and password. ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/compute/33-00/desc/projects/name_put.md b/openapi-specs/compute/33-00/desc/projects/name_put.md index b5a83a67d..1bde9b0c7 100644 --- a/openapi-specs/compute/33-00/desc/projects/name_put.md +++ b/openapi-specs/compute/33-00/desc/projects/name_put.md @@ -4,7 +4,7 @@ The following example curl command updates a project named ``. The value for `` can be retrieved from the `_id` field in the response object from `GET /api/v1/projects`. ```bash -$ curl -k \ +$ curl \ -u \ -X PUT \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/compute/33-00/desc/projects/post.md b/openapi-specs/compute/33-00/desc/projects/post.md index 8862c0fd4..38c574173 100644 --- a/openapi-specs/compute/33-00/desc/projects/post.md +++ b/openapi-specs/compute/33-00/desc/projects/post.md @@ -3,7 +3,7 @@ Provisions a new project. The following example curl command provisions a new project named `my-project`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ $ curl -k \ If you have installed a new instance of Console, and you have already created an initial admin user for it, then you can specify the admin username name and password when you provision the project. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/projects/projects.md b/openapi-specs/compute/33-00/desc/projects/projects.md index 7e7dcff66..19c904e9e 100644 --- a/openapi-specs/compute/33-00/desc/projects/projects.md +++ b/openapi-specs/compute/33-00/desc/projects/projects.md @@ -20,7 +20,7 @@ If `project` is not specified, it is set to `Central+Console`. For example, to retrieve the compliance policies for a tenant project named `mobile_payments_division`, use the following curl command: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/radar/container_clean_post.md b/openapi-specs/compute/33-00/desc/radar/container_clean_post.md index 662b6d53f..d4f87e91e 100644 --- a/openapi-specs/compute/33-00/desc/radar/container_clean_post.md +++ b/openapi-specs/compute/33-00/desc/radar/container_clean_post.md @@ -1,7 +1,7 @@ Cleans the container runtime profiles and Radar entities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/radar/container_delete.md b/openapi-specs/compute/33-00/desc/radar/container_delete.md index 4eabe337f..b6cc69cf2 100644 --- a/openapi-specs/compute/33-00/desc/radar/container_delete.md +++ b/openapi-specs/compute/33-00/desc/radar/container_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-00/desc/radar/container_export_get.md b/openapi-specs/compute/33-00/desc/radar/container_export_get.md index 7f577568f..f776c7e6c 100644 --- a/openapi-specs/compute/33-00/desc/radar/container_export_get.md +++ b/openapi-specs/compute/33-00/desc/radar/container_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for containers) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/radar/container_filters_get.md b/openapi-specs/compute/33-00/desc/radar/container_filters_get.md index f66463da1..8d7cd6df3 100644 --- a/openapi-specs/compute/33-00/desc/radar/container_filters_get.md +++ b/openapi-specs/compute/33-00/desc/radar/container_filters_get.md @@ -1,7 +1,7 @@ Returns the namespaces from the container view on the Radar page. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/radar/container_get.md b/openapi-specs/compute/33-00/desc/radar/container_get.md index 280d683d9..404629a25 100644 --- a/openapi-specs/compute/33-00/desc/radar/container_get.md +++ b/openapi-specs/compute/33-00/desc/radar/container_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (container view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/radar/host_delete.md b/openapi-specs/compute/33-00/desc/radar/host_delete.md index 738fa7a7c..b4910a8b7 100644 --- a/openapi-specs/compute/33-00/desc/radar/host_delete.md +++ b/openapi-specs/compute/33-00/desc/radar/host_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two apps in CNNF for hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-00/desc/radar/host_export_get.md b/openapi-specs/compute/33-00/desc/radar/host_export_get.md index dd91b5335..851d6f40f 100644 --- a/openapi-specs/compute/33-00/desc/radar/host_export_get.md +++ b/openapi-specs/compute/33-00/desc/radar/host_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for hosts) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/radar/host_get.md b/openapi-specs/compute/33-00/desc/radar/host_get.md index a12025856..222d075aa 100644 --- a/openapi-specs/compute/33-00/desc/radar/host_get.md +++ b/openapi-specs/compute/33-00/desc/radar/host_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (host view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/radar/serverless_get.md b/openapi-specs/compute/33-00/desc/radar/serverless_get.md index b2f329149..170cfb48d 100644 --- a/openapi-specs/compute/33-00/desc/radar/serverless_get.md +++ b/openapi-specs/compute/33-00/desc/radar/serverless_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/radar/serverless_progress_get.md b/openapi-specs/compute/33-00/desc/radar/serverless_progress_get.md index a11c1ae20..0808dfbf4 100644 --- a/openapi-specs/compute/33-00/desc/radar/serverless_progress_get.md +++ b/openapi-specs/compute/33-00/desc/radar/serverless_progress_get.md @@ -1,7 +1,7 @@ Returns the scan progress from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/radar/serverless_scan_post.md b/openapi-specs/compute/33-00/desc/radar/serverless_scan_post.md index 0d519ba88..2d444ac88 100644 --- a/openapi-specs/compute/33-00/desc/radar/serverless_scan_post.md +++ b/openapi-specs/compute/33-00/desc/radar/serverless_scan_post.md @@ -1,7 +1,7 @@ Initiates a serverless scan of your environments. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/radar/serverless_stop_post.md b/openapi-specs/compute/33-00/desc/radar/serverless_stop_post.md index 5c0bdf186..f15bef34d 100644 --- a/openapi-specs/compute/33-00/desc/radar/serverless_stop_post.md +++ b/openapi-specs/compute/33-00/desc/radar/serverless_stop_post.md @@ -1,7 +1,7 @@ Stops an in-progress serverless scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/rbac/role_delete.md b/openapi-specs/compute/33-00/desc/rbac/role_delete.md index 87015b6e8..46efcf9c9 100644 --- a/openapi-specs/compute/33-00/desc/rbac/role_delete.md +++ b/openapi-specs/compute/33-00/desc/rbac/role_delete.md @@ -4,7 +4,7 @@ System roles and roles assigned to users/groups cannot be deleted. The following example curl command uses basic auth to delete role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-00/desc/rbac/roles_get.md b/openapi-specs/compute/33-00/desc/rbac/roles_get.md index 4cd1d9bc7..112026937 100644 --- a/openapi-specs/compute/33-00/desc/rbac/roles_get.md +++ b/openapi-specs/compute/33-00/desc/rbac/roles_get.md @@ -3,7 +3,7 @@ This endpoint will return a list in JSON format of the roles can be found under The following example curl command uses basic auth to return: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/rbac/roles_post.md b/openapi-specs/compute/33-00/desc/rbac/roles_post.md index 1f20772ce..6988766e8 100644 --- a/openapi-specs/compute/33-00/desc/rbac/roles_post.md +++ b/openapi-specs/compute/33-00/desc/rbac/roles_post.md @@ -37,7 +37,7 @@ The added role must contain the "user" permission with read-write access. This p The following example curl command uses basic auth to create the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/rbac/roles_put.md b/openapi-specs/compute/33-00/desc/rbac/roles_put.md index 34d7b41a7..f62e34ccb 100644 --- a/openapi-specs/compute/33-00/desc/rbac/roles_put.md +++ b/openapi-specs/compute/33-00/desc/rbac/roles_put.md @@ -38,7 +38,7 @@ The updated role must contain the "user" permission with read-write access. This The following example curl command uses basic auth to update the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-00/desc/recovery/backup_get.md b/openapi-specs/compute/33-00/desc/recovery/backup_get.md index 4da46f356..bf735905a 100644 --- a/openapi-specs/compute/33-00/desc/recovery/backup_get.md +++ b/openapi-specs/compute/33-00/desc/recovery/backup_get.md @@ -3,7 +3,7 @@ Returns a list of available backups. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/recovery/backup_id_delete.md b/openapi-specs/compute/33-00/desc/recovery/backup_id_delete.md index ae9c33e90..80cd4c3f6 100644 --- a/openapi-specs/compute/33-00/desc/recovery/backup_id_delete.md +++ b/openapi-specs/compute/33-00/desc/recovery/backup_id_delete.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-00/desc/recovery/backup_id_patch.md b/openapi-specs/compute/33-00/desc/recovery/backup_id_patch.md index 4a78cd67d..b3699972f 100644 --- a/openapi-specs/compute/33-00/desc/recovery/backup_id_patch.md +++ b/openapi-specs/compute/33-00/desc/recovery/backup_id_patch.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/compute/33-00/desc/recovery/backup_post.md b/openapi-specs/compute/33-00/desc/recovery/backup_post.md index f45161712..41436fe5f 100644 --- a/openapi-specs/compute/33-00/desc/recovery/backup_post.md +++ b/openapi-specs/compute/33-00/desc/recovery/backup_post.md @@ -3,7 +3,7 @@ Creates a backup named `backup_name` by invoking the MongoDB dump process. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/recovery/restore_id_post.md b/openapi-specs/compute/33-00/desc/recovery/restore_id_post.md index 850fceeaa..e424641cc 100644 --- a/openapi-specs/compute/33-00/desc/recovery/restore_id_post.md +++ b/openapi-specs/compute/33-00/desc/recovery/restore_id_post.md @@ -5,7 +5,7 @@ Restores Prisma Cloud Compute from the given backup. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/registry/download_get.md b/openapi-specs/compute/33-00/desc/registry/download_get.md index f4c2d04d5..d77ff1d01 100644 --- a/openapi-specs/compute/33-00/desc/registry/download_get.md +++ b/openapi-specs/compute/33-00/desc/registry/download_get.md @@ -9,7 +9,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/registry/get.md b/openapi-specs/compute/33-00/desc/registry/get.md index e8b87080e..208b2f1e3 100644 --- a/openapi-specs/compute/33-00/desc/registry/get.md +++ b/openapi-specs/compute/33-00/desc/registry/get.md @@ -21,7 +21,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that retrieves a scan report for all images in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -33,7 +33,7 @@ The compact query can be used to get a general overview of the number of Vulnera Refer to the following cURL command that retrieves a compact scan report for the Ubuntu image in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -44,7 +44,7 @@ The name query is synonymous with the filter registry text field in the Console Refer to the following cURL that retrieves the scan report for the image in the registry with the matching **sha256** hash: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -54,7 +54,7 @@ $ curl -k \ Refer to the following cURL command that retrieves the images in the first 10 registries: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/registry/get_registry_progress.md b/openapi-specs/compute/33-00/desc/registry/get_registry_progress.md index ddc319c1b..cc6feac3d 100644 --- a/openapi-specs/compute/33-00/desc/registry/get_registry_progress.md +++ b/openapi-specs/compute/33-00/desc/registry/get_registry_progress.md @@ -11,7 +11,7 @@ For a regular scan, use the API path only without any query parameters. Refer to the following example cURL request that retrieves the ongoing scan details for a regular registry scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -61,7 +61,7 @@ For an on-demand scan that is started using the `/registry/scan` endpoint with t Refer to the following example cURL request that retrieves the ongoing scan details for an on-demand registry scan that is started using the `/registry/scan` endpoint for the repository `alpine` with tag `3.16`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/registry/names_get.md b/openapi-specs/compute/33-00/desc/registry/names_get.md index 6933a570c..25afb48b8 100644 --- a/openapi-specs/compute/33-00/desc/registry/names_get.md +++ b/openapi-specs/compute/33-00/desc/registry/names_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command that retrieves a list of image names from your scanned registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/registry/scan_post.md b/openapi-specs/compute/33-00/desc/registry/scan_post.md index ce7e19533..96bfd5f16 100644 --- a/openapi-specs/compute/33-00/desc/registry/scan_post.md +++ b/openapi-specs/compute/33-00/desc/registry/scan_post.md @@ -17,7 +17,7 @@ For information on scan result, see [Get Registry Scan Report](https://prisma.pa Refer to the following example cURL command that forces Prisma Cloud Compute to rescan all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -27,7 +27,7 @@ $ curl -k \ Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan a specific image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -52,7 +52,7 @@ For information on scan result, see [Get Registry Scan Report](https://pan.dev/p Refer to the following example cURL command to trigger an on-demand scan for an image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/registry/stop_post.md b/openapi-specs/compute/33-00/desc/registry/stop_post.md index 29e103ac1..05ac2f436 100644 --- a/openapi-specs/compute/33-00/desc/registry/stop_post.md +++ b/openapi-specs/compute/33-00/desc/registry/stop_post.md @@ -5,7 +5,7 @@ Stops current registry scan immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to stop scanning all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/scans/download_get.md b/openapi-specs/compute/33-00/desc/scans/download_get.md index 0a3394b97..f54e00b00 100644 --- a/openapi-specs/compute/33-00/desc/scans/download_get.md +++ b/openapi-specs/compute/33-00/desc/scans/download_get.md @@ -9,7 +9,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo The following cURL command retrieves and saves your Jenkins and twistcli scan reports to a CSV file called `scans_report.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/scans/filter_get.md b/openapi-specs/compute/33-00/desc/scans/filter_get.md index 58550ad35..df3e9cdb0 100644 --- a/openapi-specs/compute/33-00/desc/scans/filter_get.md +++ b/openapi-specs/compute/33-00/desc/scans/filter_get.md @@ -3,7 +3,7 @@ Retrieves the list of Jenkins projects that have been scanned by the Jenkins plu The following example curl command uses basic auth to retrieve the list of Jenkins project names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/scans/get.md b/openapi-specs/compute/33-00/desc/scans/get.md index e28506972..107b733bd 100644 --- a/openapi-specs/compute/33-00/desc/scans/get.md +++ b/openapi-specs/compute/33-00/desc/scans/get.md @@ -11,7 +11,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command that retrieves the scan reports for all images scanned using the Jenkins CI plugin or the twistcli tool: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -23,7 +23,7 @@ To get the report of a specific scan, add query parameters to narrow the scope o The following cURL command retrieves the scan report for an image with a SHA256 ID of `sha256:f756e84300d8e53006090573dd33abe5b8cfac3e42d104fc4be37f435fe512f3`. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/scans/id_get.md b/openapi-specs/compute/33-00/desc/scans/id_get.md index 7a342ef60..1557b1905 100644 --- a/openapi-specs/compute/33-00/desc/scans/id_get.md +++ b/openapi-specs/compute/33-00/desc/scans/id_get.md @@ -3,7 +3,7 @@ Retrieves all scan reports for images scanned by the Jenkins plugin or twistcli The following example curl command uses basic auth to retrieve the scan report for just an image with a SHA256 ID of `5c3385fd2e76c5c16124c077`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/scripts/console_sh_get.md b/openapi-specs/compute/33-00/desc/scripts/console_sh_get.md index d8f02038f..1622321ca 100644 --- a/openapi-specs/compute/33-00/desc/scripts/console_sh_get.md +++ b/openapi-specs/compute/33-00/desc/scripts/console_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/scripts/defender_ps1_get.md b/openapi-specs/compute/33-00/desc/scripts/defender_ps1_get.md index a47616983..45e4a6133 100644 --- a/openapi-specs/compute/33-00/desc/scripts/defender_ps1_get.md +++ b/openapi-specs/compute/33-00/desc/scripts/defender_ps1_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/scripts/defender_sh_get.md b/openapi-specs/compute/33-00/desc/scripts/defender_sh_get.md index 98ad6cf62..a8a302426 100644 --- a/openapi-specs/compute/33-00/desc/scripts/defender_sh_get.md +++ b/openapi-specs/compute/33-00/desc/scripts/defender_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/serverless/download_get.md b/openapi-specs/compute/33-00/desc/serverless/download_get.md index e1932499a..510f1f481 100644 --- a/openapi-specs/compute/33-00/desc/serverless/download_get.md +++ b/openapi-specs/compute/33-00/desc/serverless/download_get.md @@ -9,7 +9,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo The following cURL command retrieves a list of all serverless resources monitored by Prisma Cloud Compute and saves the results in a CSV file called `serverless.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/serverless/download' \ diff --git a/openapi-specs/compute/33-00/desc/serverless/embed_post.md b/openapi-specs/compute/33-00/desc/serverless/embed_post.md index 6cce784b8..353b5721c 100644 --- a/openapi-specs/compute/33-00/desc/serverless/embed_post.md +++ b/openapi-specs/compute/33-00/desc/serverless/embed_post.md @@ -1,7 +1,7 @@ The following curl command uses basic auth to retrieve a list of all Serverless resources that monitored by Prisma Cloud Compute, and save the results to a CSV file: ```bash -$ curl -k \ +$ curl \ -X POST \ -H "Content-Type: application/octet-stream" \ -u \ diff --git a/openapi-specs/compute/33-00/desc/serverless/get.md b/openapi-specs/compute/33-00/desc/serverless/get.md index aee50492f..430ee065a 100644 --- a/openapi-specs/compute/33-00/desc/serverless/get.md +++ b/openapi-specs/compute/33-00/desc/serverless/get.md @@ -11,7 +11,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Functions > Scanned function Refer to the following example cURL command that retrieves the scan reports for serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/serverless/names_get.md b/openapi-specs/compute/33-00/desc/serverless/names_get.md index 3cab17092..90285574a 100644 --- a/openapi-specs/compute/33-00/desc/serverless/names_get.md +++ b/openapi-specs/compute/33-00/desc/serverless/names_get.md @@ -5,7 +5,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo The following curl command uses basic auth to retrieve a list of names of all Serverless resources monitored by Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -X GET \ -H "Content-Type: application/json" \ -u \ diff --git a/openapi-specs/compute/33-00/desc/serverless/scan_post.md b/openapi-specs/compute/33-00/desc/serverless/scan_post.md index 159285349..70a3a3b4e 100644 --- a/openapi-specs/compute/33-00/desc/serverless/scan_post.md +++ b/openapi-specs/compute/33-00/desc/serverless/scan_post.md @@ -5,7 +5,7 @@ Re-scan all serverless functions immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/scan diff --git a/openapi-specs/compute/33-00/desc/serverless/stop_post.md b/openapi-specs/compute/33-00/desc/serverless/stop_post.md index 763710842..67c0d2239 100644 --- a/openapi-specs/compute/33-00/desc/serverless/stop_post.md +++ b/openapi-specs/compute/33-00/desc/serverless/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing serverless scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/stop diff --git a/openapi-specs/compute/33-00/desc/settings/alerts_get.md b/openapi-specs/compute/33-00/desc/settings/alerts_get.md index 060114c39..2b25dc6c9 100644 --- a/openapi-specs/compute/33-00/desc/settings/alerts_get.md +++ b/openapi-specs/compute/33-00/desc/settings/alerts_get.md @@ -1,7 +1,7 @@ Retrieves a list of your alert settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/settings/alerts_options_get.md b/openapi-specs/compute/33-00/desc/settings/alerts_options_get.md index 095c1f1b7..aa7a1d250 100644 --- a/openapi-specs/compute/33-00/desc/settings/alerts_options_get.md +++ b/openapi-specs/compute/33-00/desc/settings/alerts_options_get.md @@ -3,7 +3,7 @@ This endpoint will return the alert profile configuration options that can be fo The following example curl command uses basic auth to retrieve all alert profile configuration options: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/settings/alerts_post.md b/openapi-specs/compute/33-00/desc/settings/alerts_post.md index 3acb8d543..cd303f880 100644 --- a/openapi-specs/compute/33-00/desc/settings/alerts_post.md +++ b/openapi-specs/compute/33-00/desc/settings/alerts_post.md @@ -3,7 +3,7 @@ Configure alerts. The following example curl command sets the aggregation period for alerts to one hour. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/settings/certificates_post.md b/openapi-specs/compute/33-00/desc/settings/certificates_post.md index fbdc8a5a9..bd30ea399 100644 --- a/openapi-specs/compute/33-00/desc/settings/certificates_post.md +++ b/openapi-specs/compute/33-00/desc/settings/certificates_post.md @@ -9,7 +9,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to set the validity period for client certificates to seven days: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/33-00/desc/settings/certs_get.md b/openapi-specs/compute/33-00/desc/settings/certs_get.md index ba6674a3c..dbf1d3790 100644 --- a/openapi-specs/compute/33-00/desc/settings/certs_get.md +++ b/openapi-specs/compute/33-00/desc/settings/certs_get.md @@ -6,7 +6,7 @@ Defenders use these names to connect to Console. Refer to the following example cURL request that uses basic auth to retrieve the SANs in Console's cert: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/settings/certs_post.md b/openapi-specs/compute/33-00/desc/settings/certs_post.md index a6e429006..fb2cedee5 100644 --- a/openapi-specs/compute/33-00/desc/settings/certs_post.md +++ b/openapi-specs/compute/33-00/desc/settings/certs_post.md @@ -12,7 +12,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to add `node-01.example.com` to the `subjectAltName` field in the certificate: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/33-00/desc/settings/coderepos_get.md b/openapi-specs/compute/33-00/desc/settings/coderepos_get.md index 6cbfb78cb..286a8d905 100644 --- a/openapi-specs/compute/33-00/desc/settings/coderepos_get.md +++ b/openapi-specs/compute/33-00/desc/settings/coderepos_get.md @@ -20,7 +20,7 @@ Construct the full webhook using Console's publicly accessible DNS name or IP ad Refer to the following example cURL command that retrieves all code repositories to scan, as well as the webhook URL suffix: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/settings/console-certificates_post.md b/openapi-specs/compute/33-00/desc/settings/console-certificates_post.md index 5673af840..392061c8f 100644 --- a/openapi-specs/compute/33-00/desc/settings/console-certificates_post.md +++ b/openapi-specs/compute/33-00/desc/settings/console-certificates_post.md @@ -9,7 +9,7 @@ For the custom TLS certificate for securing browser access, this file must be in Refer to the following example cURL request that uses basic auth and configures the custom certificate to use for securing browser access to the console: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/settings/custom-labels_get.md b/openapi-specs/compute/33-00/desc/settings/custom-labels_get.md index a849dd8a8..19c1cadde 100644 --- a/openapi-specs/compute/33-00/desc/settings/custom-labels_get.md +++ b/openapi-specs/compute/33-00/desc/settings/custom-labels_get.md @@ -5,7 +5,7 @@ Returns the list of alert labels configured in Prisma Cloud Compute. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/settings/custom-labels_post.md b/openapi-specs/compute/33-00/desc/settings/custom-labels_post.md index 6bb66e706..9b0702fe8 100644 --- a/openapi-specs/compute/33-00/desc/settings/custom-labels_post.md +++ b/openapi-specs/compute/33-00/desc/settings/custom-labels_post.md @@ -5,7 +5,7 @@ Creates a custom alert label to augment audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/settings/defender_get.md b/openapi-specs/compute/33-00/desc/settings/defender_get.md index ecb8b6989..cf43bb304 100644 --- a/openapi-specs/compute/33-00/desc/settings/defender_get.md +++ b/openapi-specs/compute/33-00/desc/settings/defender_get.md @@ -5,7 +5,7 @@ Returns the advanced settings for Defenders. Refer to the following example cURL command that gets all advanced settings for Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/settings/forensic_get.md b/openapi-specs/compute/33-00/desc/settings/forensic_get.md index 9c16b70b9..3486b2bf9 100644 --- a/openapi-specs/compute/33-00/desc/settings/forensic_get.md +++ b/openapi-specs/compute/33-00/desc/settings/forensic_get.md @@ -1,7 +1,7 @@ Retrieves the settings for the forensics system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/settings/forensic_post.md b/openapi-specs/compute/33-00/desc/settings/forensic_post.md index 31f809d39..8943842fb 100644 --- a/openapi-specs/compute/33-00/desc/settings/forensic_post.md +++ b/openapi-specs/compute/33-00/desc/settings/forensic_post.md @@ -3,7 +3,7 @@ Configures the forensics system. The following example curl command allocates 100 MB of local disk space for container forensic data and 10 MB for host forensics data. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/settings/initialized_get.md b/openapi-specs/compute/33-00/desc/settings/initialized_get.md index 3134912d1..2af8462f1 100644 --- a/openapi-specs/compute/33-00/desc/settings/initialized_get.md +++ b/openapi-specs/compute/33-00/desc/settings/initialized_get.md @@ -4,7 +4,7 @@ After first installing Console, the first thing you must do is create an admin a Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/settings/intelligence-windows_post.md b/openapi-specs/compute/33-00/desc/settings/intelligence-windows_post.md index c39e256d2..0721dab3b 100644 --- a/openapi-specs/compute/33-00/desc/settings/intelligence-windows_post.md +++ b/openapi-specs/compute/33-00/desc/settings/intelligence-windows_post.md @@ -3,7 +3,7 @@ This endpoint will enable or disable the Windows Intelligence Service from **Man The following example curl command uses basic auth to enable online updates of Windows vulnerabilities from the intelligence stream: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/settings/intelligence_get.md b/openapi-specs/compute/33-00/desc/settings/intelligence_get.md index 26c694246..15e9f24ae 100644 --- a/openapi-specs/compute/33-00/desc/settings/intelligence_get.md +++ b/openapi-specs/compute/33-00/desc/settings/intelligence_get.md @@ -5,7 +5,7 @@ Returns the details about the Intelligence Stream configuration. Refer to the following example cURL command that uses basic auth to retrieve your Intelligence Stream configuration settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/settings/intelligence_post.md b/openapi-specs/compute/33-00/desc/settings/intelligence_post.md index 74b06a3a0..2dbbd0168 100644 --- a/openapi-specs/compute/33-00/desc/settings/intelligence_post.md +++ b/openapi-specs/compute/33-00/desc/settings/intelligence_post.md @@ -7,7 +7,7 @@ For more information, see [Intelligence Stream](https://docs.paloaltonetworks.co Refer to the following example cURL command that uses basic auth to configure settings of your Intelligence Stream. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/settings/latest-version_get.md b/openapi-specs/compute/33-00/desc/settings/latest-version_get.md index c443fa7b5..16601fb5b 100644 --- a/openapi-specs/compute/33-00/desc/settings/latest-version_get.md +++ b/openapi-specs/compute/33-00/desc/settings/latest-version_get.md @@ -3,7 +3,7 @@ Retrieves the version number of the latest available Prisma Cloud Compute releas Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/settings/latest_version_get.md b/openapi-specs/compute/33-00/desc/settings/latest_version_get.md index 18e436668..5c64edff1 100644 --- a/openapi-specs/compute/33-00/desc/settings/latest_version_get.md +++ b/openapi-specs/compute/33-00/desc/settings/latest_version_get.md @@ -1,7 +1,7 @@ This endpoint will return the latest version of the product. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/settings/ldap_get.md b/openapi-specs/compute/33-00/desc/settings/ldap_get.md index 4ad0ad0c9..7d803ba1c 100644 --- a/openapi-specs/compute/33-00/desc/settings/ldap_get.md +++ b/openapi-specs/compute/33-00/desc/settings/ldap_get.md @@ -5,7 +5,7 @@ Returns the LDAP integration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/settings/ldap_post.md b/openapi-specs/compute/33-00/desc/settings/ldap_post.md index c152c7dc5..34bc06ef4 100644 --- a/openapi-specs/compute/33-00/desc/settings/ldap_post.md +++ b/openapi-specs/compute/33-00/desc/settings/ldap_post.md @@ -7,7 +7,7 @@ For more information, see [Active Directory](https://docs.paloaltonetworks.com/p Refer to the following example cURL command that enables the LDAP integration and specifies the parameters required to integrate with an Active Directory service. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/settings/license_get.md b/openapi-specs/compute/33-00/desc/settings/license_get.md index 5c792cae8..2b4b548e3 100644 --- a/openapi-specs/compute/33-00/desc/settings/license_get.md +++ b/openapi-specs/compute/33-00/desc/settings/license_get.md @@ -5,7 +5,7 @@ Returns the details about the installed license. Refer to the following example cURL request that retrieves the license details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/settings/license_post.md b/openapi-specs/compute/33-00/desc/settings/license_post.md index b77800a5f..ce74b0d0f 100644 --- a/openapi-specs/compute/33-00/desc/settings/license_post.md +++ b/openapi-specs/compute/33-00/desc/settings/license_post.md @@ -8,7 +8,7 @@ For more information, see [Licensing](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to set your license: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/settings/logging_get.md b/openapi-specs/compute/33-00/desc/settings/logging_get.md index 6eda3e484..012be5def 100644 --- a/openapi-specs/compute/33-00/desc/settings/logging_get.md +++ b/openapi-specs/compute/33-00/desc/settings/logging_get.md @@ -5,7 +5,7 @@ Returns the logging settings. Refer to the following example cURL request that uses basic auth to retrieve your logging details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/settings/logging_post.md b/openapi-specs/compute/33-00/desc/settings/logging_post.md index 3619d9c0f..8d27ee1b3 100644 --- a/openapi-specs/compute/33-00/desc/settings/logging_post.md +++ b/openapi-specs/compute/33-00/desc/settings/logging_post.md @@ -8,7 +8,7 @@ For more information, see [Logging](https://docs.paloaltonetworks.com/prisma/pri Refer to the following example cURL request that enables verbose scan output for syslog and stdout: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/settings/logon_get.md b/openapi-specs/compute/33-00/desc/settings/logon_get.md index 1559f2405..b1e9164f2 100644 --- a/openapi-specs/compute/33-00/desc/settings/logon_get.md +++ b/openapi-specs/compute/33-00/desc/settings/logon_get.md @@ -5,7 +5,7 @@ Configures the logon settings. Refer to the following example cURL request that uses basic auth to retrieve all current logon settings. ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/settings/logon_post.md b/openapi-specs/compute/33-00/desc/settings/logon_post.md index 5c2b60c9f..691e082fe 100644 --- a/openapi-specs/compute/33-00/desc/settings/logon_post.md +++ b/openapi-specs/compute/33-00/desc/settings/logon_post.md @@ -7,7 +7,7 @@ For more information, see [Logon Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that uses basic auth to set the timeout to 900 seconds (15 minutes): ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/33-00/desc/settings/oauth_get.md b/openapi-specs/compute/33-00/desc/settings/oauth_get.md index 6dcf70fb5..5d997f016 100644 --- a/openapi-specs/compute/33-00/desc/settings/oauth_get.md +++ b/openapi-specs/compute/33-00/desc/settings/oauth_get.md @@ -5,7 +5,7 @@ Returns the OAuth configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/settings/oauth_post.md b/openapi-specs/compute/33-00/desc/settings/oauth_post.md index c593b9237..da3c83d2f 100644 --- a/openapi-specs/compute/33-00/desc/settings/oauth_post.md +++ b/openapi-specs/compute/33-00/desc/settings/oauth_post.md @@ -7,7 +7,7 @@ For more information, see [GitHub OAuth](https://docs.paloaltonetworks.com/prism Refer to the following example cURL response: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/settings/oidc_get.md b/openapi-specs/compute/33-00/desc/settings/oidc_get.md index ee439622b..1f27f93ba 100644 --- a/openapi-specs/compute/33-00/desc/settings/oidc_get.md +++ b/openapi-specs/compute/33-00/desc/settings/oidc_get.md @@ -5,7 +5,7 @@ Returns the OpenID Connect configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/settings/oidc_post.md b/openapi-specs/compute/33-00/desc/settings/oidc_post.md index e0270247e..5bd3a9192 100644 --- a/openapi-specs/compute/33-00/desc/settings/oidc_post.md +++ b/openapi-specs/compute/33-00/desc/settings/oidc_post.md @@ -7,7 +7,7 @@ For more information, see [OIDC](https://docs.paloaltonetworks.com/prisma/prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/settings/pcf_get.md b/openapi-specs/compute/33-00/desc/settings/pcf_get.md index 5dc21eb17..c5e42a823 100644 --- a/openapi-specs/compute/33-00/desc/settings/pcf_get.md +++ b/openapi-specs/compute/33-00/desc/settings/pcf_get.md @@ -3,7 +3,7 @@ This endpoint will return settings for PCF (Pivotal Cloud Foundry)Blobstore scan The following example curl command uses basic auth to retrieve the current PCF Blobstore scanning settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/settings/pcf_post.md b/openapi-specs/compute/33-00/desc/settings/pcf_post.md index 139e947cb..657e14f27 100644 --- a/openapi-specs/compute/33-00/desc/settings/pcf_post.md +++ b/openapi-specs/compute/33-00/desc/settings/pcf_post.md @@ -3,7 +3,7 @@ This endpoint will allow for updating settings for PCF (Pivotal Cloud Foundry) B The following example curl command uses basic auth to set up a PCF Blobstore scanner that scans the last `5` droplets for every droplet in the PCF Blobstore: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/settings/projects_get.md b/openapi-specs/compute/33-00/desc/settings/projects_get.md index f5dd20395..bc95414a1 100644 --- a/openapi-specs/compute/33-00/desc/settings/projects_get.md +++ b/openapi-specs/compute/33-00/desc/settings/projects_get.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command retrieves the state of the Projects feature from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ All API calls must be proxied through Central Console, where the request is auto To retrieve the Projects settings from a supervisor Console, append the `project` query parameter to your request. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/settings/projects_post.md b/openapi-specs/compute/33-00/desc/settings/projects_post.md index d29f8e9d5..b3472e6b9 100644 --- a/openapi-specs/compute/33-00/desc/settings/projects_post.md +++ b/openapi-specs/compute/33-00/desc/settings/projects_post.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command designates `` as master. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/settings/proxy_get.md b/openapi-specs/compute/33-00/desc/settings/proxy_get.md index 9a4922d59..477563069 100644 --- a/openapi-specs/compute/33-00/desc/settings/proxy_get.md +++ b/openapi-specs/compute/33-00/desc/settings/proxy_get.md @@ -5,7 +5,7 @@ Returns the proxy settings for Prisma Cloud Compute containers to access the Int Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/settings/proxy_post.md b/openapi-specs/compute/33-00/desc/settings/proxy_post.md index a1bdc07ed..df926524e 100644 --- a/openapi-specs/compute/33-00/desc/settings/proxy_post.md +++ b/openapi-specs/compute/33-00/desc/settings/proxy_post.md @@ -7,7 +7,7 @@ For more information, see [Proxy Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that specifies the proxy to use to access the Internet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/settings/registry_get.md b/openapi-specs/compute/33-00/desc/settings/registry_get.md index 12745005d..64e70b698 100644 --- a/openapi-specs/compute/33-00/desc/settings/registry_get.md +++ b/openapi-specs/compute/33-00/desc/settings/registry_get.md @@ -17,7 +17,7 @@ Construct the full webhook using the publicly accessible DNS name or IP address, The following cURL command retrieves all the registries to scan and the URL suffix for the registry's webhook URL suffix. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/settings/registry_post.md b/openapi-specs/compute/33-00/desc/settings/registry_post.md index efabf4e67..decf80a65 100644 --- a/openapi-specs/compute/33-00/desc/settings/registry_post.md +++ b/openapi-specs/compute/33-00/desc/settings/registry_post.md @@ -30,7 +30,7 @@ The API response returns an HTTP 400 error if the number of registry specificati Refer to the following example cURL command that configures Prisma Cloud Compute to scan the Ubuntu 16.04 repository on Docker Hub: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -64,7 +64,7 @@ To add settings for a GitLab Container Registry, you must specify the following Refer to the following example cURL command: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/settings/registry_put.md b/openapi-specs/compute/33-00/desc/settings/registry_put.md index 3768914f6..75d6c79a2 100644 --- a/openapi-specs/compute/33-00/desc/settings/registry_put.md +++ b/openapi-specs/compute/33-00/desc/settings/registry_put.md @@ -127,7 +127,7 @@ To remove a registry from the list: To delete all entries, submit an empty `specifications` array. For example: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-00/desc/settings/saml_get.md b/openapi-specs/compute/33-00/desc/settings/saml_get.md index f2228a440..4fb940e80 100644 --- a/openapi-specs/compute/33-00/desc/settings/saml_get.md +++ b/openapi-specs/compute/33-00/desc/settings/saml_get.md @@ -5,7 +5,7 @@ Returns the configured SAML settings that is used to authenticate to the Prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/settings/saml_post.md b/openapi-specs/compute/33-00/desc/settings/saml_post.md index 0bd9c4a25..dfe8d380f 100644 --- a/openapi-specs/compute/33-00/desc/settings/saml_post.md +++ b/openapi-specs/compute/33-00/desc/settings/saml_post.md @@ -7,7 +7,7 @@ For more information, see [Okta via SAML 2.0](https://docs.paloaltonetworks.com/ Refer to the following example cURL request that uses the basic auth to set up and enable the SAML integration with Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/settings/scan_get.md b/openapi-specs/compute/33-00/desc/settings/scan_get.md index 5c1df30a2..543ea7662 100644 --- a/openapi-specs/compute/33-00/desc/settings/scan_get.md +++ b/openapi-specs/compute/33-00/desc/settings/scan_get.md @@ -5,7 +5,7 @@ Returns the global settings for image, host, container, and registry scanning. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/settings/scan_post.md b/openapi-specs/compute/33-00/desc/settings/scan_post.md index f043d1c9f..9ddb521a2 100644 --- a/openapi-specs/compute/33-00/desc/settings/scan_post.md +++ b/openapi-specs/compute/33-00/desc/settings/scan_post.md @@ -9,7 +9,7 @@ Refer to the following example cURL request that configures the following scan i * Scan images, containers, and hosts once per day. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/settings/secrets_get.md b/openapi-specs/compute/33-00/desc/settings/secrets_get.md index 75e2b32c7..339009641 100644 --- a/openapi-specs/compute/33-00/desc/settings/secrets_get.md +++ b/openapi-specs/compute/33-00/desc/settings/secrets_get.md @@ -3,7 +3,7 @@ This endpoint will return configured secret store already configured in the cons The following example curl command retrieves any configured secret stores, as well as the refresh period in hours: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/settings/secrets_post.md b/openapi-specs/compute/33-00/desc/settings/secrets_post.md index d302ecdf8..730d031bf 100644 --- a/openapi-specs/compute/33-00/desc/settings/secrets_post.md +++ b/openapi-specs/compute/33-00/desc/settings/secrets_post.md @@ -5,7 +5,7 @@ Please note the data structure returned from endpoint /settings/secrets GET to s Refer to the following example curl command that adds a CyberArk secret store to the console with the appID set to `Prisma_Cloud_Compute_Console` and set the URL to `https://services-myca.twistlock.com:10882`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/settings/serverless-scan_get.md b/openapi-specs/compute/33-00/desc/settings/serverless-scan_get.md index bb8ce06ba..eb42e4a12 100644 --- a/openapi-specs/compute/33-00/desc/settings/serverless-scan_get.md +++ b/openapi-specs/compute/33-00/desc/settings/serverless-scan_get.md @@ -8,7 +8,7 @@ This endpoint maps to the **Function scope** table data in the **Defend > Vulner Refer to the following example cURL command that retrieves a list of serverless scan scopes: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/settings/serverless_get.md b/openapi-specs/compute/33-00/desc/settings/serverless_get.md index b6122c460..8c654807c 100644 --- a/openapi-specs/compute/33-00/desc/settings/serverless_get.md +++ b/openapi-specs/compute/33-00/desc/settings/serverless_get.md @@ -3,7 +3,7 @@ This endpoint will return any configured serverless function scanners found in * The following example curl command uses basic auth to retrieve serverless settings in an array, sorted by Cloud Provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/settings/serverless_post.md b/openapi-specs/compute/33-00/desc/settings/serverless_post.md index 6e26ea1d3..c0e0f3225 100644 --- a/openapi-specs/compute/33-00/desc/settings/serverless_post.md +++ b/openapi-specs/compute/33-00/desc/settings/serverless_post.md @@ -3,7 +3,7 @@ This endpoint will add serverless function providers to scan for vulnerabilities The following example curl command uses basic auth to add a serverless account to scan for serverless functions. This is assuming that you already have the [credential](https://docs.twistlock.com/docs/latest/configure/credentials_store.html) added to the console that is needed to scan that provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/settings/system_get.md b/openapi-specs/compute/33-00/desc/settings/system_get.md index 6f893abf0..0e8a3cba3 100644 --- a/openapi-specs/compute/33-00/desc/settings/system_get.md +++ b/openapi-specs/compute/33-00/desc/settings/system_get.md @@ -3,7 +3,7 @@ This endpoint will return all system settings in JSON format. The following example curl command does exactly that: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/settings/tas_get.md b/openapi-specs/compute/33-00/desc/settings/tas_get.md index 52f392433..d2d0017f0 100644 --- a/openapi-specs/compute/33-00/desc/settings/tas_get.md +++ b/openapi-specs/compute/33-00/desc/settings/tas_get.md @@ -5,7 +5,7 @@ Retrieves Tanzu Application Service (TAS) settings. Refer to the following example cURL command that retrieves all TAS settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/settings/telemetry_get.md b/openapi-specs/compute/33-00/desc/settings/telemetry_get.md index 6460c3fc3..46a807e77 100644 --- a/openapi-specs/compute/33-00/desc/settings/telemetry_get.md +++ b/openapi-specs/compute/33-00/desc/settings/telemetry_get.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that retrieves the settings if telemetry is enabled or not: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/settings/telemetry_post.md b/openapi-specs/compute/33-00/desc/settings/telemetry_post.md index bc97a6d0f..662846f33 100644 --- a/openapi-specs/compute/33-00/desc/settings/telemetry_post.md +++ b/openapi-specs/compute/33-00/desc/settings/telemetry_post.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to turn off telemetry: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/settings/trusted_certificate_post.md b/openapi-specs/compute/33-00/desc/settings/trusted_certificate_post.md index 5a2a30bda..c54b96fa5 100644 --- a/openapi-specs/compute/33-00/desc/settings/trusted_certificate_post.md +++ b/openapi-specs/compute/33-00/desc/settings/trusted_certificate_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/trusted-certificates` endpoint. Refer to the following example cURL request that uses basic auth to add a certificate to the list: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/33-00/desc/settings/trusted_certificates_post.md b/openapi-specs/compute/33-00/desc/settings/trusted_certificates_post.md index 78c07982b..e9bdc72a1 100644 --- a/openapi-specs/compute/33-00/desc/settings/trusted_certificates_post.md +++ b/openapi-specs/compute/33-00/desc/settings/trusted_certificates_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/certificates` endpoint. Refer to the following example cURL request that uses basic auth to enable this feature: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/33-00/desc/settings/vm_get.md b/openapi-specs/compute/33-00/desc/settings/vm_get.md index 8043742f5..b98b94240 100644 --- a/openapi-specs/compute/33-00/desc/settings/vm_get.md +++ b/openapi-specs/compute/33-00/desc/settings/vm_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **VM images scope** table data in the **Defend > Vulne Refer to the following example cURL command that retrieves all the scopes used for pattern matching on VM functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/signup/post.md b/openapi-specs/compute/33-00/desc/signup/post.md index 1db21df29..67344a0b1 100644 --- a/openapi-specs/compute/33-00/desc/signup/post.md +++ b/openapi-specs/compute/33-00/desc/signup/post.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i The following cURL command creates the initial admin user with the username `admin` and password `password`. ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -X POST \ -d '{"username": "admin", "password": "password"}' \ diff --git a/openapi-specs/compute/33-00/desc/static/capabilities_get.md b/openapi-specs/compute/33-00/desc/static/capabilities_get.md index ea119d2a9..f9b60278c 100644 --- a/openapi-specs/compute/33-00/desc/static/capabilities_get.md +++ b/openapi-specs/compute/33-00/desc/static/capabilities_get.md @@ -1,7 +1,7 @@ Returns a list of capabilities used in host models. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/static/regions_get.md b/openapi-specs/compute/33-00/desc/static/regions_get.md index 4a07097ee..3b1adb5f1 100644 --- a/openapi-specs/compute/33-00/desc/static/regions_get.md +++ b/openapi-specs/compute/33-00/desc/static/regions_get.md @@ -1,7 +1,7 @@ Returns a list of regions used in cloud radar. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/static/syscalls_get.md b/openapi-specs/compute/33-00/desc/static/syscalls_get.md index 9e2ddcde7..09505ba39 100644 --- a/openapi-specs/compute/33-00/desc/static/syscalls_get.md +++ b/openapi-specs/compute/33-00/desc/static/syscalls_get.md @@ -2,7 +2,7 @@ Returns a list of the Linux kernel system calls. Runtime rules for containers can allow-list and deny-list specific system calls. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/static/vulnerabilities_get.md b/openapi-specs/compute/33-00/desc/static/vulnerabilities_get.md index cb6acab28..19809472b 100644 --- a/openapi-specs/compute/33-00/desc/static/vulnerabilities_get.md +++ b/openapi-specs/compute/33-00/desc/static/vulnerabilities_get.md @@ -3,7 +3,7 @@ This data can be used for building out reports with the API. This data can be correlated with the `/api/v1/images` endpoint, specifically the the `complianceVulnerabilities` and `cveVulnerabilities` objects, to generate more thorough reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/stats/compliance.md b/openapi-specs/compute/33-00/desc/stats/compliance.md index 5c5be3991..4f4c90071 100644 --- a/openapi-specs/compute/33-00/desc/stats/compliance.md +++ b/openapi-specs/compute/33-00/desc/stats/compliance.md @@ -5,7 +5,7 @@ For the current day, the response will also include detailed compliance stats fo The following example command that uses curl and basic auth to retrieve compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/stats/compliance_get.md b/openapi-specs/compute/33-00/desc/stats/compliance_get.md index 314f6a179..2ef2f9f75 100644 --- a/openapi-specs/compute/33-00/desc/stats/compliance_get.md +++ b/openapi-specs/compute/33-00/desc/stats/compliance_get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Compliance > Compliance explorer* Refer to the following example cURL command that retrieves compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/stats/compliance_refresh.md b/openapi-specs/compute/33-00/desc/stats/compliance_refresh.md index b75491a69..d8ce211a8 100644 --- a/openapi-specs/compute/33-00/desc/stats/compliance_refresh.md +++ b/openapi-specs/compute/33-00/desc/stats/compliance_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/compliance endpoint return The following example command that uses curl and basic auth to refresh compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/stats/compliance_refresh_post.md b/openapi-specs/compute/33-00/desc/stats/compliance_refresh_post.md index 541a54d16..0f329d1db 100644 --- a/openapi-specs/compute/33-00/desc/stats/compliance_refresh_post.md +++ b/openapi-specs/compute/33-00/desc/stats/compliance_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/compliance`, b Refer to the following example cURL command that refreshes compliance statistics for the current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/stats/daily.md b/openapi-specs/compute/33-00/desc/stats/daily.md index 082f58a27..9fd4c6138 100644 --- a/openapi-specs/compute/33-00/desc/stats/daily.md +++ b/openapi-specs/compute/33-00/desc/stats/daily.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/stats/daily_get.md b/openapi-specs/compute/33-00/desc/stats/daily_get.md index 0db89bdc3..fe852126c 100644 --- a/openapi-specs/compute/33-00/desc/stats/daily_get.md +++ b/openapi-specs/compute/33-00/desc/stats/daily_get.md @@ -3,7 +3,7 @@ Returns a historical list of per-day statistics for the resources protected by P The following example command uses curl and basic auth to retrieve the daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/stats/dashboard.md b/openapi-specs/compute/33-00/desc/stats/dashboard.md index be90a2d32..1e5fabf08 100644 --- a/openapi-specs/compute/33-00/desc/stats/dashboard.md +++ b/openapi-specs/compute/33-00/desc/stats/dashboard.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/stats/dashboard_get.md b/openapi-specs/compute/33-00/desc/stats/dashboard_get.md index 601769645..8f0bc827c 100644 --- a/openapi-specs/compute/33-00/desc/stats/dashboard_get.md +++ b/openapi-specs/compute/33-00/desc/stats/dashboard_get.md @@ -5,7 +5,7 @@ Returns statistics about the resources protected by Prisma Cloud Compute, includ Refer to the following example cURL command that retrieves dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/stats/events_get.md b/openapi-specs/compute/33-00/desc/stats/events_get.md index 3be5eb4e7..e64f98e57 100644 --- a/openapi-specs/compute/33-00/desc/stats/events_get.md +++ b/openapi-specs/compute/33-00/desc/stats/events_get.md @@ -5,7 +5,7 @@ Returns events statistics for your environment. Refer to the following example cURL command retrieves event stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/stats/vulnerabilities.md b/openapi-specs/compute/33-00/desc/stats/vulnerabilities.md index 40c4dd1f1..199cfab62 100644 --- a/openapi-specs/compute/33-00/desc/stats/vulnerabilities.md +++ b/openapi-specs/compute/33-00/desc/stats/vulnerabilities.md @@ -5,7 +5,7 @@ For the current day, the response will also include descriptions of the CVEs cur The following example command that uses curl and basic auth to retrieve vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/stats/vulnerabilities_download_get.md b/openapi-specs/compute/33-00/desc/stats/vulnerabilities_download_get.md index 753af8c7f..9930a636b 100644 --- a/openapi-specs/compute/33-00/desc/stats/vulnerabilities_download_get.md +++ b/openapi-specs/compute/33-00/desc/stats/vulnerabilities_download_get.md @@ -17,7 +17,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a summary count of the CVEs and detailed descriptions for each CVE in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/stats/vulnerabilities_get.md b/openapi-specs/compute/33-00/desc/stats/vulnerabilities_get.md index 2fe5d4e18..978e96cfe 100644 --- a/openapi-specs/compute/33-00/desc/stats/vulnerabilities_get.md +++ b/openapi-specs/compute/33-00/desc/stats/vulnerabilities_get.md @@ -20,7 +20,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a summary count of the CVEs and detailed descriptions for each CVE: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/stats/vulnerabilities_impacted_resources_download_get.md b/openapi-specs/compute/33-00/desc/stats/vulnerabilities_impacted_resources_download_get.md index 0821d6a9f..502c09a6c 100644 --- a/openapi-specs/compute/33-00/desc/stats/vulnerabilities_impacted_resources_download_get.md +++ b/openapi-specs/compute/33-00/desc/stats/vulnerabilities_impacted_resources_download_get.md @@ -15,7 +15,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a list of impacted resources for `CVE-2015-0313` in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/stats/vulnerabilities_impacted_resources_get.md b/openapi-specs/compute/33-00/desc/stats/vulnerabilities_impacted_resources_get.md index c1e6d0ba2..014a5f4a2 100644 --- a/openapi-specs/compute/33-00/desc/stats/vulnerabilities_impacted_resources_get.md +++ b/openapi-specs/compute/33-00/desc/stats/vulnerabilities_impacted_resources_get.md @@ -18,7 +18,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a list of impacted resources for `CVE-2022-28391`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -95,7 +95,7 @@ Refer to the following example JSON response that shows the risk tree for the im Refer to the following example cURL command that retrieves a the impacted registry images `CVE-2015-0313` by using an optional query parameter `resourceType`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -108,7 +108,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a paginated list of impacted resources for `CVE-2015-0313` by using optional query parameters `limit` and `offset`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/stats/vulnerabilities_refresh.md b/openapi-specs/compute/33-00/desc/stats/vulnerabilities_refresh.md index 505a99d98..2aa7da8a1 100644 --- a/openapi-specs/compute/33-00/desc/stats/vulnerabilities_refresh.md +++ b/openapi-specs/compute/33-00/desc/stats/vulnerabilities_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/vulnerabilities endpoint r The following example command that uses curl and basic auth to refresh vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/stats/vulnerabilities_refresh_post.md b/openapi-specs/compute/33-00/desc/stats/vulnerabilities_refresh_post.md index 1e3210e18..85e3ddd7a 100644 --- a/openapi-specs/compute/33-00/desc/stats/vulnerabilities_refresh_post.md +++ b/openapi-specs/compute/33-00/desc/stats/vulnerabilities_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/vulnerabilitie Refer to the following example cURL command that refreshes the vulnerability statistics for current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/stats/workload_get.md b/openapi-specs/compute/33-00/desc/stats/workload_get.md index a25deed5c..940a835ee 100644 --- a/openapi-specs/compute/33-00/desc/stats/workload_get.md +++ b/openapi-specs/compute/33-00/desc/stats/workload_get.md @@ -1,7 +1,7 @@ Returns the workload statistics from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/statuses/intelligence.md b/openapi-specs/compute/33-00/desc/statuses/intelligence.md index 74da8c7ff..ac102e81f 100644 --- a/openapi-specs/compute/33-00/desc/statuses/intelligence.md +++ b/openapi-specs/compute/33-00/desc/statuses/intelligence.md @@ -3,7 +3,7 @@ Returns the connection status of the intelligence stream and the last intelligen The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/statuses/intelligence_get.md b/openapi-specs/compute/33-00/desc/statuses/intelligence_get.md index c18dd9611..b5f620ad9 100644 --- a/openapi-specs/compute/33-00/desc/statuses/intelligence_get.md +++ b/openapi-specs/compute/33-00/desc/statuses/intelligence_get.md @@ -3,7 +3,7 @@ Returns the connection status for the Intelligence Stream, along with the time o The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/statuses/registry_get.md b/openapi-specs/compute/33-00/desc/statuses/registry_get.md index 427c4915c..e4fd09fe9 100644 --- a/openapi-specs/compute/33-00/desc/statuses/registry_get.md +++ b/openapi-specs/compute/33-00/desc/statuses/registry_get.md @@ -13,7 +13,7 @@ To view the more details about the progress of a regular or on-demand registry s Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/statuses/secrets_get.md b/openapi-specs/compute/33-00/desc/statuses/secrets_get.md index 510f15161..e77c5ed70 100644 --- a/openapi-specs/compute/33-00/desc/statuses/secrets_get.md +++ b/openapi-specs/compute/33-00/desc/statuses/secrets_get.md @@ -3,7 +3,7 @@ Returns the connection status of any secret stores you have configured, as well The following is an example curl using basic auth to find the secret store status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/statuses/serverless-radar_get.md b/openapi-specs/compute/33-00/desc/statuses/serverless-radar_get.md index 3bfdbb5bf..4ab5d0c1d 100644 --- a/openapi-specs/compute/33-00/desc/statuses/serverless-radar_get.md +++ b/openapi-specs/compute/33-00/desc/statuses/serverless-radar_get.md @@ -1,7 +1,7 @@ Returns the status of the serverless scans. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/tags/get.md b/openapi-specs/compute/33-00/desc/tags/get.md index 6da7ad135..604eee98e 100644 --- a/openapi-specs/compute/33-00/desc/tags/get.md +++ b/openapi-specs/compute/33-00/desc/tags/get.md @@ -5,7 +5,7 @@ Retrieves a list of tags. Refer to the following example cURL command that retrieves a list of tags: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/tags/name_delete.md b/openapi-specs/compute/33-00/desc/tags/name_delete.md index 2ed010e57..6dedfce8f 100644 --- a/openapi-specs/compute/33-00/desc/tags/name_delete.md +++ b/openapi-specs/compute/33-00/desc/tags/name_delete.md @@ -5,7 +5,7 @@ Deletes a tag from the system. Refer to the following example cURL command that deletes a tag named *my tag*: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-00/desc/tags/name_put.md b/openapi-specs/compute/33-00/desc/tags/name_put.md index cbaea40d3..a5923b8ef 100644 --- a/openapi-specs/compute/33-00/desc/tags/name_put.md +++ b/openapi-specs/compute/33-00/desc/tags/name_put.md @@ -9,7 +9,7 @@ You must define all parameters in your PUT request. Refer to the following example cURL command that updates the parameters in a tag named `my_tag`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-00/desc/tags/post.md b/openapi-specs/compute/33-00/desc/tags/post.md index d55ae8b96..8e1a493d6 100644 --- a/openapi-specs/compute/33-00/desc/tags/post.md +++ b/openapi-specs/compute/33-00/desc/tags/post.md @@ -8,7 +8,7 @@ You can use tags as policy exceptions or assign them to vulnerabilities for acti Refer to the following example cURL command that creates a tag named "my-tag": ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/tags/tag_cve_delete.md b/openapi-specs/compute/33-00/desc/tags/tag_cve_delete.md index 8caed79cf..3031029b9 100644 --- a/openapi-specs/compute/33-00/desc/tags/tag_cve_delete.md +++ b/openapi-specs/compute/33-00/desc/tags/tag_cve_delete.md @@ -6,7 +6,7 @@ When you delete a tag, the tag is deleted from a wider scope. All the packages a Refer to the following example cURL command that removes the tag named `ignored` from the CVE `CVE-2017-15088`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-00/desc/tags/tag_cve_post.md b/openapi-specs/compute/33-00/desc/tags/tag_cve_post.md index 966a80bd8..1b4ead89b 100644 --- a/openapi-specs/compute/33-00/desc/tags/tag_cve_post.md +++ b/openapi-specs/compute/33-00/desc/tags/tag_cve_post.md @@ -45,7 +45,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the source package `perl`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -72,7 +72,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2021-20305` on the binary package `gnutls`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -98,7 +98,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -120,7 +120,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `image` and to all the packages and resources. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -140,7 +140,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `host`, resource `servo-vmware71`, and to all the packages. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/tas-droplets/download_get.md b/openapi-specs/compute/33-00/desc/tas-droplets/download_get.md index db92ec66a..7fdd6e259 100644 --- a/openapi-specs/compute/33-00/desc/tas-droplets/download_get.md +++ b/openapi-specs/compute/33-00/desc/tas-droplets/download_get.md @@ -9,7 +9,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo The following cURL command downloads all TAS droplets to a CSV file called `tas_droplets.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/tas-droplets/get.md b/openapi-specs/compute/33-00/desc/tas-droplets/get.md index d820517c2..ce07f8527 100644 --- a/openapi-specs/compute/33-00/desc/tas-droplets/get.md +++ b/openapi-specs/compute/33-00/desc/tas-droplets/get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > VMware Tanzu bl The following cURL command retrieves all TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/tas-droplets/get_tas_addresses.md b/openapi-specs/compute/33-00/desc/tas-droplets/get_tas_addresses.md index 528281613..8333cd24f 100644 --- a/openapi-specs/compute/33-00/desc/tas-droplets/get_tas_addresses.md +++ b/openapi-specs/compute/33-00/desc/tas-droplets/get_tas_addresses.md @@ -9,7 +9,7 @@ Gets the Cloud Controller Addresses of scanned Tanzu Application Service (TAS) d The following cURL command retrieves the Cloud Controller Addresses of scanned TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/tas-droplets/progress_get.md b/openapi-specs/compute/33-00/desc/tas-droplets/progress_get.md index 504a21e84..507d001bf 100644 --- a/openapi-specs/compute/33-00/desc/tas-droplets/progress_get.md +++ b/openapi-specs/compute/33-00/desc/tas-droplets/progress_get.md @@ -5,7 +5,7 @@ Returns the details of the TAS Droplets ongoing scan. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/tas-droplets/scan_post.md b/openapi-specs/compute/33-00/desc/tas-droplets/scan_post.md index aad2174af..13c4eeeb9 100644 --- a/openapi-specs/compute/33-00/desc/tas-droplets/scan_post.md +++ b/openapi-specs/compute/33-00/desc/tas-droplets/scan_post.md @@ -5,7 +5,7 @@ Scans the TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/tas-droplets/stop_post.md b/openapi-specs/compute/33-00/desc/tas-droplets/stop_post.md index 5f5a019b1..53d709ec7 100644 --- a/openapi-specs/compute/33-00/desc/tas-droplets/stop_post.md +++ b/openapi-specs/compute/33-00/desc/tas-droplets/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing scan of TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/trust/data_get.md b/openapi-specs/compute/33-00/desc/trust/data_get.md index dd55d47a3..88983f139 100644 --- a/openapi-specs/compute/33-00/desc/trust/data_get.md +++ b/openapi-specs/compute/33-00/desc/trust/data_get.md @@ -5,7 +5,7 @@ Returns the trusted registries, repositories, and images. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/trust/data_put.md b/openapi-specs/compute/33-00/desc/trust/data_put.md index 0e6a0ba49..733514505 100644 --- a/openapi-specs/compute/33-00/desc/trust/data_put.md +++ b/openapi-specs/compute/33-00/desc/trust/data_put.md @@ -6,7 +6,7 @@ Specify trusted images using either the image name or layers properties. Refer to the following example cURL command that uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -19,7 +19,7 @@ To edit a trust group based on image base layers, use PUT to specify a list of S Refer to the following example that specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-00/desc/trust/get.md b/openapi-specs/compute/33-00/desc/trust/get.md index 1226cd0a3..57ff5bdb5 100644 --- a/openapi-specs/compute/33-00/desc/trust/get.md +++ b/openapi-specs/compute/33-00/desc/trust/get.md @@ -3,7 +3,7 @@ Retrieves a list of all trusted images. The following example curl command uses basic auth to retrieve all trusted images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/trust/id_delete.md b/openapi-specs/compute/33-00/desc/trust/id_delete.md index b3114775f..d63cdf71a 100644 --- a/openapi-specs/compute/33-00/desc/trust/id_delete.md +++ b/openapi-specs/compute/33-00/desc/trust/id_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to specify a image trust grou ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-00/desc/trust/id_put.md b/openapi-specs/compute/33-00/desc/trust/id_put.md index 44d2c8b8b..c98617bcd 100644 --- a/openapi-specs/compute/33-00/desc/trust/id_put.md +++ b/openapi-specs/compute/33-00/desc/trust/id_put.md @@ -9,7 +9,7 @@ For more information about handles, see the `_id` in the response body for the G The following example curl command uses basic auth to modify the image property for an existing trusted image entry, where the handle for the entry is `docker-ubuntu-group`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-00/desc/trust/learn_get.md b/openapi-specs/compute/33-00/desc/trust/learn_get.md index d8a3414d0..004b16b02 100644 --- a/openapi-specs/compute/33-00/desc/trust/learn_get.md +++ b/openapi-specs/compute/33-00/desc/trust/learn_get.md @@ -1,7 +1,7 @@ Returns the state of the trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/trust/learn_post.md b/openapi-specs/compute/33-00/desc/trust/learn_post.md index 094817738..008657fa2 100644 --- a/openapi-specs/compute/33-00/desc/trust/learn_post.md +++ b/openapi-specs/compute/33-00/desc/trust/learn_post.md @@ -1,7 +1,7 @@ Sets the state of trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/trust/post.md b/openapi-specs/compute/33-00/desc/trust/post.md index 1072275a1..23a324c6c 100644 --- a/openapi-specs/compute/33-00/desc/trust/post.md +++ b/openapi-specs/compute/33-00/desc/trust/post.md @@ -7,7 +7,7 @@ For more information about handles, see the `_id` key in the response body for t The following example curl command uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ To create a trust group based on image base layers, POST a list of SHA256 hashes The following example specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/users/get.md b/openapi-specs/compute/33-00/desc/users/get.md index e4e6966ec..cd5a661ba 100644 --- a/openapi-specs/compute/33-00/desc/users/get.md +++ b/openapi-specs/compute/33-00/desc/users/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Manage > Authentication > Users** in the Console UI. The following cURL command retrieves all users. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/users/id_delete.md b/openapi-specs/compute/33-00/desc/users/id_delete.md index 1cfa5642d..66a1102f9 100644 --- a/openapi-specs/compute/33-00/desc/users/id_delete.md +++ b/openapi-specs/compute/33-00/desc/users/id_delete.md @@ -17,7 +17,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes user `ID` from the system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-00/desc/util/osx_twistcli_arm64_get.md b/openapi-specs/compute/33-00/desc/util/osx_twistcli_arm64_get.md index b385d0d3b..a30686374 100644 --- a/openapi-specs/compute/33-00/desc/util/osx_twistcli_arm64_get.md +++ b/openapi-specs/compute/33-00/desc/util/osx_twistcli_arm64_get.md @@ -7,7 +7,7 @@ Downloads the twistcli binary executable for MacOS platforms based on ARM64 arch Refer to the following example cURL command that downloads and saves the “twistcli” binary executable for ARM64 bit MacOS platforms to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/compute/33-00/desc/util/osx_twistcli_get.md b/openapi-specs/compute/33-00/desc/util/osx_twistcli_get.md index c49f96c41..2353ea338 100644 --- a/openapi-specs/compute/33-00/desc/util/osx_twistcli_get.md +++ b/openapi-specs/compute/33-00/desc/util/osx_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **MacOS platform** hyperlink in **Manage > System > Ut The following cURL command downloads the twistcli binary executable for MacOS platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli \ diff --git a/openapi-specs/compute/33-00/desc/util/twistcli_arm64_get.md b/openapi-specs/compute/33-00/desc/util/twistcli_arm64_get.md index 7ec36d3f5..a3d7318ab 100644 --- a/openapi-specs/compute/33-00/desc/util/twistcli_arm64_get.md +++ b/openapi-specs/compute/33-00/desc/util/twistcli_arm64_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/compute/33-00/desc/util/twistcli_get.md b/openapi-specs/compute/33-00/desc/util/twistcli_get.md index f9d2d295c..08a3ae8aa 100644 --- a/openapi-specs/compute/33-00/desc/util/twistcli_get.md +++ b/openapi-specs/compute/33-00/desc/util/twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -X GET -o \ 'https:///api/v/util/twistcli' diff --git a/openapi-specs/compute/33-00/desc/util/twistlock_jenkins_plugin_get.md b/openapi-specs/compute/33-00/desc/util/twistlock_jenkins_plugin_get.md index 9fb8d4a02..c9f180e5e 100644 --- a/openapi-specs/compute/33-00/desc/util/twistlock_jenkins_plugin_get.md +++ b/openapi-specs/compute/33-00/desc/util/twistlock_jenkins_plugin_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-jenkins-plugin.hpi \ diff --git a/openapi-specs/compute/33-00/desc/util/twistlock_tas_tile_get.md b/openapi-specs/compute/33-00/desc/util/twistlock_tas_tile_get.md index fea28aaad..3fd114e2d 100644 --- a/openapi-specs/compute/33-00/desc/util/twistlock_tas_tile_get.md +++ b/openapi-specs/compute/33-00/desc/util/twistlock_tas_tile_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-tile.pivotal \ diff --git a/openapi-specs/compute/33-00/desc/util/windows_twistcli_get.md b/openapi-specs/compute/33-00/desc/util/windows_twistcli_get.md index 1c545dbbb..38c609b08 100644 --- a/openapi-specs/compute/33-00/desc/util/windows_twistcli_get.md +++ b/openapi-specs/compute/33-00/desc/util/windows_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Windows platform** hyperlink in **Manage > System > The following cURL command downloads the twistcli binary executable for Windows platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli.exe \ diff --git a/openapi-specs/compute/33-00/desc/version/get.md b/openapi-specs/compute/33-00/desc/version/get.md index 28be315e0..5787e90fd 100644 --- a/openapi-specs/compute/33-00/desc/version/get.md +++ b/openapi-specs/compute/33-00/desc/version/get.md @@ -5,7 +5,7 @@ Retrieves the version number for Console. The following cURL command retrieves the version number for Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/vms/download_get.md b/openapi-specs/compute/33-00/desc/vms/download_get.md index 87a1499c1..5858d4050 100644 --- a/openapi-specs/compute/33-00/desc/vms/download_get.md +++ b/openapi-specs/compute/33-00/desc/vms/download_get.md @@ -9,7 +9,7 @@ Returns all VM image scan reports in CSV format. Refer to the following example cURL command that retrieves all VM image scan reports and saves the results in a CSV file called `vm_images_scan.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/vms/get.md b/openapi-specs/compute/33-00/desc/vms/get.md index e78a28c76..03ed8deb3 100644 --- a/openapi-specs/compute/33-00/desc/vms/get.md +++ b/openapi-specs/compute/33-00/desc/vms/get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > Hosts > VM imag Refer to the following example cURL command that retrieves all VM image scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/vms/labels_get.md b/openapi-specs/compute/33-00/desc/vms/labels_get.md index 0aed1a217..f509da479 100644 --- a/openapi-specs/compute/33-00/desc/vms/labels_get.md +++ b/openapi-specs/compute/33-00/desc/vms/labels_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-00/desc/vms/names_get.md b/openapi-specs/compute/33-00/desc/vms/names_get.md index 1145cfa0d..9f92e0156 100644 --- a/openapi-specs/compute/33-00/desc/vms/names_get.md +++ b/openapi-specs/compute/33-00/desc/vms/names_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/33-00/desc/vms/scan_post.md b/openapi-specs/compute/33-00/desc/vms/scan_post.md index 1caa2dcaf..4d4de3ab1 100644 --- a/openapi-specs/compute/33-00/desc/vms/scan_post.md +++ b/openapi-specs/compute/33-00/desc/vms/scan_post.md @@ -5,7 +5,7 @@ Re-scans all VM images immediately. This endpoint returns the time that the scan Refer to the following example cURL command that forces Prisma Cloud to re-scan all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-00/desc/vms/stop_post.md b/openapi-specs/compute/33-00/desc/vms/stop_post.md index 4a74743eb..49b2b26f9 100644 --- a/openapi-specs/compute/33-00/desc/vms/stop_post.md +++ b/openapi-specs/compute/33-00/desc/vms/stop_post.md @@ -7,7 +7,7 @@ Note: It might take a few minutes for the scan to stop completely. Refer to the following example cURL command that forces Prisma Cloud to stop scanning all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/SCAP/get.md b/openapi-specs/compute/33-01/desc/SCAP/get.md index a25abe94e..f5870d822 100644 --- a/openapi-specs/compute/33-01/desc/SCAP/get.md +++ b/openapi-specs/compute/33-01/desc/SCAP/get.md @@ -3,7 +3,7 @@ This endpoint will return any SCAP datastreams uploaded to the console. This end The following is an example curl command that uses basic auth to retrieve any uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/SCAP/id_delete.md b/openapi-specs/compute/33-01/desc/SCAP/id_delete.md index 39f1b0132..52923f20a 100644 --- a/openapi-specs/compute/33-01/desc/SCAP/id_delete.md +++ b/openapi-specs/compute/33-01/desc/SCAP/id_delete.md @@ -3,7 +3,7 @@ This endpoint will delete any SCAP datastreams uploaded to the console. You can The following is an example curl command that uses basic auth to delete an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-01/desc/SCAP/post.md b/openapi-specs/compute/33-01/desc/SCAP/post.md index d459a0e97..c45fd6b4e 100644 --- a/openapi-specs/compute/33-01/desc/SCAP/post.md +++ b/openapi-specs/compute/33-01/desc/SCAP/post.md @@ -3,7 +3,7 @@ This endpoint will allow you to add a SCAP datastream to the console. The following is an example curl command that uses basic auth to add an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/_ping/get.md b/openapi-specs/compute/33-01/desc/_ping/get.md index 8e143ef67..b7ffdc653 100644 --- a/openapi-specs/compute/33-01/desc/_ping/get.md +++ b/openapi-specs/compute/33-01/desc/_ping/get.md @@ -5,7 +5,7 @@ Checks if Console is reachable from your network host. Refer to the following cURL example command that pings Console and prints the HTTP response code: ```bash -$ curl -k \ +$ curl \ -s \ -o /dev/null \ -w "%{http_code}\n" \ diff --git a/openapi-specs/compute/33-01/desc/agentless/get_agentless_progress.md b/openapi-specs/compute/33-01/desc/agentless/get_agentless_progress.md index b98ed9da5..78396eec6 100644 --- a/openapi-specs/compute/33-01/desc/agentless/get_agentless_progress.md +++ b/openapi-specs/compute/33-01/desc/agentless/get_agentless_progress.md @@ -5,7 +5,7 @@ Shows the progress of an ongoing scan on hosts or containers for vulnerabilities Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/agentless/post_agentless_scan.md b/openapi-specs/compute/33-01/desc/agentless/post_agentless_scan.md index f1295cdc4..e2f8a4e11 100644 --- a/openapi-specs/compute/33-01/desc/agentless/post_agentless_scan.md +++ b/openapi-specs/compute/33-01/desc/agentless/post_agentless_scan.md @@ -9,7 +9,7 @@ Make sure that you download (use the agentless/templates API) and apply the perm Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/agentless/post_agentless_stop.md b/openapi-specs/compute/33-01/desc/agentless/post_agentless_stop.md index ab83960cc..ddee6ec7a 100644 --- a/openapi-specs/compute/33-01/desc/agentless/post_agentless_stop.md +++ b/openapi-specs/compute/33-01/desc/agentless/post_agentless_stop.md @@ -5,7 +5,7 @@ Stops an ongoing scan on hosts or containers for vulnerabilities and compliance. Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/agentless/post_agentless_templates.md b/openapi-specs/compute/33-01/desc/agentless/post_agentless_templates.md index 96be32555..5159c439a 100644 --- a/openapi-specs/compute/33-01/desc/agentless/post_agentless_templates.md +++ b/openapi-specs/compute/33-01/desc/agentless/post_agentless_templates.md @@ -31,7 +31,7 @@ Add the supported cloud accounts (AWS, Azure, GCP, and OCI) in Prisma Cloud Comp Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/alert-profiles/get.md b/openapi-specs/compute/33-01/desc/alert-profiles/get.md index 82647e248..f17191ac4 100644 --- a/openapi-specs/compute/33-01/desc/alert-profiles/get.md +++ b/openapi-specs/compute/33-01/desc/alert-profiles/get.md @@ -3,7 +3,7 @@ Retrieve a list of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/alert-profiles/id_delete.md b/openapi-specs/compute/33-01/desc/alert-profiles/id_delete.md index 1a67fe20e..2cf21b57e 100644 --- a/openapi-specs/compute/33-01/desc/alert-profiles/id_delete.md +++ b/openapi-specs/compute/33-01/desc/alert-profiles/id_delete.md @@ -5,7 +5,7 @@ This method has no response data. The following example curl command deletes an existing alert profile named `PROFILE-NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-01/desc/alert-profiles/names_get.md b/openapi-specs/compute/33-01/desc/alert-profiles/names_get.md index cac14437b..38a1f78ca 100644 --- a/openapi-specs/compute/33-01/desc/alert-profiles/names_get.md +++ b/openapi-specs/compute/33-01/desc/alert-profiles/names_get.md @@ -3,7 +3,7 @@ Retrieve a list of only the names of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles' names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/alert-profiles/post.md b/openapi-specs/compute/33-01/desc/alert-profiles/post.md index 9fa643429..19db863d5 100644 --- a/openapi-specs/compute/33-01/desc/alert-profiles/post.md +++ b/openapi-specs/compute/33-01/desc/alert-profiles/post.md @@ -3,7 +3,7 @@ Update an existing alert profile created in the system. The following example curl command uses basic auth to add a Jira Alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/alert-profiles/test_post.md b/openapi-specs/compute/33-01/desc/alert-profiles/test_post.md index 1fc745efa..2205a6e73 100644 --- a/openapi-specs/compute/33-01/desc/alert-profiles/test_post.md +++ b/openapi-specs/compute/33-01/desc/alert-profiles/test_post.md @@ -3,7 +3,7 @@ Sends a test alert to verify successful configuration of the alert profile setti The following example curl command uses basic auth to send test alert for an email alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/application-control/get.md b/openapi-specs/compute/33-01/desc/application-control/get.md index 5bd600beb..535584284 100644 --- a/openapi-specs/compute/33-01/desc/application-control/get.md +++ b/openapi-specs/compute/33-01/desc/application-control/get.md @@ -3,7 +3,7 @@ Retrieves the host application control rules. The following example curl command uses basic auth to retrieve the control rules: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/access_delete.md b/openapi-specs/compute/33-01/desc/audits/access_delete.md index 37f33ca64..0450b534c 100644 --- a/openapi-specs/compute/33-01/desc/audits/access_delete.md +++ b/openapi-specs/compute/33-01/desc/audits/access_delete.md @@ -2,7 +2,7 @@ Deletes **all** access audits. This deletion cannot be undone. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-01/desc/audits/access_download_get.md b/openapi-specs/compute/33-01/desc/audits/access_download_get.md index 1700deb8d..8d8fee259 100644 --- a/openapi-specs/compute/33-01/desc/audits/access_download_get.md +++ b/openapi-specs/compute/33-01/desc/audits/access_download_get.md @@ -3,7 +3,7 @@ Returns the docker access audit events data in CSV format that are logged and ag **Note**: You can download the access events from Console under **Monitor > Events > Docker audits > Download CSV**. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/access_filters_get.md b/openapi-specs/compute/33-01/desc/audits/access_filters_get.md index 00ac061c1..4b8e9cd9b 100644 --- a/openapi-specs/compute/33-01/desc/audits/access_filters_get.md +++ b/openapi-specs/compute/33-01/desc/audits/access_filters_get.md @@ -5,7 +5,7 @@ The following example uses basic auth to list history of commands that are run o ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ The following command gives list of sudo events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -27,7 +27,7 @@ $ curl -k \ The following command gives list of SSHD events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/access_get.md b/openapi-specs/compute/33-01/desc/audits/access_get.md index 2401391c7..56e53fe12 100644 --- a/openapi-specs/compute/33-01/desc/audits/access_get.md +++ b/openapi-specs/compute/33-01/desc/audits/access_get.md @@ -8,7 +8,7 @@ You can configure Prisma Cloud Compute to log and aggregate events such as sudo Refer to the following example cURL command that gives a list of all access audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/admission_download_get.md b/openapi-specs/compute/33-01/desc/audits/admission_download_get.md index 9571c483f..d45f47c4e 100644 --- a/openapi-specs/compute/33-01/desc/audits/admission_download_get.md +++ b/openapi-specs/compute/33-01/desc/audits/admission_download_get.md @@ -4,7 +4,7 @@ Returns the access admission events data in CSV format that were alerted or bloc Refer to the following example cURL command that downloads the admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/admission_get.md b/openapi-specs/compute/33-01/desc/audits/admission_get.md index 84414496c..3640c737c 100644 --- a/openapi-specs/compute/33-01/desc/audits/admission_get.md +++ b/openapi-specs/compute/33-01/desc/audits/admission_get.md @@ -4,7 +4,7 @@ Returns all activities that were alerted or blocked by Defender functioning as O Refer to the following example cURL command that gives a list of all admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/firewall_network_container_download_get.md b/openapi-specs/compute/33-01/desc/audits/firewall_network_container_download_get.md index 29029ac6d..434e09acd 100644 --- a/openapi-specs/compute/33-01/desc/audits/firewall_network_container_download_get.md +++ b/openapi-specs/compute/33-01/desc/audits/firewall_network_container_download_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/firewall_network_container_get.md b/openapi-specs/compute/33-01/desc/audits/firewall_network_container_get.md index 454558a44..be03b2c45 100644 --- a/openapi-specs/compute/33-01/desc/audits/firewall_network_container_get.md +++ b/openapi-specs/compute/33-01/desc/audits/firewall_network_container_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/firewall_network_host_download_get.md b/openapi-specs/compute/33-01/desc/audits/firewall_network_host_download_get.md index 768dd00d7..e83e8e1c3 100644 --- a/openapi-specs/compute/33-01/desc/audits/firewall_network_host_download_get.md +++ b/openapi-specs/compute/33-01/desc/audits/firewall_network_host_download_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/firewall_network_host_get.md b/openapi-specs/compute/33-01/desc/audits/firewall_network_host_get.md index e5dc4c399..6cbda0d4b 100644 --- a/openapi-specs/compute/33-01/desc/audits/firewall_network_host_get.md +++ b/openapi-specs/compute/33-01/desc/audits/firewall_network_host_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/incidents_archive_patch.md b/openapi-specs/compute/33-01/desc/audits/incidents_archive_patch.md index a1127a001..d1f42eedd 100644 --- a/openapi-specs/compute/33-01/desc/audits/incidents_archive_patch.md +++ b/openapi-specs/compute/33-01/desc/audits/incidents_archive_patch.md @@ -7,7 +7,7 @@ You can get an incident ID from the list of incidents using the endpoint GET /ap Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/compute/33-01/desc/audits/incidents_download_get.md b/openapi-specs/compute/33-01/desc/audits/incidents_download_get.md index 2266c3471..5958756bf 100644 --- a/openapi-specs/compute/33-01/desc/audits/incidents_download_get.md +++ b/openapi-specs/compute/33-01/desc/audits/incidents_download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the **CSV** hyperlink in **Monitor > Runtime > Incident ex The following cURL command downloads all incidents and saves the result in a CSV file called `incidents.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/incidents_filters_get.md b/openapi-specs/compute/33-01/desc/audits/incidents_filters_get.md index 7d1c6f303..856881c90 100644 --- a/openapi-specs/compute/33-01/desc/audits/incidents_filters_get.md +++ b/openapi-specs/compute/33-01/desc/audits/incidents_filters_get.md @@ -3,7 +3,7 @@ This endpoint lists the incident categories found in your environment. The following example lists incident filters. ```bash -$ curl -k \ +$ curl \ -u \ https://console:8083/api/v1/audits/incidents/filters ``` diff --git a/openapi-specs/compute/33-01/desc/audits/incidents_get.md b/openapi-specs/compute/33-01/desc/audits/incidents_get.md index 7724a08c1..9b9451821 100644 --- a/openapi-specs/compute/33-01/desc/audits/incidents_get.md +++ b/openapi-specs/compute/33-01/desc/audits/incidents_get.md @@ -9,7 +9,7 @@ This endpoint maps to the table in **Monitor > Runtime > Incident explorer** in Refer to the following example cURL command that retrieves a list of unacknowledged incidents (not in the archived state): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/kubernetes_download_get.md b/openapi-specs/compute/33-01/desc/audits/kubernetes_download_get.md index 6008bd92a..62992095c 100644 --- a/openapi-specs/compute/33-01/desc/audits/kubernetes_download_get.md +++ b/openapi-specs/compute/33-01/desc/audits/kubernetes_download_get.md @@ -7,7 +7,7 @@ Returns the audit events data that occur in an integrated Kubernetes cluster tha Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/kubernetes_get.md b/openapi-specs/compute/33-01/desc/audits/kubernetes_get.md index e1ecb8a88..2e3f51b71 100644 --- a/openapi-specs/compute/33-01/desc/audits/kubernetes_get.md +++ b/openapi-specs/compute/33-01/desc/audits/kubernetes_get.md @@ -7,7 +7,7 @@ Retrieves events that occur in an integrated Kubernetes cluster that you configu Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/mgmt_download_get.md b/openapi-specs/compute/33-01/desc/audits/mgmt_download_get.md index ae3ef45b6..bcee17342 100644 --- a/openapi-specs/compute/33-01/desc/audits/mgmt_download_get.md +++ b/openapi-specs/compute/33-01/desc/audits/mgmt_download_get.md @@ -10,7 +10,7 @@ Management audits are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/mgmt_filters_get.md b/openapi-specs/compute/33-01/desc/audits/mgmt_filters_get.md index 854977b99..f910a4c2a 100644 --- a/openapi-specs/compute/33-01/desc/audits/mgmt_filters_get.md +++ b/openapi-specs/compute/33-01/desc/audits/mgmt_filters_get.md @@ -6,7 +6,7 @@ Use these filters to query management audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/mgmt_get.md b/openapi-specs/compute/33-01/desc/audits/mgmt_get.md index 5b586cb5e..abe802348 100644 --- a/openapi-specs/compute/33-01/desc/audits/mgmt_get.md +++ b/openapi-specs/compute/33-01/desc/audits/mgmt_get.md @@ -10,7 +10,7 @@ Management audit events are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/runtime_app_embedded_download_get.md b/openapi-specs/compute/33-01/desc/audits/runtime_app_embedded_download_get.md index f3d844ead..ec5ae0f2a 100644 --- a/openapi-specs/compute/33-01/desc/audits/runtime_app_embedded_download_get.md +++ b/openapi-specs/compute/33-01/desc/audits/runtime_app_embedded_download_get.md @@ -5,7 +5,7 @@ Returns the app-embedded runtime audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/runtime_app_embedded_get.md b/openapi-specs/compute/33-01/desc/audits/runtime_app_embedded_get.md index c1d72acfa..51a43b7f5 100644 --- a/openapi-specs/compute/33-01/desc/audits/runtime_app_embedded_get.md +++ b/openapi-specs/compute/33-01/desc/audits/runtime_app_embedded_get.md @@ -5,7 +5,7 @@ Retrieves all app-embedded runtime audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/runtime_container_delete.md b/openapi-specs/compute/33-01/desc/audits/runtime_container_delete.md index ddc8e82d6..62050c71f 100644 --- a/openapi-specs/compute/33-01/desc/audits/runtime_container_delete.md +++ b/openapi-specs/compute/33-01/desc/audits/runtime_container_delete.md @@ -3,7 +3,7 @@ Deletes all container runtime audits. The following example curl command uses basic auth to delete all the audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-01/desc/audits/runtime_container_download_get.md b/openapi-specs/compute/33-01/desc/audits/runtime_container_download_get.md index 20e673b5e..81286d929 100644 --- a/openapi-specs/compute/33-01/desc/audits/runtime_container_download_get.md +++ b/openapi-specs/compute/33-01/desc/audits/runtime_container_download_get.md @@ -6,7 +6,7 @@ Returns the container audit events data in CSV format when a runtime sensor such Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o \ diff --git a/openapi-specs/compute/33-01/desc/audits/runtime_container_get.md b/openapi-specs/compute/33-01/desc/audits/runtime_container_get.md index 11beffb24..a6b6ba484 100644 --- a/openapi-specs/compute/33-01/desc/audits/runtime_container_get.md +++ b/openapi-specs/compute/33-01/desc/audits/runtime_container_get.md @@ -7,7 +7,7 @@ Retrieves all container audit events when a runtime sensor such as process, netw Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/runtime_container_timeslice_get.md b/openapi-specs/compute/33-01/desc/audits/runtime_container_timeslice_get.md index f65d477af..01df48f28 100644 --- a/openapi-specs/compute/33-01/desc/audits/runtime_container_timeslice_get.md +++ b/openapi-specs/compute/33-01/desc/audits/runtime_container_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/runtime_file-integrity_download_get.md b/openapi-specs/compute/33-01/desc/audits/runtime_file-integrity_download_get.md index 99ec70c52..234c3ce32 100644 --- a/openapi-specs/compute/33-01/desc/audits/runtime_file-integrity_download_get.md +++ b/openapi-specs/compute/33-01/desc/audits/runtime_file-integrity_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for file-integrity checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/runtime_file-integrity_get.md b/openapi-specs/compute/33-01/desc/audits/runtime_file-integrity_get.md index 53fec9f9f..c31904422 100644 --- a/openapi-specs/compute/33-01/desc/audits/runtime_file-integrity_get.md +++ b/openapi-specs/compute/33-01/desc/audits/runtime_file-integrity_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for file-integrity checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/runtime_host_delete.md b/openapi-specs/compute/33-01/desc/audits/runtime_host_delete.md index 0ab1c877e..2ada9b15a 100644 --- a/openapi-specs/compute/33-01/desc/audits/runtime_host_delete.md +++ b/openapi-specs/compute/33-01/desc/audits/runtime_host_delete.md @@ -3,7 +3,7 @@ Deletes all host audits from the database. The following example curl command uses basic auth to delete all host audits: ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/audits/runtime/host diff --git a/openapi-specs/compute/33-01/desc/audits/runtime_host_download_get.md b/openapi-specs/compute/33-01/desc/audits/runtime_host_download_get.md index 4d0454f56..d85cc39d0 100644 --- a/openapi-specs/compute/33-01/desc/audits/runtime_host_download_get.md +++ b/openapi-specs/compute/33-01/desc/audits/runtime_host_download_get.md @@ -5,7 +5,7 @@ Returns the runtime host audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/runtime_host_get.md b/openapi-specs/compute/33-01/desc/audits/runtime_host_get.md index 044b8b42d..e063550d6 100644 --- a/openapi-specs/compute/33-01/desc/audits/runtime_host_get.md +++ b/openapi-specs/compute/33-01/desc/audits/runtime_host_get.md @@ -5,7 +5,7 @@ Retrieves the runtime host audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/runtime_host_timeslice_get.md b/openapi-specs/compute/33-01/desc/audits/runtime_host_timeslice_get.md index 8933efa74..aafd869b8 100644 --- a/openapi-specs/compute/33-01/desc/audits/runtime_host_timeslice_get.md +++ b/openapi-specs/compute/33-01/desc/audits/runtime_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/runtime_log-inspection_download_get.md b/openapi-specs/compute/33-01/desc/audits/runtime_log-inspection_download_get.md index f047ed96f..0aa1a5710 100644 --- a/openapi-specs/compute/33-01/desc/audits/runtime_log-inspection_download_get.md +++ b/openapi-specs/compute/33-01/desc/audits/runtime_log-inspection_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for log inspection checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/runtime_log-inspection_get.md b/openapi-specs/compute/33-01/desc/audits/runtime_log-inspection_get.md index 49f0d7be4..8292b623e 100644 --- a/openapi-specs/compute/33-01/desc/audits/runtime_log-inspection_get.md +++ b/openapi-specs/compute/33-01/desc/audits/runtime_log-inspection_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for log inspection checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/runtime_rasp_delete.md b/openapi-specs/compute/33-01/desc/audits/runtime_rasp_delete.md index 688e04038..14315c55b 100644 --- a/openapi-specs/compute/33-01/desc/audits/runtime_rasp_delete.md +++ b/openapi-specs/compute/33-01/desc/audits/runtime_rasp_delete.md @@ -1,7 +1,7 @@ Deletes all RASP Defender runtime audits. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-01/desc/audits/runtime_rasp_download_get.md b/openapi-specs/compute/33-01/desc/audits/runtime_rasp_download_get.md index 303c75858..11a85100d 100644 --- a/openapi-specs/compute/33-01/desc/audits/runtime_rasp_download_get.md +++ b/openapi-specs/compute/33-01/desc/audits/runtime_rasp_download_get.md @@ -1,7 +1,7 @@ Returns CSV data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/runtime_rasp_get.md b/openapi-specs/compute/33-01/desc/audits/runtime_rasp_get.md index 229d908b1..0475cb149 100644 --- a/openapi-specs/compute/33-01/desc/audits/runtime_rasp_get.md +++ b/openapi-specs/compute/33-01/desc/audits/runtime_rasp_get.md @@ -1,7 +1,7 @@ Returns JSON data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/runtime_serverless_delete.md b/openapi-specs/compute/33-01/desc/audits/runtime_serverless_delete.md index 99ada0515..e27ebe858 100644 --- a/openapi-specs/compute/33-01/desc/audits/runtime_serverless_delete.md +++ b/openapi-specs/compute/33-01/desc/audits/runtime_serverless_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to delete the current audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-01/desc/audits/runtime_serverless_download_get.md b/openapi-specs/compute/33-01/desc/audits/runtime_serverless_download_get.md index f829d2342..91693c145 100644 --- a/openapi-specs/compute/33-01/desc/audits/runtime_serverless_download_get.md +++ b/openapi-specs/compute/33-01/desc/audits/runtime_serverless_download_get.md @@ -5,7 +5,7 @@ Returns the scan audit events data in CSV format for any configured serverless f Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/runtime_serverless_filters_get.md b/openapi-specs/compute/33-01/desc/audits/runtime_serverless_filters_get.md index b9bf38610..babda78dd 100644 --- a/openapi-specs/compute/33-01/desc/audits/runtime_serverless_filters_get.md +++ b/openapi-specs/compute/33-01/desc/audits/runtime_serverless_filters_get.md @@ -2,7 +2,7 @@ Returns all serverless filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/runtime_serverless_get.md b/openapi-specs/compute/33-01/desc/audits/runtime_serverless_get.md index 045946886..f6aeb748e 100644 --- a/openapi-specs/compute/33-01/desc/audits/runtime_serverless_get.md +++ b/openapi-specs/compute/33-01/desc/audits/runtime_serverless_get.md @@ -5,7 +5,7 @@ Retrieves all scan events for any configured serverless functions in Prisma Clou Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/runtime_serverless_timeslice_get.md b/openapi-specs/compute/33-01/desc/audits/runtime_serverless_timeslice_get.md index 863890174..a2456cec0 100644 --- a/openapi-specs/compute/33-01/desc/audits/runtime_serverless_timeslice_get.md +++ b/openapi-specs/compute/33-01/desc/audits/runtime_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/trust_delete.md b/openapi-specs/compute/33-01/desc/audits/trust_delete.md index 0bfb2bd81..4aaeef3fe 100644 --- a/openapi-specs/compute/33-01/desc/audits/trust_delete.md +++ b/openapi-specs/compute/33-01/desc/audits/trust_delete.md @@ -1,7 +1,7 @@ Deletes all the trust audits from the events page in Console. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-01/desc/audits/trust_download_get.md b/openapi-specs/compute/33-01/desc/audits/trust_download_get.md index 21c0e55a2..234089449 100644 --- a/openapi-specs/compute/33-01/desc/audits/trust_download_get.md +++ b/openapi-specs/compute/33-01/desc/audits/trust_download_get.md @@ -5,7 +5,7 @@ Returns the trust audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/trust_get.md b/openapi-specs/compute/33-01/desc/audits/trust_get.md index 8fb3a341d..de7d47e96 100644 --- a/openapi-specs/compute/33-01/desc/audits/trust_get.md +++ b/openapi-specs/compute/33-01/desc/audits/trust_get.md @@ -4,7 +4,7 @@ Retrieves all the trust audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/waas_agentless_download_get.md b/openapi-specs/compute/33-01/desc/audits/waas_agentless_download_get.md index bbfcd12f5..f930ef6b3 100644 --- a/openapi-specs/compute/33-01/desc/audits/waas_agentless_download_get.md +++ b/openapi-specs/compute/33-01/desc/audits/waas_agentless_download_get.md @@ -7,7 +7,7 @@ Returns the agentless Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/waas_agentless_get.md b/openapi-specs/compute/33-01/desc/audits/waas_agentless_get.md index ad40ae497..b257b0385 100644 --- a/openapi-specs/compute/33-01/desc/audits/waas_agentless_get.md +++ b/openapi-specs/compute/33-01/desc/audits/waas_agentless_get.md @@ -7,7 +7,7 @@ Retrieves all agentless Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/waas_agentless_timeslice_get.md b/openapi-specs/compute/33-01/desc/audits/waas_agentless_timeslice_get.md index 007c6dba3..3eaf34b25 100644 --- a/openapi-specs/compute/33-01/desc/audits/waas_agentless_timeslice_get.md +++ b/openapi-specs/compute/33-01/desc/audits/waas_agentless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/waas_app_embedded_download_get.md b/openapi-specs/compute/33-01/desc/audits/waas_app_embedded_download_get.md index 149c10376..c94aa87b0 100644 --- a/openapi-specs/compute/33-01/desc/audits/waas_app_embedded_download_get.md +++ b/openapi-specs/compute/33-01/desc/audits/waas_app_embedded_download_get.md @@ -6,7 +6,7 @@ Returns the app-embedded WAAS audit events data in CSV format for the specified Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/waas_app_embedded_get.md b/openapi-specs/compute/33-01/desc/audits/waas_app_embedded_get.md index 400fa447d..6318fb299 100644 --- a/openapi-specs/compute/33-01/desc/audits/waas_app_embedded_get.md +++ b/openapi-specs/compute/33-01/desc/audits/waas_app_embedded_get.md @@ -6,7 +6,7 @@ Returns all app-embedded WAAS audit events for the specified query parameters. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/waas_app_embedded_timeslice_get.md b/openapi-specs/compute/33-01/desc/audits/waas_app_embedded_timeslice_get.md index 79a60038e..42a76d08c 100644 --- a/openapi-specs/compute/33-01/desc/audits/waas_app_embedded_timeslice_get.md +++ b/openapi-specs/compute/33-01/desc/audits/waas_app_embedded_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the app-embedded WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/waas_container_download_get.md b/openapi-specs/compute/33-01/desc/audits/waas_container_download_get.md index 9a5e04fad..7d26c34f4 100644 --- a/openapi-specs/compute/33-01/desc/audits/waas_container_download_get.md +++ b/openapi-specs/compute/33-01/desc/audits/waas_container_download_get.md @@ -6,7 +6,7 @@ Returns the container Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that downloads the WAAS container audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/waas_container_get.md b/openapi-specs/compute/33-01/desc/audits/waas_container_get.md index ac0df80fd..c1ad08f3c 100644 --- a/openapi-specs/compute/33-01/desc/audits/waas_container_get.md +++ b/openapi-specs/compute/33-01/desc/audits/waas_container_get.md @@ -6,7 +6,7 @@ Retrieves all container Web-Application and API Security (WAAS) audits. Refer to the following example cURL command that retrieves all container WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/waas_container_timeslice_get.md b/openapi-specs/compute/33-01/desc/audits/waas_container_timeslice_get.md index a56b4c48f..be56260d6 100644 --- a/openapi-specs/compute/33-01/desc/audits/waas_container_timeslice_get.md +++ b/openapi-specs/compute/33-01/desc/audits/waas_container_timeslice_get.md @@ -11,7 +11,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the container WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s):: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/waas_host_download_get.md b/openapi-specs/compute/33-01/desc/audits/waas_host_download_get.md index 4bc66202b..71692e682 100644 --- a/openapi-specs/compute/33-01/desc/audits/waas_host_download_get.md +++ b/openapi-specs/compute/33-01/desc/audits/waas_host_download_get.md @@ -7,7 +7,7 @@ Returns the host Web-Application and API Security (WAAS) audit events data in CS Refer to the following example cURL command that downloads the host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/waas_host_get.md b/openapi-specs/compute/33-01/desc/audits/waas_host_get.md index 14c967594..f6e3df050 100644 --- a/openapi-specs/compute/33-01/desc/audits/waas_host_get.md +++ b/openapi-specs/compute/33-01/desc/audits/waas_host_get.md @@ -7,7 +7,7 @@ Retrieves all host Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/waas_host_timeslice_get.md b/openapi-specs/compute/33-01/desc/audits/waas_host_timeslice_get.md index e28ed7b7a..67b3a54c3 100644 --- a/openapi-specs/compute/33-01/desc/audits/waas_host_timeslice_get.md +++ b/openapi-specs/compute/33-01/desc/audits/waas_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves host WAAS audit events for a specific time frame: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/waas_serverless_download_get.md b/openapi-specs/compute/33-01/desc/audits/waas_serverless_download_get.md index da05504df..0c0dbe698 100644 --- a/openapi-specs/compute/33-01/desc/audits/waas_serverless_download_get.md +++ b/openapi-specs/compute/33-01/desc/audits/waas_serverless_download_get.md @@ -7,7 +7,7 @@ Returns the serverless function Web-Application and API Security (WAAS) audit ev Refer to the following example cURL command that downloads the serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/waas_serverless_get.md b/openapi-specs/compute/33-01/desc/audits/waas_serverless_get.md index fe482a3f3..82488f7ee 100644 --- a/openapi-specs/compute/33-01/desc/audits/waas_serverless_get.md +++ b/openapi-specs/compute/33-01/desc/audits/waas_serverless_get.md @@ -7,7 +7,7 @@ Retrieves all serverless function Web-Application and API Security (WAAS) audit Refer to the following example cURL command that retrieves all serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/audits/waas_serverless_timeslice_get.md b/openapi-specs/compute/33-01/desc/audits/waas_serverless_timeslice_get.md index ec9ff3df1..a0a9a1368 100644 --- a/openapi-specs/compute/33-01/desc/audits/waas_serverless_timeslice_get.md +++ b/openapi-specs/compute/33-01/desc/audits/waas_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the serverless WAAS audit events for a : ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/authenticate-client/post.md b/openapi-specs/compute/33-01/desc/authenticate-client/post.md index bc493d04e..ce6f00afe 100644 --- a/openapi-specs/compute/33-01/desc/authenticate-client/post.md +++ b/openapi-specs/compute/33-01/desc/authenticate-client/post.md @@ -8,7 +8,7 @@ This endpoint checks the supplied client certificate and authorizes the user bas Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X POST \ --cert \ https:///api/v/authenticate-client diff --git a/openapi-specs/compute/33-01/desc/authenticate/post.md b/openapi-specs/compute/33-01/desc/authenticate/post.md index cb018de64..4f85c5d34 100644 --- a/openapi-specs/compute/33-01/desc/authenticate/post.md +++ b/openapi-specs/compute/33-01/desc/authenticate/post.md @@ -9,7 +9,7 @@ You can set the validity period in Console under **Manage > Authentication > Log Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H "Content-Type: application/json" \ -X POST \ -d \ diff --git a/openapi-specs/compute/33-01/desc/authenticate/renew_get.md b/openapi-specs/compute/33-01/desc/authenticate/renew_get.md index 6040d58e1..3458b500a 100644 --- a/openapi-specs/compute/33-01/desc/authenticate/renew_get.md +++ b/openapi-specs/compute/33-01/desc/authenticate/renew_get.md @@ -5,7 +5,7 @@ Renews an old (unexpired) access token and returns a new token. The following cURL command retrieves a new access token using an old access token. ```bash -$ curl -k \ +$ curl \ -H "Authorization: Bearer " \ https:///api/v1/authenticate/renew ``` diff --git a/openapi-specs/compute/33-01/desc/certs/capem_get.md b/openapi-specs/compute/33-01/desc/certs/capem_get.md index f0f0f1bf3..945476c9b 100644 --- a/openapi-specs/compute/33-01/desc/certs/capem_get.md +++ b/openapi-specs/compute/33-01/desc/certs/capem_get.md @@ -5,7 +5,7 @@ Retrieves the Base64-encoded SSL root certificate self-signed by primary certifi Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/certs/client-certs_get.md b/openapi-specs/compute/33-01/desc/certs/client-certs_get.md index d099b3e3d..279d196b1 100644 --- a/openapi-specs/compute/33-01/desc/certs/client-certs_get.md +++ b/openapi-specs/compute/33-01/desc/certs/client-certs_get.md @@ -3,7 +3,7 @@ Downloads a script that installs a client certificate, client private key, and c The following example curl command uses basic auth to download and run the install script for your client certs: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/certs/client-certs.sh | sh diff --git a/openapi-specs/compute/33-01/desc/certs/server-certs_get.md b/openapi-specs/compute/33-01/desc/certs/server-certs_get.md index 0bb13f51d..118a4d9b0 100644 --- a/openapi-specs/compute/33-01/desc/certs/server-certs_get.md +++ b/openapi-specs/compute/33-01/desc/certs/server-certs_get.md @@ -12,7 +12,7 @@ Retrieves the server certificate bundle from Prisma Cloud Compute that contains Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -u \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/cloud/compliance_download_get.md b/openapi-specs/compute/33-01/desc/cloud/compliance_download_get.md index 7b1ec9fea..14f2725b1 100644 --- a/openapi-specs/compute/33-01/desc/cloud/compliance_download_get.md +++ b/openapi-specs/compute/33-01/desc/cloud/compliance_download_get.md @@ -2,7 +2,7 @@ Download all cloud scan data in CSV format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/cloud/compliance_get.md b/openapi-specs/compute/33-01/desc/cloud/compliance_get.md index 48c2fe5bb..ad47e0998 100644 --- a/openapi-specs/compute/33-01/desc/cloud/compliance_get.md +++ b/openapi-specs/compute/33-01/desc/cloud/compliance_get.md @@ -2,7 +2,7 @@ Returns a list of all cloud compliance scan results. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/cloud/compliance_scan_post.md b/openapi-specs/compute/33-01/desc/cloud/compliance_scan_post.md index 7f87bf1f4..7321c3b9d 100644 --- a/openapi-specs/compute/33-01/desc/cloud/compliance_scan_post.md +++ b/openapi-specs/compute/33-01/desc/cloud/compliance_scan_post.md @@ -2,7 +2,7 @@ Initiates a new cloud compliance scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/cloud/compliance_stop_post.md b/openapi-specs/compute/33-01/desc/cloud/compliance_stop_post.md index df0febb56..60c31dc51 100644 --- a/openapi-specs/compute/33-01/desc/cloud/compliance_stop_post.md +++ b/openapi-specs/compute/33-01/desc/cloud/compliance_stop_post.md @@ -2,7 +2,7 @@ Terminates a cloud compliance scan that's in progress.. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/cloud/discovery_download_get.md b/openapi-specs/compute/33-01/desc/cloud/discovery_download_get.md index 44d60a113..a667c8471 100644 --- a/openapi-specs/compute/33-01/desc/cloud/discovery_download_get.md +++ b/openapi-specs/compute/33-01/desc/cloud/discovery_download_get.md @@ -5,7 +5,7 @@ Downloads all cloud scan data in a CSV file. Refer to the following cURL example command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/cloud/discovery_entities_get.md b/openapi-specs/compute/33-01/desc/cloud/discovery_entities_get.md index a7abbdfb6..85f1be971 100644 --- a/openapi-specs/compute/33-01/desc/cloud/discovery_entities_get.md +++ b/openapi-specs/compute/33-01/desc/cloud/discovery_entities_get.md @@ -7,7 +7,7 @@ Use this API endpoint along with the `GET, api/vVERSION/cloud/discovery` to get Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/cloud/discovery_get.md b/openapi-specs/compute/33-01/desc/cloud/discovery_get.md index 28025f140..c2b4c6e3c 100644 --- a/openapi-specs/compute/33-01/desc/cloud/discovery_get.md +++ b/openapi-specs/compute/33-01/desc/cloud/discovery_get.md @@ -8,7 +8,7 @@ Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/cloud/discovery_scan_post.md b/openapi-specs/compute/33-01/desc/cloud/discovery_scan_post.md index 51799ebdb..0717096f8 100644 --- a/openapi-specs/compute/33-01/desc/cloud/discovery_scan_post.md +++ b/openapi-specs/compute/33-01/desc/cloud/discovery_scan_post.md @@ -5,7 +5,7 @@ Initiates a new cloud discovery scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/cloud/discovery_stop_post.md b/openapi-specs/compute/33-01/desc/cloud/discovery_stop_post.md index 6a6c7a5a5..73dbf46e7 100644 --- a/openapi-specs/compute/33-01/desc/cloud/discovery_stop_post.md +++ b/openapi-specs/compute/33-01/desc/cloud/discovery_stop_post.md @@ -5,7 +5,7 @@ Terminates a cloud discovery scan that's in progress. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/cloud/discovery_vms_get.md b/openapi-specs/compute/33-01/desc/cloud/discovery_vms_get.md index 6766f4e5a..2264a27fe 100644 --- a/openapi-specs/compute/33-01/desc/cloud/discovery_vms_get.md +++ b/openapi-specs/compute/33-01/desc/cloud/discovery_vms_get.md @@ -5,7 +5,7 @@ Returns the discovered cloud VM instances. Refer to the following example cURL command that retrieves all the discovered cloud VM instances: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/coderepos/download_get.md b/openapi-specs/compute/33-01/desc/coderepos/download_get.md index 4ec0197bb..b06dd9f17 100644 --- a/openapi-specs/compute/33-01/desc/coderepos/download_get.md +++ b/openapi-specs/compute/33-01/desc/coderepos/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Code re The following cURL command generates a CSV file containing the reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/coderepos/get.md b/openapi-specs/compute/33-01/desc/coderepos/get.md index 54c4e99bf..42dc16fb6 100644 --- a/openapi-specs/compute/33-01/desc/coderepos/get.md +++ b/openapi-specs/compute/33-01/desc/coderepos/get.md @@ -10,7 +10,7 @@ This endpoint maps to the **Code repositories** table in **Monitor > Vulnerabili The following cURL command retrieves all code repository scan reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/collections/get.md b/openapi-specs/compute/33-01/desc/collections/get.md index 99120d17d..5a9e8a50c 100755 --- a/openapi-specs/compute/33-01/desc/collections/get.md +++ b/openapi-specs/compute/33-01/desc/collections/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table in **Manage > Collections and Tags > Collections Refer to the following example cURL command that returns a list of collections: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/collections/name_delete.md b/openapi-specs/compute/33-01/desc/collections/name_delete.md index 3e2debd01..033358000 100755 --- a/openapi-specs/compute/33-01/desc/collections/name_delete.md +++ b/openapi-specs/compute/33-01/desc/collections/name_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that deletes a collection with the name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-01/desc/collections/name_usages_get.md b/openapi-specs/compute/33-01/desc/collections/name_usages_get.md index 5c9c40424..89e383cce 100755 --- a/openapi-specs/compute/33-01/desc/collections/name_usages_get.md +++ b/openapi-specs/compute/33-01/desc/collections/name_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that retrieves all policies with name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/containers/count_get.md b/openapi-specs/compute/33-01/desc/containers/count_get.md index 4c6ecdcb4..aca59a913 100644 --- a/openapi-specs/compute/33-01/desc/containers/count_get.md +++ b/openapi-specs/compute/33-01/desc/containers/count_get.md @@ -5,7 +5,7 @@ Returns an integer representing the number of containers in your environment. Refer to the following example cURL command that returns the number of containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/containers/download_get.md b/openapi-specs/compute/33-01/desc/containers/download_get.md index 5c0811d7c..5ed3fec35 100644 --- a/openapi-specs/compute/33-01/desc/containers/download_get.md +++ b/openapi-specs/compute/33-01/desc/containers/download_get.md @@ -9,7 +9,7 @@ You can download the container scan reports in CSV format in Console under **Mon Refer to the following example cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/containers/filters_get.md b/openapi-specs/compute/33-01/desc/containers/filters_get.md index c8a1dfca4..6c2777819 100644 --- a/openapi-specs/compute/33-01/desc/containers/filters_get.md +++ b/openapi-specs/compute/33-01/desc/containers/filters_get.md @@ -1,7 +1,7 @@ Returns all container filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/containers/get.md b/openapi-specs/compute/33-01/desc/containers/get.md index 4cacdde60..3de9dd4af 100644 --- a/openapi-specs/compute/33-01/desc/containers/get.md +++ b/openapi-specs/compute/33-01/desc/containers/get.md @@ -16,7 +16,7 @@ Refer to the following available options for the `fields` query parameters: Refer to the following example cURL command that retrieves a scan report for all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -26,7 +26,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a scan report for a container with the collection ``: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/containers/labels_get.md b/openapi-specs/compute/33-01/desc/containers/labels_get.md index eb40a748d..7a63ab6fb 100644 --- a/openapi-specs/compute/33-01/desc/containers/labels_get.md +++ b/openapi-specs/compute/33-01/desc/containers/labels_get.md @@ -1,7 +1,7 @@ Returns an array of strings containing all of the labels. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/containers/names_get.md b/openapi-specs/compute/33-01/desc/containers/names_get.md index 8b32465d5..9025e2e10 100644 --- a/openapi-specs/compute/33-01/desc/containers/names_get.md +++ b/openapi-specs/compute/33-01/desc/containers/names_get.md @@ -5,7 +5,7 @@ Returns an array of strings containing all container names. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/containers/scan_post.md b/openapi-specs/compute/33-01/desc/containers/scan_post.md index 6b2bdaaba..56137cf64 100644 --- a/openapi-specs/compute/33-01/desc/containers/scan_post.md +++ b/openapi-specs/compute/33-01/desc/containers/scan_post.md @@ -4,7 +4,7 @@ This endpoint returns the time that the scans were initiated. The following example command uses curl and basic auth to force Prisma Cloud Compute to re-scan all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/credentials/get.md b/openapi-specs/compute/33-01/desc/credentials/get.md index ee4309dee..b807ce8f3 100644 --- a/openapi-specs/compute/33-01/desc/credentials/get.md +++ b/openapi-specs/compute/33-01/desc/credentials/get.md @@ -6,7 +6,7 @@ This endpoint maps to **Manage > Authentication > Credentials store** in the Con Refer to the following example cURL command that retrieves all credentials: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/credentials/id_delete.md b/openapi-specs/compute/33-01/desc/credentials/id_delete.md index e5c70259e..27f090158 100644 --- a/openapi-specs/compute/33-01/desc/credentials/id_delete.md +++ b/openapi-specs/compute/33-01/desc/credentials/id_delete.md @@ -14,7 +14,7 @@ To invoke this endpoint in the Prisma Cloud Compute user interface: Refer to the following example cURL command that deletes an existing credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-01/desc/credentials/id_usages_get.md b/openapi-specs/compute/33-01/desc/credentials/id_usages_get.md index 76c1099aa..ca2ce6216 100644 --- a/openapi-specs/compute/33-01/desc/credentials/id_usages_get.md +++ b/openapi-specs/compute/33-01/desc/credentials/id_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following cURL command that retrieves all usages for a credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/curl_examples.md b/openapi-specs/compute/33-01/desc/curl_examples.md index 3d4fcd468..745d21db3 100644 --- a/openapi-specs/compute/33-01/desc/curl_examples.md +++ b/openapi-specs/compute/33-01/desc/curl_examples.md @@ -6,7 +6,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -17,7 +17,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -29,7 +29,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/compute/33-01/desc/custom-compliance/get.md b/openapi-specs/compute/33-01/desc/custom-compliance/get.md index 9022a87b7..9dddcff4e 100644 --- a/openapi-specs/compute/33-01/desc/custom-compliance/get.md +++ b/openapi-specs/compute/33-01/desc/custom-compliance/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example curl command that gets the list of custom compliance checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/custom-compliance/id_delete.md b/openapi-specs/compute/33-01/desc/custom-compliance/id_delete.md index 72c7183ee..f6536e51d 100644 --- a/openapi-specs/compute/33-01/desc/custom-compliance/id_delete.md +++ b/openapi-specs/compute/33-01/desc/custom-compliance/id_delete.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example cURL command that uses basic auth to delete the compliance check with id 9000: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-01/desc/custom-compliance/put.md b/openapi-specs/compute/33-01/desc/custom-compliance/put.md index 480e41b54..b8760a11f 100644 --- a/openapi-specs/compute/33-01/desc/custom-compliance/put.md +++ b/openapi-specs/compute/33-01/desc/custom-compliance/put.md @@ -21,7 +21,7 @@ Create `custom_check.json` file (example): Refer to the following example curl command that uses basic auth to update the checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-01/desc/custom-rules/get.md b/openapi-specs/compute/33-01/desc/custom-rules/get.md index f0385f81a..f77924be8 100644 --- a/openapi-specs/compute/33-01/desc/custom-rules/get.md +++ b/openapi-specs/compute/33-01/desc/custom-rules/get.md @@ -7,7 +7,7 @@ This endpoint maps to the policy table in **Defend > Custom rules** in the Conso Refer to the following example cURL command that retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/custom-rules/id_delete.md b/openapi-specs/compute/33-01/desc/custom-rules/id_delete.md index c0d6dc8b0..01412abf3 100644 --- a/openapi-specs/compute/33-01/desc/custom-rules/id_delete.md +++ b/openapi-specs/compute/33-01/desc/custom-rules/id_delete.md @@ -5,7 +5,7 @@ Deletes a custom rule. Refer to the following example cURL command that deletes a custom rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-01/desc/cves/distribution_get.md b/openapi-specs/compute/33-01/desc/cves/distribution_get.md index aecddce23..7365e1a5e 100644 --- a/openapi-specs/compute/33-01/desc/cves/distribution_get.md +++ b/openapi-specs/compute/33-01/desc/cves/distribution_get.md @@ -3,7 +3,7 @@ Retrieves CVEs from the vulnerability database grouped into distribution where y The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/cves/get.md b/openapi-specs/compute/33-01/desc/cves/get.md index 469ea4b28..f81223298 100644 --- a/openapi-specs/compute/33-01/desc/cves/get.md +++ b/openapi-specs/compute/33-01/desc/cves/get.md @@ -6,7 +6,7 @@ A null response indicates that the CVE is not in our database. The following example curl command queries the Prisma Cloud Compute database for `CVE-2018-1102`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/defenders/app_embedded_post.md b/openapi-specs/compute/33-01/desc/defenders/app_embedded_post.md index 9167469d0..7999cbadb 100644 --- a/openapi-specs/compute/33-01/desc/defenders/app_embedded_post.md +++ b/openapi-specs/compute/33-01/desc/defenders/app_embedded_post.md @@ -5,7 +5,7 @@ Creates an augmented Dockerfile with Defender and dependencies included as a ZIP Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/defenders/daemonset_yaml_get.md b/openapi-specs/compute/33-01/desc/defenders/daemonset_yaml_get.md index 678901a8a..b68869081 100644 --- a/openapi-specs/compute/33-01/desc/defenders/daemonset_yaml_get.md +++ b/openapi-specs/compute/33-01/desc/defenders/daemonset_yaml_get.md @@ -10,7 +10,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https://:8083/api/v1/defenders/daemonset.yaml?consoleaddr=&listener=none&namespace=twistlock&orchestration=kubernetes' diff --git a/openapi-specs/compute/33-01/desc/defenders/daemonset_yaml_post.md b/openapi-specs/compute/33-01/desc/defenders/daemonset_yaml_post.md index 268e3ba81..af006122b 100644 --- a/openapi-specs/compute/33-01/desc/defenders/daemonset_yaml_post.md +++ b/openapi-specs/compute/33-01/desc/defenders/daemonset_yaml_post.md @@ -5,7 +5,7 @@ Creates a DaemonSet deployment file in YAML format that you can use to deploy De Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/defenders/download_get.md b/openapi-specs/compute/33-01/desc/defenders/download_get.md index 2d9435506..67f08c0e5 100644 --- a/openapi-specs/compute/33-01/desc/defenders/download_get.md +++ b/openapi-specs/compute/33-01/desc/defenders/download_get.md @@ -8,7 +8,7 @@ Use the query parameters to filter what data is returned. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o \ diff --git a/openapi-specs/compute/33-01/desc/defenders/fargate_json_post.md b/openapi-specs/compute/33-01/desc/defenders/fargate_json_post.md index 5128e90a1..e2e4e85ab 100644 --- a/openapi-specs/compute/33-01/desc/defenders/fargate_json_post.md +++ b/openapi-specs/compute/33-01/desc/defenders/fargate_json_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command: Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -23,7 +23,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/defenders/fargate_yaml_post.md b/openapi-specs/compute/33-01/desc/defenders/fargate_yaml_post.md index 9a8306a1b..95560526a 100644 --- a/openapi-specs/compute/33-01/desc/defenders/fargate_yaml_post.md +++ b/openapi-specs/compute/33-01/desc/defenders/fargate_yaml_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.yaml` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/yaml' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/defenders/get.md b/openapi-specs/compute/33-01/desc/defenders/get.md index 471e7ef9d..8d2f5cd4c 100644 --- a/openapi-specs/compute/33-01/desc/defenders/get.md +++ b/openapi-specs/compute/33-01/desc/defenders/get.md @@ -7,7 +7,7 @@ This endpoint maps to the UI Console page in **Manage > Defenders > Defenders**. Refer to the following example cURL command that retrieves all deployed Defenders. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/defenders/helm_get.md b/openapi-specs/compute/33-01/desc/defenders/helm_get.md index b11f9c4b9..487c8b7e8 100644 --- a/openapi-specs/compute/33-01/desc/defenders/helm_get.md +++ b/openapi-specs/compute/33-01/desc/defenders/helm_get.md @@ -13,7 +13,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o twistlock-defender-helm.tar.gz \ diff --git a/openapi-specs/compute/33-01/desc/defenders/helm_post.md b/openapi-specs/compute/33-01/desc/defenders/helm_post.md index 2046e63eb..fb76807ae 100644 --- a/openapi-specs/compute/33-01/desc/defenders/helm_post.md +++ b/openapi-specs/compute/33-01/desc/defenders/helm_post.md @@ -5,7 +5,7 @@ Creates a Helm deployment file that you can use to deploy Defenders to your clus Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/defenders/id_delete.md b/openapi-specs/compute/33-01/desc/defenders/id_delete.md index f637ef850..e3ac52daf 100644 --- a/openapi-specs/compute/33-01/desc/defenders/id_delete.md +++ b/openapi-specs/compute/33-01/desc/defenders/id_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes an existing Defender on a host. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-01/desc/defenders/id_features_post.md b/openapi-specs/compute/33-01/desc/defenders/id_features_post.md index ec8e4c5f3..9b42f5fa0 100644 --- a/openapi-specs/compute/33-01/desc/defenders/id_features_post.md +++ b/openapi-specs/compute/33-01/desc/defenders/id_features_post.md @@ -3,7 +3,7 @@ Updates a deployed Defender's configuration. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/defenders/id_restart_post.md b/openapi-specs/compute/33-01/desc/defenders/id_restart_post.md index da0cc7811..7296a186b 100644 --- a/openapi-specs/compute/33-01/desc/defenders/id_restart_post.md +++ b/openapi-specs/compute/33-01/desc/defenders/id_restart_post.md @@ -3,7 +3,7 @@ Restarts Defender on a given host. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/defenders/id_upgrade_post.md b/openapi-specs/compute/33-01/desc/defenders/id_upgrade_post.md index f0d30d1e9..3e63c6414 100644 --- a/openapi-specs/compute/33-01/desc/defenders/id_upgrade_post.md +++ b/openapi-specs/compute/33-01/desc/defenders/id_upgrade_post.md @@ -7,7 +7,7 @@ Upgrades Defender on ``. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/defenders/image-name_get.md b/openapi-specs/compute/33-01/desc/defenders/image-name_get.md index e81ba3e19..19f360c07 100644 --- a/openapi-specs/compute/33-01/desc/defenders/image-name_get.md +++ b/openapi-specs/compute/33-01/desc/defenders/image-name_get.md @@ -5,7 +5,7 @@ Returns the full Docker image name for Defender. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/defenders/install-bundle_get.md b/openapi-specs/compute/33-01/desc/defenders/install-bundle_get.md index 882d0cd53..9b09e733f 100644 --- a/openapi-specs/compute/33-01/desc/defenders/install-bundle_get.md +++ b/openapi-specs/compute/33-01/desc/defenders/install-bundle_get.md @@ -5,7 +5,7 @@ Returns the certificate bundle that Defender needs to securely connect to Consol Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/defenders/names_get.md b/openapi-specs/compute/33-01/desc/defenders/names_get.md index 728eb6364..6339c1483 100644 --- a/openapi-specs/compute/33-01/desc/defenders/names_get.md +++ b/openapi-specs/compute/33-01/desc/defenders/names_get.md @@ -5,7 +5,7 @@ Retrieves a list of Defender hostnames that can be used as the `{id}` query para Refer to the following example cURL command that retrieves a list of all Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -15,7 +15,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of connected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -25,7 +25,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of disconnected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -37,7 +37,7 @@ The endpoint enlists all the connected and disconnected Defenders if do not spec Refer to the following example cURL command that retrieves a list of Defenders by type: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/defenders/rasp_post.md b/openapi-specs/compute/33-01/desc/defenders/rasp_post.md index 526a9e112..e110044dd 100644 --- a/openapi-specs/compute/33-01/desc/defenders/rasp_post.md +++ b/openapi-specs/compute/33-01/desc/defenders/rasp_post.md @@ -7,7 +7,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o rasp-defender.zip diff --git a/openapi-specs/compute/33-01/desc/defenders/serverless-bundle_post.md b/openapi-specs/compute/33-01/desc/defenders/serverless-bundle_post.md index df4f13e6a..7533e436b 100644 --- a/openapi-specs/compute/33-01/desc/defenders/serverless-bundle_post.md +++ b/openapi-specs/compute/33-01/desc/defenders/serverless-bundle_post.md @@ -5,7 +5,7 @@ Downloads a ZIP file with serverless Defender bundle. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/octet-stream' \ -o serverless_bundle.zip \ diff --git a/openapi-specs/compute/33-01/desc/defenders/summary_get.md b/openapi-specs/compute/33-01/desc/defenders/summary_get.md index 08be4ebc4..e308ef64b 100644 --- a/openapi-specs/compute/33-01/desc/defenders/summary_get.md +++ b/openapi-specs/compute/33-01/desc/defenders/summary_get.md @@ -6,7 +6,7 @@ Lists the number of Defenders in each defender category. Refer to the following example cURL command that retrieves a summary of Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/defenders/upgrade_post.md b/openapi-specs/compute/33-01/desc/defenders/upgrade_post.md index 2f0b4d39e..eacd6b779 100644 --- a/openapi-specs/compute/33-01/desc/defenders/upgrade_post.md +++ b/openapi-specs/compute/33-01/desc/defenders/upgrade_post.md @@ -9,7 +9,7 @@ To upgrade Serverless and Fargate Defenders, re-embed them. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/deployment/daemonsets_deploy_post.md b/openapi-specs/compute/33-01/desc/deployment/daemonsets_deploy_post.md index 94ec9386b..b60f28346 100644 --- a/openapi-specs/compute/33-01/desc/deployment/daemonsets_deploy_post.md +++ b/openapi-specs/compute/33-01/desc/deployment/daemonsets_deploy_post.md @@ -5,7 +5,7 @@ It identifies the cluster's API server, user, and credentials. Use the various request parameters to control the properties of the deployed DaemonSet. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/deployment/daemonsets_get.md b/openapi-specs/compute/33-01/desc/deployment/daemonsets_get.md index a0b7f3798..0385acf75 100644 --- a/openapi-specs/compute/33-01/desc/deployment/daemonsets_get.md +++ b/openapi-specs/compute/33-01/desc/deployment/daemonsets_get.md @@ -3,7 +3,7 @@ You must specify a `credentialID`, of type `kubeconfig`, which identifies your c Credentials are managed in Console's credentials store (`/api/v1/credentials`). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/feeds/custom-vulnerabilities_get.md b/openapi-specs/compute/33-01/desc/feeds/custom-vulnerabilities_get.md index 71834f19d..d661acf55 100644 --- a/openapi-specs/compute/33-01/desc/feeds/custom-vulnerabilities_get.md +++ b/openapi-specs/compute/33-01/desc/feeds/custom-vulnerabilities_get.md @@ -11,7 +11,7 @@ Vulnerability rules can be created using the Prisma Cloud Compute. Refer to the following cURL command that retrieves a list of all the custom vulnerabilities and associated rules. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/feeds/custom-vulnerabilities_put.md b/openapi-specs/compute/33-01/desc/feeds/custom-vulnerabilities_put.md index 4fe1c1898..149ada978 100644 --- a/openapi-specs/compute/33-01/desc/feeds/custom-vulnerabilities_put.md +++ b/openapi-specs/compute/33-01/desc/feeds/custom-vulnerabilities_put.md @@ -5,7 +5,7 @@ Updates all the custom vulnerabilities and associated rules simultaneously for h Refer to the following cURL command that updates a vulnerability for a library named `internal-lib`, and specifies that its versions `1.1` to `1.8` are known to be vulnerable. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -37,7 +37,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: **Note:** You will need `jq` to execute this command. ``` - $ curl -k \ + $ curl \ -u \ https:///api/v/feeds/custom/custom-vulnerabilities \ | jq '.' > custom_vulnerability_rules.json @@ -66,7 +66,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 3. Update the rules by pushing the new JSON payload. **Note:** Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -77,7 +77,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 4. Run the cURL command for the `GET /api/vVERSION/feeds/custom/custom-vulnerabilities` endpoint and you can see that the previously installed rules are now overwritten with your new rules. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/feeds/custom_vulnerabilities_digest_get.md b/openapi-specs/compute/33-01/desc/feeds/custom_vulnerabilities_digest_get.md index 0eb501d9b..02af9a3ab 100644 --- a/openapi-specs/compute/33-01/desc/feeds/custom_vulnerabilities_digest_get.md +++ b/openapi-specs/compute/33-01/desc/feeds/custom_vulnerabilities_digest_get.md @@ -5,7 +5,7 @@ Returns the unique digest for the custom vulnerabilities and associated rules fo The following cURL command retrieves the digest for the configured custom vulnerabilities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/feeds/cve_allow_list_digest_get.md b/openapi-specs/compute/33-01/desc/feeds/cve_allow_list_digest_get.md index e27f21251..911a07fd9 100644 --- a/openapi-specs/compute/33-01/desc/feeds/cve_allow_list_digest_get.md +++ b/openapi-specs/compute/33-01/desc/feeds/cve_allow_list_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the Common Vulnerabilities and Exposures (CVE) a The following cURL command retrieves the digest for the configured CVE allow list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/feeds/cve_allow_list_get.md b/openapi-specs/compute/33-01/desc/feeds/cve_allow_list_get.md index 34fb2c7f8..d73ce17c2 100644 --- a/openapi-specs/compute/33-01/desc/feeds/cve_allow_list_get.md +++ b/openapi-specs/compute/33-01/desc/feeds/cve_allow_list_get.md @@ -5,7 +5,7 @@ Retrieves the globally allow-listed Common Vulnerabilities and Exposures (CVE). The following cURL command retrieves the globally allow-listed CVEs. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/feeds/cve_allow_list_put.md b/openapi-specs/compute/33-01/desc/feeds/cve_allow_list_put.md index 850016965..c4e2ce0af 100644 --- a/openapi-specs/compute/33-01/desc/feeds/cve_allow_list_put.md +++ b/openapi-specs/compute/33-01/desc/feeds/cve_allow_list_put.md @@ -7,7 +7,7 @@ Globally allow-lists a set of Common Vulnerabilities and Exposures (CVE). The following cURL command installs a global CVE allow-list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-01/desc/feeds/ips_digest_get.md b/openapi-specs/compute/33-01/desc/feeds/ips_digest_get.md index d059271ea..ae2a09915 100644 --- a/openapi-specs/compute/33-01/desc/feeds/ips_digest_get.md +++ b/openapi-specs/compute/33-01/desc/feeds/ips_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the list of suspicious or high risk IP endpoints The following cURL command retrieves the digest for the banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/feeds/ips_get.md b/openapi-specs/compute/33-01/desc/feeds/ips_get.md index 381257d47..f51c577a7 100644 --- a/openapi-specs/compute/33-01/desc/feeds/ips_get.md +++ b/openapi-specs/compute/33-01/desc/feeds/ips_get.md @@ -5,7 +5,7 @@ Retrieves the customized list of block-listed suspicious or high-risk IP address The following cURL command retrieves the list of globally block-listed suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/feeds/ips_put.md b/openapi-specs/compute/33-01/desc/feeds/ips_put.md index 6f8fc2419..5bf791044 100644 --- a/openapi-specs/compute/33-01/desc/feeds/ips_put.md +++ b/openapi-specs/compute/33-01/desc/feeds/ips_put.md @@ -7,7 +7,7 @@ Bans a custom list of suspicious or high-risk IP addresses. The following cURL command installs a custom list of banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-01/desc/feeds/malware_digest_get.md b/openapi-specs/compute/33-01/desc/feeds/malware_digest_get.md index 005c476a2..522a59aef 100644 --- a/openapi-specs/compute/33-01/desc/feeds/malware_digest_get.md +++ b/openapi-specs/compute/33-01/desc/feeds/malware_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for all the MD5 signatures of malicious executables The following cURL command retrieves the digest for the configured list for the MD5 signatures of malicious executables. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/feeds/malware_get.md b/openapi-specs/compute/33-01/desc/feeds/malware_get.md index 2a7aa128b..72bee6594 100644 --- a/openapi-specs/compute/33-01/desc/feeds/malware_get.md +++ b/openapi-specs/compute/33-01/desc/feeds/malware_get.md @@ -5,7 +5,7 @@ Returns the customized list of MD5 signatures of malicious executables. Refer to the following cURL command that retrieves the list of MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/feeds/malware_put.md b/openapi-specs/compute/33-01/desc/feeds/malware_put.md index 7e6ec5da0..176304cb9 100644 --- a/openapi-specs/compute/33-01/desc/feeds/malware_put.md +++ b/openapi-specs/compute/33-01/desc/feeds/malware_put.md @@ -7,7 +7,7 @@ Creates a custom list of malware MD5 signatures of malicious executables. Refer to the following cURL command that installs a custom list of malware MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-01/desc/feeds/refresh_post.md b/openapi-specs/compute/33-01/desc/feeds/refresh_post.md index a83c40d10..1c756edae 100644 --- a/openapi-specs/compute/33-01/desc/feeds/refresh_post.md +++ b/openapi-specs/compute/33-01/desc/feeds/refresh_post.md @@ -1,7 +1,7 @@ Triggers Console to refresh its data from the **Intelligence Stream** ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/forensic/activities_download_get.md b/openapi-specs/compute/33-01/desc/forensic/activities_download_get.md index 8a2dbd926..1918e3790 100644 --- a/openapi-specs/compute/33-01/desc/forensic/activities_download_get.md +++ b/openapi-specs/compute/33-01/desc/forensic/activities_download_get.md @@ -3,7 +3,7 @@ Downloads all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/forensic/activities_get.md b/openapi-specs/compute/33-01/desc/forensic/activities_get.md index c8fb1d0cd..c0761aa60 100644 --- a/openapi-specs/compute/33-01/desc/forensic/activities_get.md +++ b/openapi-specs/compute/33-01/desc/forensic/activities_get.md @@ -3,7 +3,7 @@ Retrieves all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/groups/get.md b/openapi-specs/compute/33-01/desc/groups/get.md index 6a0daa2eb..34a2711e0 100644 --- a/openapi-specs/compute/33-01/desc/groups/get.md +++ b/openapi-specs/compute/33-01/desc/groups/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups. ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/33-01/desc/groups/id_delete.md b/openapi-specs/compute/33-01/desc/groups/id_delete.md index 5962a1135..0c3cfa1cd 100644 --- a/openapi-specs/compute/33-01/desc/groups/id_delete.md +++ b/openapi-specs/compute/33-01/desc/groups/id_delete.md @@ -13,7 +13,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes a collection with the name `{id}`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-01/desc/groups/names.md b/openapi-specs/compute/33-01/desc/groups/names.md index 80f34f536..9c2dd1089 100644 --- a/openapi-specs/compute/33-01/desc/groups/names.md +++ b/openapi-specs/compute/33-01/desc/groups/names.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/33-01/desc/groups/post.md b/openapi-specs/compute/33-01/desc/groups/post.md index d0fc23a6d..ebad011f4 100644 --- a/openapi-specs/compute/33-01/desc/groups/post.md +++ b/openapi-specs/compute/33-01/desc/groups/post.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that creates a new group named `my-group`: ```bash -$ curl -k \ +$ curl \ -X POST \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/33-01/desc/high-availability/get.md b/openapi-specs/compute/33-01/desc/high-availability/get.md index a988d47ef..83d5d9b46 100644 --- a/openapi-specs/compute/33-01/desc/high-availability/get.md +++ b/openapi-specs/compute/33-01/desc/high-availability/get.md @@ -3,7 +3,7 @@ Returns the status of high high availability. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/33-01/desc/hosts/download_get.md b/openapi-specs/compute/33-01/desc/hosts/download_get.md index ab691fb49..34e546573 100644 --- a/openapi-specs/compute/33-01/desc/hosts/download_get.md +++ b/openapi-specs/compute/33-01/desc/hosts/download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Hosts > Refer to the following example cURL command that downloads all host scan reports to a CSV file called `hosts_report.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o hosts_report.csv \ diff --git a/openapi-specs/compute/33-01/desc/hosts/filters_get.md b/openapi-specs/compute/33-01/desc/hosts/filters_get.md index 4bf6df5e6..a39ec8a97 100644 --- a/openapi-specs/compute/33-01/desc/hosts/filters_get.md +++ b/openapi-specs/compute/33-01/desc/hosts/filters_get.md @@ -3,7 +3,7 @@ Returns host filters such as distribution and host name. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/hosts/get.md b/openapi-specs/compute/33-01/desc/hosts/get.md index 43020558a..9bdf69c6c 100644 --- a/openapi-specs/compute/33-01/desc/hosts/get.md +++ b/openapi-specs/compute/33-01/desc/hosts/get.md @@ -37,7 +37,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following cURL command that retrieves all host scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/hosts/info_get.md b/openapi-specs/compute/33-01/desc/hosts/info_get.md index 5b3903b7e..523024735 100644 --- a/openapi-specs/compute/33-01/desc/hosts/info_get.md +++ b/openapi-specs/compute/33-01/desc/hosts/info_get.md @@ -5,7 +5,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/hosts/scan_post.md b/openapi-specs/compute/33-01/desc/hosts/scan_post.md index 6b72cbfa3..0e0e7b074 100644 --- a/openapi-specs/compute/33-01/desc/hosts/scan_post.md +++ b/openapi-specs/compute/33-01/desc/hosts/scan_post.md @@ -3,7 +3,7 @@ Re-scan all hosts immediately. Refer to the following example command that forces Prisma Cloud Compute to re-scan all hosts: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/hosts/scan diff --git a/openapi-specs/compute/33-01/desc/images/defender_layer_get.md b/openapi-specs/compute/33-01/desc/images/defender_layer_get.md index 1dfe3633d..4bb88d62c 100644 --- a/openapi-specs/compute/33-01/desc/images/defender_layer_get.md +++ b/openapi-specs/compute/33-01/desc/images/defender_layer_get.md @@ -5,7 +5,7 @@ Returns the the Prisma Cloud Compute Defender in as a layer that can be used in Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/compute/33-01/desc/images/defender_rasp_get.md b/openapi-specs/compute/33-01/desc/images/defender_rasp_get.md index a8e145ff7..260e271a1 100644 --- a/openapi-specs/compute/33-01/desc/images/defender_rasp_get.md +++ b/openapi-specs/compute/33-01/desc/images/defender_rasp_get.md @@ -3,7 +3,7 @@ Returns the the Prisma Cloud Compute Defender as the RASP Defender A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/compute/33-01/desc/images/download_get.md b/openapi-specs/compute/33-01/desc/images/download_get.md index d0eaceb19..5d4971a46 100644 --- a/openapi-specs/compute/33-01/desc/images/download_get.md +++ b/openapi-specs/compute/33-01/desc/images/download_get.md @@ -16,7 +16,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -27,7 +27,7 @@ $ curl -k \ Refer to the following example cURL command that might be useful for developers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/images/get.md b/openapi-specs/compute/33-01/desc/images/get.md index 3f594c6c8..dcef1b0a4 100644 --- a/openapi-specs/compute/33-01/desc/images/get.md +++ b/openapi-specs/compute/33-01/desc/images/get.md @@ -26,7 +26,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following cURL command that retrieves a compact scan report for all images: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -36,7 +36,7 @@ $ curl -k \ Refer to the following cURL command that retrieves a compact scan report for an Ubuntu image: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -47,7 +47,7 @@ The name query is synonymous with the filter images text field in the Console UI Refer to the following cURL command that retrieves the scan report for an image with the matching SHA-256 hash: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/images/names_get.md b/openapi-specs/compute/33-01/desc/images/names_get.md index 3a234df98..311b33574 100644 --- a/openapi-specs/compute/33-01/desc/images/names_get.md +++ b/openapi-specs/compute/33-01/desc/images/names_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/33-01/desc/images/scan_post.md b/openapi-specs/compute/33-01/desc/images/scan_post.md index 8d802727a..36278249b 100644 --- a/openapi-specs/compute/33-01/desc/images/scan_post.md +++ b/openapi-specs/compute/33-01/desc/images/scan_post.md @@ -5,7 +5,7 @@ Re-scan all images immediately. This endpoint returns the time that the scans we Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all images: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/images/scan diff --git a/openapi-specs/compute/33-01/desc/images/twistlock_defender_tar_gz_get.md b/openapi-specs/compute/33-01/desc/images/twistlock_defender_tar_gz_get.md index 7852e12ba..36fb66ae8 100644 --- a/openapi-specs/compute/33-01/desc/images/twistlock_defender_tar_gz_get.md +++ b/openapi-specs/compute/33-01/desc/images/twistlock_defender_tar_gz_get.md @@ -1,7 +1,7 @@ Download the Container Defender image for Linux platforms. ```bash -$ curl -k \ +$ curl \ -u \ -H "Content-Type: application/octet-stream" \ -o twistlock_defender.tar.gz \ diff --git a/openapi-specs/compute/33-01/desc/intro.md b/openapi-specs/compute/33-01/desc/intro.md index 9038a3734..5b4ed5864 100644 --- a/openapi-specs/compute/33-01/desc/intro.md +++ b/openapi-specs/compute/33-01/desc/intro.md @@ -47,7 +47,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -58,7 +58,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -70,7 +70,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/compute/33-01/desc/kubernetes/scan_post.md b/openapi-specs/compute/33-01/desc/kubernetes/scan_post.md index 15d614c1a..ab74d5d96 100644 --- a/openapi-specs/compute/33-01/desc/kubernetes/scan_post.md +++ b/openapi-specs/compute/33-01/desc/kubernetes/scan_post.md @@ -3,7 +3,7 @@ This endpoint will trigger a Kubernetes scan. The following example curl command uses basic auth to initiate this scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/logs/console_get.md b/openapi-specs/compute/33-01/desc/logs/console_get.md index 80ece6611..113543540 100644 --- a/openapi-specs/compute/33-01/desc/logs/console_get.md +++ b/openapi-specs/compute/33-01/desc/logs/console_get.md @@ -3,7 +3,7 @@ Retrieves the latest Console log messages. The following example curl command retrieves the 10 latest Console log messages: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/logs/defender_download_get.md b/openapi-specs/compute/33-01/desc/logs/defender_download_get.md index 5d6718db0..05bbc6a75 100644 --- a/openapi-specs/compute/33-01/desc/logs/defender_download_get.md +++ b/openapi-specs/compute/33-01/desc/logs/defender_download_get.md @@ -5,7 +5,7 @@ The hostname can be returned from the endpoint `/defenders/names` The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/logs/defender_get.md b/openapi-specs/compute/33-01/desc/logs/defender_get.md index 1e733a746..f2e3b25df 100644 --- a/openapi-specs/compute/33-01/desc/logs/defender_get.md +++ b/openapi-specs/compute/33-01/desc/logs/defender_get.md @@ -7,7 +7,7 @@ Note that you must quote the URL when running the following command. Otherwise the shell misinterprets the ampersand (`&`) as the end of the command, and puts the curl command in the background. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/logs/system_download_get.md b/openapi-specs/compute/33-01/desc/logs/system_download_get.md index 1e5b5b873..43bb0abce 100644 --- a/openapi-specs/compute/33-01/desc/logs/system_download_get.md +++ b/openapi-specs/compute/33-01/desc/logs/system_download_get.md @@ -4,7 +4,7 @@ This endpoint will return the system debug logs with `tar.gz` file extension. The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/pcf-droplets/addresses_get.md b/openapi-specs/compute/33-01/desc/pcf-droplets/addresses_get.md index 257a47455..bb3365015 100644 --- a/openapi-specs/compute/33-01/desc/pcf-droplets/addresses_get.md +++ b/openapi-specs/compute/33-01/desc/pcf-droplets/addresses_get.md @@ -5,7 +5,7 @@ You can also add optional query parameters to this API call, in this example `cl The following example curl command retrieves the list of addresses: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/pcf-droplets/download_get.md b/openapi-specs/compute/33-01/desc/pcf-droplets/download_get.md index ad761e744..ac8546a25 100644 --- a/openapi-specs/compute/33-01/desc/pcf-droplets/download_get.md +++ b/openapi-specs/compute/33-01/desc/pcf-droplets/download_get.md @@ -3,7 +3,7 @@ This endpoint will download the list of configured cloud controller addresses co The following example curl command retrieves the list of addresses and outputs it to a file call `PCF_blobstores.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/pcf-droplets/get.md b/openapi-specs/compute/33-01/desc/pcf-droplets/get.md index 930d16948..aad607cba 100644 --- a/openapi-specs/compute/33-01/desc/pcf-droplets/get.md +++ b/openapi-specs/compute/33-01/desc/pcf-droplets/get.md @@ -3,7 +3,7 @@ This endpoint will return the full metadata of PCF blobstore from page **Monitor The following example curl command will retrieve this: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/pcf-droplets/scan_post.md b/openapi-specs/compute/33-01/desc/pcf-droplets/scan_post.md index 34e75b26c..d9c9df4dd 100644 --- a/openapi-specs/compute/33-01/desc/pcf-droplets/scan_post.md +++ b/openapi-specs/compute/33-01/desc/pcf-droplets/scan_post.md @@ -3,7 +3,7 @@ This endpoint will kick off a scan of the any PCF Blobstores you have configured Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/pcf-droplets/stop_post.md b/openapi-specs/compute/33-01/desc/pcf-droplets/stop_post.md index 94c376972..2c4d5264a 100644 --- a/openapi-specs/compute/33-01/desc/pcf-droplets/stop_post.md +++ b/openapi-specs/compute/33-01/desc/pcf-droplets/stop_post.md @@ -3,7 +3,7 @@ This endpoint will instruct the PFC Defenders to stop scanning. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/policies/compliance_ci_images_get.md b/openapi-specs/compute/33-01/desc/policies/compliance_ci_images_get.md index f97130a97..9a2b2abf5 100644 --- a/openapi-specs/compute/33-01/desc/policies/compliance_ci_images_get.md +++ b/openapi-specs/compute/33-01/desc/policies/compliance_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > CI** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/policies/compliance_ci_serverless_get.md b/openapi-specs/compute/33-01/desc/policies/compliance_ci_serverless_get.md index 59195f070..2f30e2d74 100644 --- a/openapi-specs/compute/33-01/desc/policies/compliance_ci_serverless_get.md +++ b/openapi-specs/compute/33-01/desc/policies/compliance_ci_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Functions > CI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/policies/compliance_container_get.md b/openapi-specs/compute/33-01/desc/policies/compliance_container_get.md index 7f10245ea..657d4f2dd 100644 --- a/openapi-specs/compute/33-01/desc/policies/compliance_container_get.md +++ b/openapi-specs/compute/33-01/desc/policies/compliance_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > Deployed** Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/policies/compliance_container_impacted_get.md b/openapi-specs/compute/33-01/desc/policies/compliance_container_impacted_get.md index 607bfa3c8..de9e0ee77 100644 --- a/openapi-specs/compute/33-01/desc/policies/compliance_container_impacted_get.md +++ b/openapi-specs/compute/33-01/desc/policies/compliance_container_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of containers captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/compliance/container/impacted?ruleName=' diff --git a/openapi-specs/compute/33-01/desc/policies/compliance_host_get.md b/openapi-specs/compute/33-01/desc/policies/compliance_host_get.md index c029ecf7f..a5e429af5 100755 --- a/openapi-specs/compute/33-01/desc/policies/compliance_host_get.md +++ b/openapi-specs/compute/33-01/desc/policies/compliance_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Hosts > Running hosts** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/policies/compliance_serverless_get.md b/openapi-specs/compute/33-01/desc/policies/compliance_serverless_get.md index c7de886c1..f559179f6 100755 --- a/openapi-specs/compute/33-01/desc/policies/compliance_serverless_get.md +++ b/openapi-specs/compute/33-01/desc/policies/compliance_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Functions > Functions** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/policies/compliance_vms_get.md b/openapi-specs/compute/33-01/desc/policies/compliance_vms_get.md index f7d7e1a49..b61d20d9d 100755 --- a/openapi-specs/compute/33-01/desc/policies/compliance_vms_get.md +++ b/openapi-specs/compute/33-01/desc/policies/compliance_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Hosts > VM ima The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/policies/compliance_vms_impacted_get.md b/openapi-specs/compute/33-01/desc/policies/compliance_vms_impacted_get.md index 9cf5b9d03..4ac3f2832 100644 --- a/openapi-specs/compute/33-01/desc/policies/compliance_vms_impacted_get.md +++ b/openapi-specs/compute/33-01/desc/policies/compliance_vms_impacted_get.md @@ -8,7 +8,7 @@ Use query parameters to retrieve the list of impacted resources by *account ID*, Refer to the following example cURL command, which retrieves a list of impacted resources: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/policies/docker_get.md b/openapi-specs/compute/33-01/desc/policies/docker_get.md index f56872c67..e8ab3d5bb 100644 --- a/openapi-specs/compute/33-01/desc/policies/docker_get.md +++ b/openapi-specs/compute/33-01/desc/policies/docker_get.md @@ -3,7 +3,7 @@ Retrieves a list of all access control rules for Docker Engine commands. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/policies/docker_put.md b/openapi-specs/compute/33-01/desc/policies/docker_put.md index 860e2bb1e..a5d0c0230 100644 --- a/openapi-specs/compute/33-01/desc/policies/docker_put.md +++ b/openapi-specs/compute/33-01/desc/policies/docker_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove Docker access control rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/docker \ | jq '.' > docker_access_control_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove Docker access control rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/33-01/desc/policies/firewall_app-embedded_get.md b/openapi-specs/compute/33-01/desc/policies/firewall_app-embedded_get.md index 3da2a7cd6..4e59c4c21 100644 --- a/openapi-specs/compute/33-01/desc/policies/firewall_app-embedded_get.md +++ b/openapi-specs/compute/33-01/desc/policies/firewall_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > App-Embedded** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/policies/firewall_app_container_get.md b/openapi-specs/compute/33-01/desc/policies/firewall_app_container_get.md index 3b8c157fa..f0486aa4c 100644 --- a/openapi-specs/compute/33-01/desc/policies/firewall_app_container_get.md +++ b/openapi-specs/compute/33-01/desc/policies/firewall_app_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Container** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/container' diff --git a/openapi-specs/compute/33-01/desc/policies/firewall_app_host_get.md b/openapi-specs/compute/33-01/desc/policies/firewall_app_host_get.md index adb90128a..75c22add4 100644 --- a/openapi-specs/compute/33-01/desc/policies/firewall_app_host_get.md +++ b/openapi-specs/compute/33-01/desc/policies/firewall_app_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Host** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/policies/firewall_app_network_list_get.md b/openapi-specs/compute/33-01/desc/policies/firewall_app_network_list_get.md index 13f7fb450..5a1f87d85 100644 --- a/openapi-specs/compute/33-01/desc/policies/firewall_app_network_list_get.md +++ b/openapi-specs/compute/33-01/desc/policies/firewall_app_network_list_get.md @@ -11,7 +11,7 @@ This endpoint maps to **Defend > WAAS > Network lists** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/network-list' diff --git a/openapi-specs/compute/33-01/desc/policies/firewall_app_out-of-band_get.md b/openapi-specs/compute/33-01/desc/policies/firewall_app_out-of-band_get.md index d4f72d041..9ae662687 100644 --- a/openapi-specs/compute/33-01/desc/policies/firewall_app_out-of-band_get.md +++ b/openapi-specs/compute/33-01/desc/policies/firewall_app_out-of-band_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/policies/firewall_app_out-of-band_impacted_get.md b/openapi-specs/compute/33-01/desc/policies/firewall_app_out-of-band_impacted_get.md index 25d2c6691..96a427f94 100644 --- a/openapi-specs/compute/33-01/desc/policies/firewall_app_out-of-band_impacted_get.md +++ b/openapi-specs/compute/33-01/desc/policies/firewall_app_out-of-band_impacted_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/policies/firewall_app_rasp_get.md b/openapi-specs/compute/33-01/desc/policies/firewall_app_rasp_get.md index 15d481cf3..a201d3beb 100644 --- a/openapi-specs/compute/33-01/desc/policies/firewall_app_rasp_get.md +++ b/openapi-specs/compute/33-01/desc/policies/firewall_app_rasp_get.md @@ -1,7 +1,7 @@ Retrieves a list of all application firewall (CNAF) rules for RASP. ``` -$ curl -k \ +$ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp ``` diff --git a/openapi-specs/compute/33-01/desc/policies/firewall_app_rasp_put.md b/openapi-specs/compute/33-01/desc/policies/firewall_app_rasp_put.md index 04ba86483..1101c7690 100644 --- a/openapi-specs/compute/33-01/desc/policies/firewall_app_rasp_put.md +++ b/openapi-specs/compute/33-01/desc/policies/firewall_app_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp \ | jq '.' > app_firewall_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/33-01/desc/policies/firewall_app_serverless_get.md b/openapi-specs/compute/33-01/desc/policies/firewall_app_serverless_get.md index d19e909f3..90cac0015 100644 --- a/openapi-specs/compute/33-01/desc/policies/firewall_app_serverless_get.md +++ b/openapi-specs/compute/33-01/desc/policies/firewall_app_serverless_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Serverless** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/serverless' diff --git a/openapi-specs/compute/33-01/desc/policies/firewall_network_container_get.md b/openapi-specs/compute/33-01/desc/policies/firewall_network_container_get.md index 3f1343b53..82e656818 100644 --- a/openapi-specs/compute/33-01/desc/policies/firewall_network_container_get.md +++ b/openapi-specs/compute/33-01/desc/policies/firewall_network_container_get.md @@ -4,7 +4,7 @@ Retrieves a list of all CNNS container and host rules. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/policies/firewall_network_container_put.md b/openapi-specs/compute/33-01/desc/policies/firewall_network_container_put.md index fd9263430..cffb3f1c4 100644 --- a/openapi-specs/compute/33-01/desc/policies/firewall_network_container_put.md +++ b/openapi-specs/compute/33-01/desc/policies/firewall_network_container_put.md @@ -9,7 +9,7 @@ The procedure to add, edit, or remove rules is: Refer to the following example cURL command that retrieves a list of all rules, pretty-print the JSON response, and save the results to a file: ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -26,7 +26,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/33-01/desc/policies/firewall_network_entities_get.md b/openapi-specs/compute/33-01/desc/policies/firewall_network_entities_get.md index 757121f70..28ed8dbcb 100644 --- a/openapi-specs/compute/33-01/desc/policies/firewall_network_entities_get.md +++ b/openapi-specs/compute/33-01/desc/policies/firewall_network_entities_get.md @@ -1,7 +1,7 @@ Retrieves a list of all CNNF network objects. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/policies/firewall_network_entities_put.md b/openapi-specs/compute/33-01/desc/policies/firewall_network_entities_put.md index 83c023286..39044ee10 100644 --- a/openapi-specs/compute/33-01/desc/policies/firewall_network_entities_put.md +++ b/openapi-specs/compute/33-01/desc/policies/firewall_network_entities_put.md @@ -3,7 +3,7 @@ Updates the list of CNNF network objects. The following example curl command updates the network objects. There is an example of all three types (images,subnets, and applications ): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-01/desc/policies/policies.md b/openapi-specs/compute/33-01/desc/policies/policies.md index 69768c03d..97be7b616 100644 --- a/openapi-specs/compute/33-01/desc/policies/policies.md +++ b/openapi-specs/compute/33-01/desc/policies/policies.md @@ -21,7 +21,7 @@ To add, edit, or remove vulnerability rules from a policy: For example, the following cURL command uses basic auth to retrieve a list of all image vulnerability rules, pretty-prints the JSON response, and saves the results to a `vulnerability_rules.json` file. ```bash - $ curl -k \ + $ curl \ -u \ https:///api/v1/policies/runtime/host \ | jq '.' > vulnerability_rules.json @@ -36,7 +36,7 @@ To add, edit, or remove vulnerability rules from a policy: **Note:** Remember to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -107,7 +107,7 @@ Use the `PUT` method to delete all rules by submitting an empty JSON object. For example, to delete all host runtime rules: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-01/desc/policies/runtime_app-embedded_get.md b/openapi-specs/compute/33-01/desc/policies/runtime_app-embedded_get.md index fcf0ba8b9..517b741bb 100755 --- a/openapi-specs/compute/33-01/desc/policies/runtime_app-embedded_get.md +++ b/openapi-specs/compute/33-01/desc/policies/runtime_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > App-Embedded policy** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/policies/runtime_container_get.md b/openapi-specs/compute/33-01/desc/policies/runtime_container_get.md index f1b50b727..65cd10660 100644 --- a/openapi-specs/compute/33-01/desc/policies/runtime_container_get.md +++ b/openapi-specs/compute/33-01/desc/policies/runtime_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Container policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/policies/runtime_container_impacted_get.md b/openapi-specs/compute/33-01/desc/policies/runtime_container_impacted_get.md index 195f75547..e026d33b9 100644 --- a/openapi-specs/compute/33-01/desc/policies/runtime_container_impacted_get.md +++ b/openapi-specs/compute/33-01/desc/policies/runtime_container_impacted_get.md @@ -6,7 +6,7 @@ In the Console UI, you can see how it works by going to the **Defend > Runtime > Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ $ curl -k \ For additional help with your `ruleName`: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/policies/runtime_host_get.md b/openapi-specs/compute/33-01/desc/policies/runtime_host_get.md index 38800596c..559ef690a 100644 --- a/openapi-specs/compute/33-01/desc/policies/runtime_host_get.md +++ b/openapi-specs/compute/33-01/desc/policies/runtime_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Host policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/policies/runtime_rasp_get.md b/openapi-specs/compute/33-01/desc/policies/runtime_rasp_get.md index 5b7a76457..55a6ff05b 100644 --- a/openapi-specs/compute/33-01/desc/policies/runtime_rasp_get.md +++ b/openapi-specs/compute/33-01/desc/policies/runtime_rasp_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your RASP runtime policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/policies/runtime_rasp_put.md b/openapi-specs/compute/33-01/desc/policies/runtime_rasp_put.md index bba60ba81..f71fb4b93 100644 --- a/openapi-specs/compute/33-01/desc/policies/runtime_rasp_put.md +++ b/openapi-specs/compute/33-01/desc/policies/runtime_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve the rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET @@ -24,7 +24,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -H "Content-Type:application/json" \ -X PUT \ diff --git a/openapi-specs/compute/33-01/desc/policies/runtime_serverless_get.md b/openapi-specs/compute/33-01/desc/policies/runtime_serverless_get.md index 44326bbf6..c98489e16 100644 --- a/openapi-specs/compute/33-01/desc/policies/runtime_serverless_get.md +++ b/openapi-specs/compute/33-01/desc/policies/runtime_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Serverless policy** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/policies/secrets_get.md b/openapi-specs/compute/33-01/desc/policies/secrets_get.md index 89e6b9c0e..cb4ecb37c 100644 --- a/openapi-specs/compute/33-01/desc/policies/secrets_get.md +++ b/openapi-specs/compute/33-01/desc/policies/secrets_get.md @@ -3,7 +3,7 @@ Retrieves a list of all secrets rules. The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/policies/secrets diff --git a/openapi-specs/compute/33-01/desc/policies/secrets_put.md b/openapi-specs/compute/33-01/desc/policies/secrets_put.md index 1e8877ca1..04fd41f24 100644 --- a/openapi-specs/compute/33-01/desc/policies/secrets_put.md +++ b/openapi-specs/compute/33-01/desc/policies/secrets_put.md @@ -10,7 +10,7 @@ The procedure to add, edit, or remove secrets rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/secrets \ | jq '.' > secrets_rules.json @@ -24,7 +24,7 @@ The procedure to add, edit, or remove secrets rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/33-01/desc/policies/trust_get.md b/openapi-specs/compute/33-01/desc/policies/trust_get.md index 8de1ba409..0805d6777 100644 --- a/openapi-specs/compute/33-01/desc/policies/trust_get.md +++ b/openapi-specs/compute/33-01/desc/policies/trust_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/policies/trust_put.md b/openapi-specs/compute/33-01/desc/policies/trust_put.md index fccd4b91e..7fec72031 100644 --- a/openapi-specs/compute/33-01/desc/policies/trust_put.md +++ b/openapi-specs/compute/33-01/desc/policies/trust_put.md @@ -1,7 +1,7 @@ Updates the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-01/desc/policies/vulnerability_ci_images_get.md b/openapi-specs/compute/33-01/desc/policies/vulnerability_ci_images_get.md index abc3da8fa..ce0d50a29 100644 --- a/openapi-specs/compute/33-01/desc/policies/vulnerability_ci_images_get.md +++ b/openapi-specs/compute/33-01/desc/policies/vulnerability_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/policies/vulnerability_ci_serverless_get.md b/openapi-specs/compute/33-01/desc/policies/vulnerability_ci_serverless_get.md index 958c86495..6fb5f93ce 100644 --- a/openapi-specs/compute/33-01/desc/policies/vulnerability_ci_serverless_get.md +++ b/openapi-specs/compute/33-01/desc/policies/vulnerability_ci_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/policies/vulnerability_coderepos_get.md b/openapi-specs/compute/33-01/desc/policies/vulnerability_coderepos_get.md index 08dfed8e1..a4ac62f33 100644 --- a/openapi-specs/compute/33-01/desc/policies/vulnerability_coderepos_get.md +++ b/openapi-specs/compute/33-01/desc/policies/vulnerability_coderepos_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Code repositories** in the Co Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/vulnerability/coderepos' diff --git a/openapi-specs/compute/33-01/desc/policies/vulnerability_coderepos_impacted_get.md b/openapi-specs/compute/33-01/desc/policies/vulnerability_coderepos_impacted_get.md index a401a12c4..e64ef768e 100644 --- a/openapi-specs/compute/33-01/desc/policies/vulnerability_coderepos_impacted_get.md +++ b/openapi-specs/compute/33-01/desc/policies/vulnerability_coderepos_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/coderepos/impacted?project=&ruleName=' ``` diff --git a/openapi-specs/compute/33-01/desc/policies/vulnerability_coderepos_put.md b/openapi-specs/compute/33-01/desc/policies/vulnerability_coderepos_put.md index 514eec136..a002415b9 100644 --- a/openapi-specs/compute/33-01/desc/policies/vulnerability_coderepos_put.md +++ b/openapi-specs/compute/33-01/desc/policies/vulnerability_coderepos_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Code repo Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT 'https:///api/v/policies/vulnerability/coderepos' \ diff --git a/openapi-specs/compute/33-01/desc/policies/vulnerability_host_get.md b/openapi-specs/compute/33-01/desc/policies/vulnerability_host_get.md index 3b9b14b9c..260da7675 100644 --- a/openapi-specs/compute/33-01/desc/policies/vulnerability_host_get.md +++ b/openapi-specs/compute/33-01/desc/policies/vulnerability_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Hosts > Running hosts** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/policies/vulnerability_host_impacted_get.md b/openapi-specs/compute/33-01/desc/policies/vulnerability_host_impacted_get.md index 346368518..f44592830 100644 --- a/openapi-specs/compute/33-01/desc/policies/vulnerability_host_impacted_get.md +++ b/openapi-specs/compute/33-01/desc/policies/vulnerability_host_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by `RULE_NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/host/impacted?project={PROJECT_NAME}&ruleName={RULE_NAME}' ``` diff --git a/openapi-specs/compute/33-01/desc/policies/vulnerability_images_get.md b/openapi-specs/compute/33-01/desc/policies/vulnerability_images_get.md index 33581be37..57359bb8f 100644 --- a/openapi-specs/compute/33-01/desc/policies/vulnerability_images_get.md +++ b/openapi-specs/compute/33-01/desc/policies/vulnerability_images_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images?project=" diff --git a/openapi-specs/compute/33-01/desc/policies/vulnerability_images_impacted_get.md b/openapi-specs/compute/33-01/desc/policies/vulnerability_images_impacted_get.md index ae1d5e396..e2a4efa23 100644 --- a/openapi-specs/compute/33-01/desc/policies/vulnerability_images_impacted_get.md +++ b/openapi-specs/compute/33-01/desc/policies/vulnerability_images_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of images caught by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images/impacted?project=&ruleName=" diff --git a/openapi-specs/compute/33-01/desc/policies/vulnerability_images_put.md b/openapi-specs/compute/33-01/desc/policies/vulnerability_images_put.md index b3330dab7..8c3cc8af2 100644 --- a/openapi-specs/compute/33-01/desc/policies/vulnerability_images_put.md +++ b/openapi-specs/compute/33-01/desc/policies/vulnerability_images_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -X PUT 'https:///api/v/policies/vulnerability/images' \ --data '{ diff --git a/openapi-specs/compute/33-01/desc/policies/vulnerability_serverless_get.md b/openapi-specs/compute/33-01/desc/policies/vulnerability_serverless_get.md index c7a8e2ef5..41c7e75d8 100644 --- a/openapi-specs/compute/33-01/desc/policies/vulnerability_serverless_get.md +++ b/openapi-specs/compute/33-01/desc/policies/vulnerability_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Functions** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/policies/vulnerability_serverless_put.md b/openapi-specs/compute/33-01/desc/policies/vulnerability_serverless_put.md index 2b567b5b1..5199f0997 100644 --- a/openapi-specs/compute/33-01/desc/policies/vulnerability_serverless_put.md +++ b/openapi-specs/compute/33-01/desc/policies/vulnerability_serverless_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k 'https:///api/v/policies/vulnerability/serverless' \ +$ curl 'https:///api/v/policies/vulnerability/serverless' \ -X PUT \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/33-01/desc/policies/vulnerability_vms_get.md b/openapi-specs/compute/33-01/desc/policies/vulnerability_vms_get.md index 117d2cc4a..e37c1520f 100644 --- a/openapi-specs/compute/33-01/desc/policies/vulnerability_vms_get.md +++ b/openapi-specs/compute/33-01/desc/policies/vulnerability_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Hosts > V The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/policies/vulnerability_vms_impacted_get.md b/openapi-specs/compute/33-01/desc/policies/vulnerability_vms_impacted_get.md index 29d9621ea..f1a7f7ef5 100644 --- a/openapi-specs/compute/33-01/desc/policies/vulnerability_vms_impacted_get.md +++ b/openapi-specs/compute/33-01/desc/policies/vulnerability_vms_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/vms?project=&ruleName=' ``` diff --git a/openapi-specs/compute/33-01/desc/profiles/app-embedded_download_get.md b/openapi-specs/compute/33-01/desc/profiles/app-embedded_download_get.md index 4b3f7ff8a..2e8cac56d 100644 --- a/openapi-specs/compute/33-01/desc/profiles/app-embedded_download_get.md +++ b/openapi-specs/compute/33-01/desc/profiles/app-embedded_download_get.md @@ -5,7 +5,7 @@ Downloads the app-embedded observations in a CSV format. Refer to the following example cURL command that downloads all the app-embedded runtime profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/profiles/app-embedded_get.md b/openapi-specs/compute/33-01/desc/profiles/app-embedded_get.md index f3ddb3125..c332061e5 100644 --- a/openapi-specs/compute/33-01/desc/profiles/app-embedded_get.md +++ b/openapi-specs/compute/33-01/desc/profiles/app-embedded_get.md @@ -5,7 +5,7 @@ Retrieves the app-embedded observations. Refer to the following example cURL command that lists all the app-embedded runtime: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/profiles/container_download_get.md b/openapi-specs/compute/33-01/desc/profiles/container_download_get.md index ad7a86101..ee9d5e9e4 100644 --- a/openapi-specs/compute/33-01/desc/profiles/container_download_get.md +++ b/openapi-specs/compute/33-01/desc/profiles/container_download_get.md @@ -6,7 +6,7 @@ Retrieves the details and state of all runtime models in CSV format. Refer to the following example cURL command that downloads a complete list in CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/profiles/container_filters_get.md b/openapi-specs/compute/33-01/desc/profiles/container_filters_get.md index 8b6122b80..13535b520 100644 --- a/openapi-specs/compute/33-01/desc/profiles/container_filters_get.md +++ b/openapi-specs/compute/33-01/desc/profiles/container_filters_get.md @@ -4,7 +4,7 @@ Returns a list of os and images from page monitor/runtime/container-models in Co Example curl command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/profiles/container_get.md b/openapi-specs/compute/33-01/desc/profiles/container_get.md index cdbc24c3e..59a3764fb 100644 --- a/openapi-specs/compute/33-01/desc/profiles/container_get.md +++ b/openapi-specs/compute/33-01/desc/profiles/container_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of all runtime models. Refer to the following example cURL command that lists all runtime models in a system: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/profiles/container_learn_post.md b/openapi-specs/compute/33-01/desc/profiles/container_learn_post.md index 5fef2e31e..2c1d08af1 100644 --- a/openapi-specs/compute/33-01/desc/profiles/container_learn_post.md +++ b/openapi-specs/compute/33-01/desc/profiles/container_learn_post.md @@ -7,7 +7,7 @@ For more information, refer to [Learning mode](https://docs.prismacloud.io/en/cl Refer to the following example cURL command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/profiles/host_download_get.md b/openapi-specs/compute/33-01/desc/profiles/host_download_get.md index ace270a32..2dfb51ec0 100644 --- a/openapi-specs/compute/33-01/desc/profiles/host_download_get.md +++ b/openapi-specs/compute/33-01/desc/profiles/host_download_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of each host service runtime model in CSV format Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/profiles/host_get.md b/openapi-specs/compute/33-01/desc/profiles/host_get.md index 208a24de3..55d8bf8ff 100644 --- a/openapi-specs/compute/33-01/desc/profiles/host_get.md +++ b/openapi-specs/compute/33-01/desc/profiles/host_get.md @@ -15,7 +15,7 @@ The returned JSON object has the following structure: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/profiles/host_id_rule_get.md b/openapi-specs/compute/33-01/desc/profiles/host_id_rule_get.md index 672cb4c62..8be668fca 100644 --- a/openapi-specs/compute/33-01/desc/profiles/host_id_rule_get.md +++ b/openapi-specs/compute/33-01/desc/profiles/host_id_rule_get.md @@ -10,7 +10,7 @@ This is the `PROFILE_ID`. The following example command uses curl and basic auth to specify the learning mode for a profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/profiles/service_download_get.md b/openapi-specs/compute/33-01/desc/profiles/service_download_get.md index 63dff3354..4c1c431c1 100644 --- a/openapi-specs/compute/33-01/desc/profiles/service_download_get.md +++ b/openapi-specs/compute/33-01/desc/profiles/service_download_get.md @@ -1,7 +1,7 @@ Retrieves the details and state of all host service runtime models in CSV format ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/profiles/service_get.md b/openapi-specs/compute/33-01/desc/profiles/service_get.md index a4f8c348d..5d786d919 100644 --- a/openapi-specs/compute/33-01/desc/profiles/service_get.md +++ b/openapi-specs/compute/33-01/desc/profiles/service_get.md @@ -10,7 +10,7 @@ The returned JSON object has the following structure: Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/profiles/service_id_learn_post.md b/openapi-specs/compute/33-01/desc/profiles/service_id_learn_post.md index fb338b80d..fa85fc3a2 100644 --- a/openapi-specs/compute/33-01/desc/profiles/service_id_learn_post.md +++ b/openapi-specs/compute/33-01/desc/profiles/service_id_learn_post.md @@ -11,7 +11,7 @@ The `PROFILE_ID` is typically the service's name, such as `sshd` or `ntpd`. The following example command uses curl and basic auth to specify the learning mode for a host service profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/profiles/service_learn_post.md b/openapi-specs/compute/33-01/desc/profiles/service_learn_post.md index 02a1f299e..ceff8e5a5 100644 --- a/openapi-specs/compute/33-01/desc/profiles/service_learn_post.md +++ b/openapi-specs/compute/33-01/desc/profiles/service_learn_post.md @@ -3,7 +3,7 @@ Specify the learning mode for all host service profiles. The following example command uses curl and basic auth to specify the learning mode for all host service profiles. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/profiles/service_names_get.md b/openapi-specs/compute/33-01/desc/profiles/service_names_get.md index 7da863545..afae56f0d 100644 --- a/openapi-specs/compute/33-01/desc/profiles/service_names_get.md +++ b/openapi-specs/compute/33-01/desc/profiles/service_names_get.md @@ -3,7 +3,7 @@ Retrieves the name of all host service runtime models from within the app at **M The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/projects/get.md b/openapi-specs/compute/33-01/desc/projects/get.md index 05485c24c..1ac04d2c0 100644 --- a/openapi-specs/compute/33-01/desc/projects/get.md +++ b/openapi-specs/compute/33-01/desc/projects/get.md @@ -3,7 +3,7 @@ Lists all projects visible to the given user. Assuming the given user is an admin, the following example curl command would list all projects: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/projects/name_delete.md b/openapi-specs/compute/33-01/desc/projects/name_delete.md index fba889f7e..0a34e72a2 100644 --- a/openapi-specs/compute/33-01/desc/projects/name_delete.md +++ b/openapi-specs/compute/33-01/desc/projects/name_delete.md @@ -6,7 +6,7 @@ The value for `` can be retrieved from the `_id` field in the resp The DELETE method returns the decommissioned supervisor's admin username and password. ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/compute/33-01/desc/projects/name_put.md b/openapi-specs/compute/33-01/desc/projects/name_put.md index b5a83a67d..1bde9b0c7 100644 --- a/openapi-specs/compute/33-01/desc/projects/name_put.md +++ b/openapi-specs/compute/33-01/desc/projects/name_put.md @@ -4,7 +4,7 @@ The following example curl command updates a project named ``. The value for `` can be retrieved from the `_id` field in the response object from `GET /api/v1/projects`. ```bash -$ curl -k \ +$ curl \ -u \ -X PUT \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/compute/33-01/desc/projects/post.md b/openapi-specs/compute/33-01/desc/projects/post.md index 8862c0fd4..38c574173 100644 --- a/openapi-specs/compute/33-01/desc/projects/post.md +++ b/openapi-specs/compute/33-01/desc/projects/post.md @@ -3,7 +3,7 @@ Provisions a new project. The following example curl command provisions a new project named `my-project`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ $ curl -k \ If you have installed a new instance of Console, and you have already created an initial admin user for it, then you can specify the admin username name and password when you provision the project. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/projects/projects.md b/openapi-specs/compute/33-01/desc/projects/projects.md index 7e7dcff66..19c904e9e 100644 --- a/openapi-specs/compute/33-01/desc/projects/projects.md +++ b/openapi-specs/compute/33-01/desc/projects/projects.md @@ -20,7 +20,7 @@ If `project` is not specified, it is set to `Central+Console`. For example, to retrieve the compliance policies for a tenant project named `mobile_payments_division`, use the following curl command: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/radar/container_clean_post.md b/openapi-specs/compute/33-01/desc/radar/container_clean_post.md index 662b6d53f..d4f87e91e 100644 --- a/openapi-specs/compute/33-01/desc/radar/container_clean_post.md +++ b/openapi-specs/compute/33-01/desc/radar/container_clean_post.md @@ -1,7 +1,7 @@ Cleans the container runtime profiles and Radar entities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/radar/container_delete.md b/openapi-specs/compute/33-01/desc/radar/container_delete.md index 4eabe337f..b6cc69cf2 100644 --- a/openapi-specs/compute/33-01/desc/radar/container_delete.md +++ b/openapi-specs/compute/33-01/desc/radar/container_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-01/desc/radar/container_export_get.md b/openapi-specs/compute/33-01/desc/radar/container_export_get.md index 7f577568f..f776c7e6c 100644 --- a/openapi-specs/compute/33-01/desc/radar/container_export_get.md +++ b/openapi-specs/compute/33-01/desc/radar/container_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for containers) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/radar/container_filters_get.md b/openapi-specs/compute/33-01/desc/radar/container_filters_get.md index f66463da1..8d7cd6df3 100644 --- a/openapi-specs/compute/33-01/desc/radar/container_filters_get.md +++ b/openapi-specs/compute/33-01/desc/radar/container_filters_get.md @@ -1,7 +1,7 @@ Returns the namespaces from the container view on the Radar page. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/radar/container_get.md b/openapi-specs/compute/33-01/desc/radar/container_get.md index 280d683d9..404629a25 100644 --- a/openapi-specs/compute/33-01/desc/radar/container_get.md +++ b/openapi-specs/compute/33-01/desc/radar/container_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (container view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/radar/host_delete.md b/openapi-specs/compute/33-01/desc/radar/host_delete.md index 738fa7a7c..b4910a8b7 100644 --- a/openapi-specs/compute/33-01/desc/radar/host_delete.md +++ b/openapi-specs/compute/33-01/desc/radar/host_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two apps in CNNF for hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-01/desc/radar/host_export_get.md b/openapi-specs/compute/33-01/desc/radar/host_export_get.md index dd91b5335..851d6f40f 100644 --- a/openapi-specs/compute/33-01/desc/radar/host_export_get.md +++ b/openapi-specs/compute/33-01/desc/radar/host_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for hosts) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/radar/host_get.md b/openapi-specs/compute/33-01/desc/radar/host_get.md index a12025856..222d075aa 100644 --- a/openapi-specs/compute/33-01/desc/radar/host_get.md +++ b/openapi-specs/compute/33-01/desc/radar/host_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (host view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/radar/serverless_get.md b/openapi-specs/compute/33-01/desc/radar/serverless_get.md index b2f329149..170cfb48d 100644 --- a/openapi-specs/compute/33-01/desc/radar/serverless_get.md +++ b/openapi-specs/compute/33-01/desc/radar/serverless_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/radar/serverless_progress_get.md b/openapi-specs/compute/33-01/desc/radar/serverless_progress_get.md index a11c1ae20..0808dfbf4 100644 --- a/openapi-specs/compute/33-01/desc/radar/serverless_progress_get.md +++ b/openapi-specs/compute/33-01/desc/radar/serverless_progress_get.md @@ -1,7 +1,7 @@ Returns the scan progress from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/radar/serverless_scan_post.md b/openapi-specs/compute/33-01/desc/radar/serverless_scan_post.md index 0d519ba88..2d444ac88 100644 --- a/openapi-specs/compute/33-01/desc/radar/serverless_scan_post.md +++ b/openapi-specs/compute/33-01/desc/radar/serverless_scan_post.md @@ -1,7 +1,7 @@ Initiates a serverless scan of your environments. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/radar/serverless_stop_post.md b/openapi-specs/compute/33-01/desc/radar/serverless_stop_post.md index 5c0bdf186..f15bef34d 100644 --- a/openapi-specs/compute/33-01/desc/radar/serverless_stop_post.md +++ b/openapi-specs/compute/33-01/desc/radar/serverless_stop_post.md @@ -1,7 +1,7 @@ Stops an in-progress serverless scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/rbac/role_delete.md b/openapi-specs/compute/33-01/desc/rbac/role_delete.md index 87015b6e8..46efcf9c9 100644 --- a/openapi-specs/compute/33-01/desc/rbac/role_delete.md +++ b/openapi-specs/compute/33-01/desc/rbac/role_delete.md @@ -4,7 +4,7 @@ System roles and roles assigned to users/groups cannot be deleted. The following example curl command uses basic auth to delete role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-01/desc/rbac/roles_get.md b/openapi-specs/compute/33-01/desc/rbac/roles_get.md index 4cd1d9bc7..112026937 100644 --- a/openapi-specs/compute/33-01/desc/rbac/roles_get.md +++ b/openapi-specs/compute/33-01/desc/rbac/roles_get.md @@ -3,7 +3,7 @@ This endpoint will return a list in JSON format of the roles can be found under The following example curl command uses basic auth to return: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/rbac/roles_post.md b/openapi-specs/compute/33-01/desc/rbac/roles_post.md index 1f20772ce..6988766e8 100644 --- a/openapi-specs/compute/33-01/desc/rbac/roles_post.md +++ b/openapi-specs/compute/33-01/desc/rbac/roles_post.md @@ -37,7 +37,7 @@ The added role must contain the "user" permission with read-write access. This p The following example curl command uses basic auth to create the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/rbac/roles_put.md b/openapi-specs/compute/33-01/desc/rbac/roles_put.md index 34d7b41a7..f62e34ccb 100644 --- a/openapi-specs/compute/33-01/desc/rbac/roles_put.md +++ b/openapi-specs/compute/33-01/desc/rbac/roles_put.md @@ -38,7 +38,7 @@ The updated role must contain the "user" permission with read-write access. This The following example curl command uses basic auth to update the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-01/desc/recovery/backup_get.md b/openapi-specs/compute/33-01/desc/recovery/backup_get.md index 4da46f356..bf735905a 100644 --- a/openapi-specs/compute/33-01/desc/recovery/backup_get.md +++ b/openapi-specs/compute/33-01/desc/recovery/backup_get.md @@ -3,7 +3,7 @@ Returns a list of available backups. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/recovery/backup_id_delete.md b/openapi-specs/compute/33-01/desc/recovery/backup_id_delete.md index ae9c33e90..80cd4c3f6 100644 --- a/openapi-specs/compute/33-01/desc/recovery/backup_id_delete.md +++ b/openapi-specs/compute/33-01/desc/recovery/backup_id_delete.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-01/desc/recovery/backup_id_patch.md b/openapi-specs/compute/33-01/desc/recovery/backup_id_patch.md index 4a78cd67d..b3699972f 100644 --- a/openapi-specs/compute/33-01/desc/recovery/backup_id_patch.md +++ b/openapi-specs/compute/33-01/desc/recovery/backup_id_patch.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/compute/33-01/desc/recovery/backup_post.md b/openapi-specs/compute/33-01/desc/recovery/backup_post.md index f45161712..41436fe5f 100644 --- a/openapi-specs/compute/33-01/desc/recovery/backup_post.md +++ b/openapi-specs/compute/33-01/desc/recovery/backup_post.md @@ -3,7 +3,7 @@ Creates a backup named `backup_name` by invoking the MongoDB dump process. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/recovery/restore_id_post.md b/openapi-specs/compute/33-01/desc/recovery/restore_id_post.md index 850fceeaa..e424641cc 100644 --- a/openapi-specs/compute/33-01/desc/recovery/restore_id_post.md +++ b/openapi-specs/compute/33-01/desc/recovery/restore_id_post.md @@ -5,7 +5,7 @@ Restores Prisma Cloud Compute from the given backup. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/registry/download_get.md b/openapi-specs/compute/33-01/desc/registry/download_get.md index 5a3eb0141..3eef8d50e 100644 --- a/openapi-specs/compute/33-01/desc/registry/download_get.md +++ b/openapi-specs/compute/33-01/desc/registry/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Compliance > Images > Reg Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/registry/get.md b/openapi-specs/compute/33-01/desc/registry/get.md index e8b87080e..208b2f1e3 100644 --- a/openapi-specs/compute/33-01/desc/registry/get.md +++ b/openapi-specs/compute/33-01/desc/registry/get.md @@ -21,7 +21,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that retrieves a scan report for all images in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -33,7 +33,7 @@ The compact query can be used to get a general overview of the number of Vulnera Refer to the following cURL command that retrieves a compact scan report for the Ubuntu image in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -44,7 +44,7 @@ The name query is synonymous with the filter registry text field in the Console Refer to the following cURL that retrieves the scan report for the image in the registry with the matching **sha256** hash: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -54,7 +54,7 @@ $ curl -k \ Refer to the following cURL command that retrieves the images in the first 10 registries: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/registry/get_registry_progress.md b/openapi-specs/compute/33-01/desc/registry/get_registry_progress.md index ddc319c1b..cc6feac3d 100644 --- a/openapi-specs/compute/33-01/desc/registry/get_registry_progress.md +++ b/openapi-specs/compute/33-01/desc/registry/get_registry_progress.md @@ -11,7 +11,7 @@ For a regular scan, use the API path only without any query parameters. Refer to the following example cURL request that retrieves the ongoing scan details for a regular registry scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -61,7 +61,7 @@ For an on-demand scan that is started using the `/registry/scan` endpoint with t Refer to the following example cURL request that retrieves the ongoing scan details for an on-demand registry scan that is started using the `/registry/scan` endpoint for the repository `alpine` with tag `3.16`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/registry/names_get.md b/openapi-specs/compute/33-01/desc/registry/names_get.md index 6933a570c..25afb48b8 100644 --- a/openapi-specs/compute/33-01/desc/registry/names_get.md +++ b/openapi-specs/compute/33-01/desc/registry/names_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command that retrieves a list of image names from your scanned registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/registry/scan_post.md b/openapi-specs/compute/33-01/desc/registry/scan_post.md index ce7e19533..96bfd5f16 100644 --- a/openapi-specs/compute/33-01/desc/registry/scan_post.md +++ b/openapi-specs/compute/33-01/desc/registry/scan_post.md @@ -17,7 +17,7 @@ For information on scan result, see [Get Registry Scan Report](https://prisma.pa Refer to the following example cURL command that forces Prisma Cloud Compute to rescan all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -27,7 +27,7 @@ $ curl -k \ Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan a specific image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -52,7 +52,7 @@ For information on scan result, see [Get Registry Scan Report](https://pan.dev/p Refer to the following example cURL command to trigger an on-demand scan for an image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/registry/stop_post.md b/openapi-specs/compute/33-01/desc/registry/stop_post.md index 29e103ac1..05ac2f436 100644 --- a/openapi-specs/compute/33-01/desc/registry/stop_post.md +++ b/openapi-specs/compute/33-01/desc/registry/stop_post.md @@ -5,7 +5,7 @@ Stops current registry scan immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to stop scanning all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/scans/download_get.md b/openapi-specs/compute/33-01/desc/scans/download_get.md index 61a0ccc2d..3785bf562 100644 --- a/openapi-specs/compute/33-01/desc/scans/download_get.md +++ b/openapi-specs/compute/33-01/desc/scans/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Images The following cURL command retrieves and saves your Jenkins and twistcli scan reports to a CSV file called `scans_report.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/scans/filter_get.md b/openapi-specs/compute/33-01/desc/scans/filter_get.md index 58550ad35..df3e9cdb0 100644 --- a/openapi-specs/compute/33-01/desc/scans/filter_get.md +++ b/openapi-specs/compute/33-01/desc/scans/filter_get.md @@ -3,7 +3,7 @@ Retrieves the list of Jenkins projects that have been scanned by the Jenkins plu The following example curl command uses basic auth to retrieve the list of Jenkins project names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/scans/get.md b/openapi-specs/compute/33-01/desc/scans/get.md index e28506972..107b733bd 100644 --- a/openapi-specs/compute/33-01/desc/scans/get.md +++ b/openapi-specs/compute/33-01/desc/scans/get.md @@ -11,7 +11,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command that retrieves the scan reports for all images scanned using the Jenkins CI plugin or the twistcli tool: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -23,7 +23,7 @@ To get the report of a specific scan, add query parameters to narrow the scope o The following cURL command retrieves the scan report for an image with a SHA256 ID of `sha256:f756e84300d8e53006090573dd33abe5b8cfac3e42d104fc4be37f435fe512f3`. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/scans/id_get.md b/openapi-specs/compute/33-01/desc/scans/id_get.md index 7a342ef60..1557b1905 100644 --- a/openapi-specs/compute/33-01/desc/scans/id_get.md +++ b/openapi-specs/compute/33-01/desc/scans/id_get.md @@ -3,7 +3,7 @@ Retrieves all scan reports for images scanned by the Jenkins plugin or twistcli The following example curl command uses basic auth to retrieve the scan report for just an image with a SHA256 ID of `5c3385fd2e76c5c16124c077`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/scripts/console_sh_get.md b/openapi-specs/compute/33-01/desc/scripts/console_sh_get.md index d8f02038f..1622321ca 100644 --- a/openapi-specs/compute/33-01/desc/scripts/console_sh_get.md +++ b/openapi-specs/compute/33-01/desc/scripts/console_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/scripts/defender_ps1_get.md b/openapi-specs/compute/33-01/desc/scripts/defender_ps1_get.md index a47616983..45e4a6133 100644 --- a/openapi-specs/compute/33-01/desc/scripts/defender_ps1_get.md +++ b/openapi-specs/compute/33-01/desc/scripts/defender_ps1_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/scripts/defender_sh_get.md b/openapi-specs/compute/33-01/desc/scripts/defender_sh_get.md index 98ad6cf62..a8a302426 100644 --- a/openapi-specs/compute/33-01/desc/scripts/defender_sh_get.md +++ b/openapi-specs/compute/33-01/desc/scripts/defender_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/serverless/download_get.md b/openapi-specs/compute/33-01/desc/serverless/download_get.md index a8e49ff25..4d7d3adc1 100644 --- a/openapi-specs/compute/33-01/desc/serverless/download_get.md +++ b/openapi-specs/compute/33-01/desc/serverless/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Functio The following cURL command retrieves a list of all serverless resources monitored by Prisma Cloud Compute and saves the results in a CSV file called `serverless.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/serverless/download' \ diff --git a/openapi-specs/compute/33-01/desc/serverless/embed_post.md b/openapi-specs/compute/33-01/desc/serverless/embed_post.md index 6cce784b8..353b5721c 100644 --- a/openapi-specs/compute/33-01/desc/serverless/embed_post.md +++ b/openapi-specs/compute/33-01/desc/serverless/embed_post.md @@ -1,7 +1,7 @@ The following curl command uses basic auth to retrieve a list of all Serverless resources that monitored by Prisma Cloud Compute, and save the results to a CSV file: ```bash -$ curl -k \ +$ curl \ -X POST \ -H "Content-Type: application/octet-stream" \ -u \ diff --git a/openapi-specs/compute/33-01/desc/serverless/get.md b/openapi-specs/compute/33-01/desc/serverless/get.md index aee50492f..430ee065a 100644 --- a/openapi-specs/compute/33-01/desc/serverless/get.md +++ b/openapi-specs/compute/33-01/desc/serverless/get.md @@ -11,7 +11,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Functions > Scanned function Refer to the following example cURL command that retrieves the scan reports for serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/serverless/names_get.md b/openapi-specs/compute/33-01/desc/serverless/names_get.md index 3cab17092..90285574a 100644 --- a/openapi-specs/compute/33-01/desc/serverless/names_get.md +++ b/openapi-specs/compute/33-01/desc/serverless/names_get.md @@ -5,7 +5,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo The following curl command uses basic auth to retrieve a list of names of all Serverless resources monitored by Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -X GET \ -H "Content-Type: application/json" \ -u \ diff --git a/openapi-specs/compute/33-01/desc/serverless/scan_post.md b/openapi-specs/compute/33-01/desc/serverless/scan_post.md index 159285349..70a3a3b4e 100644 --- a/openapi-specs/compute/33-01/desc/serverless/scan_post.md +++ b/openapi-specs/compute/33-01/desc/serverless/scan_post.md @@ -5,7 +5,7 @@ Re-scan all serverless functions immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/scan diff --git a/openapi-specs/compute/33-01/desc/serverless/stop_post.md b/openapi-specs/compute/33-01/desc/serverless/stop_post.md index 763710842..67c0d2239 100644 --- a/openapi-specs/compute/33-01/desc/serverless/stop_post.md +++ b/openapi-specs/compute/33-01/desc/serverless/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing serverless scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/stop diff --git a/openapi-specs/compute/33-01/desc/settings/alerts_get.md b/openapi-specs/compute/33-01/desc/settings/alerts_get.md index 060114c39..2b25dc6c9 100644 --- a/openapi-specs/compute/33-01/desc/settings/alerts_get.md +++ b/openapi-specs/compute/33-01/desc/settings/alerts_get.md @@ -1,7 +1,7 @@ Retrieves a list of your alert settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/settings/alerts_options_get.md b/openapi-specs/compute/33-01/desc/settings/alerts_options_get.md index 095c1f1b7..aa7a1d250 100644 --- a/openapi-specs/compute/33-01/desc/settings/alerts_options_get.md +++ b/openapi-specs/compute/33-01/desc/settings/alerts_options_get.md @@ -3,7 +3,7 @@ This endpoint will return the alert profile configuration options that can be fo The following example curl command uses basic auth to retrieve all alert profile configuration options: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/settings/alerts_post.md b/openapi-specs/compute/33-01/desc/settings/alerts_post.md index 3acb8d543..cd303f880 100644 --- a/openapi-specs/compute/33-01/desc/settings/alerts_post.md +++ b/openapi-specs/compute/33-01/desc/settings/alerts_post.md @@ -3,7 +3,7 @@ Configure alerts. The following example curl command sets the aggregation period for alerts to one hour. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/settings/certificates_post.md b/openapi-specs/compute/33-01/desc/settings/certificates_post.md index fbdc8a5a9..bd30ea399 100644 --- a/openapi-specs/compute/33-01/desc/settings/certificates_post.md +++ b/openapi-specs/compute/33-01/desc/settings/certificates_post.md @@ -9,7 +9,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to set the validity period for client certificates to seven days: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/33-01/desc/settings/certs_get.md b/openapi-specs/compute/33-01/desc/settings/certs_get.md index ba6674a3c..dbf1d3790 100644 --- a/openapi-specs/compute/33-01/desc/settings/certs_get.md +++ b/openapi-specs/compute/33-01/desc/settings/certs_get.md @@ -6,7 +6,7 @@ Defenders use these names to connect to Console. Refer to the following example cURL request that uses basic auth to retrieve the SANs in Console's cert: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/settings/certs_post.md b/openapi-specs/compute/33-01/desc/settings/certs_post.md index a6e429006..fb2cedee5 100644 --- a/openapi-specs/compute/33-01/desc/settings/certs_post.md +++ b/openapi-specs/compute/33-01/desc/settings/certs_post.md @@ -12,7 +12,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to add `node-01.example.com` to the `subjectAltName` field in the certificate: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/33-01/desc/settings/coderepos_get.md b/openapi-specs/compute/33-01/desc/settings/coderepos_get.md index 6cbfb78cb..286a8d905 100644 --- a/openapi-specs/compute/33-01/desc/settings/coderepos_get.md +++ b/openapi-specs/compute/33-01/desc/settings/coderepos_get.md @@ -20,7 +20,7 @@ Construct the full webhook using Console's publicly accessible DNS name or IP ad Refer to the following example cURL command that retrieves all code repositories to scan, as well as the webhook URL suffix: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/settings/console-certificates_post.md b/openapi-specs/compute/33-01/desc/settings/console-certificates_post.md index 5673af840..392061c8f 100644 --- a/openapi-specs/compute/33-01/desc/settings/console-certificates_post.md +++ b/openapi-specs/compute/33-01/desc/settings/console-certificates_post.md @@ -9,7 +9,7 @@ For the custom TLS certificate for securing browser access, this file must be in Refer to the following example cURL request that uses basic auth and configures the custom certificate to use for securing browser access to the console: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/settings/custom-labels_get.md b/openapi-specs/compute/33-01/desc/settings/custom-labels_get.md index a849dd8a8..19c1cadde 100644 --- a/openapi-specs/compute/33-01/desc/settings/custom-labels_get.md +++ b/openapi-specs/compute/33-01/desc/settings/custom-labels_get.md @@ -5,7 +5,7 @@ Returns the list of alert labels configured in Prisma Cloud Compute. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/settings/custom-labels_post.md b/openapi-specs/compute/33-01/desc/settings/custom-labels_post.md index 6bb66e706..9b0702fe8 100644 --- a/openapi-specs/compute/33-01/desc/settings/custom-labels_post.md +++ b/openapi-specs/compute/33-01/desc/settings/custom-labels_post.md @@ -5,7 +5,7 @@ Creates a custom alert label to augment audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/settings/defender_get.md b/openapi-specs/compute/33-01/desc/settings/defender_get.md index ecb8b6989..cf43bb304 100644 --- a/openapi-specs/compute/33-01/desc/settings/defender_get.md +++ b/openapi-specs/compute/33-01/desc/settings/defender_get.md @@ -5,7 +5,7 @@ Returns the advanced settings for Defenders. Refer to the following example cURL command that gets all advanced settings for Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/settings/forensic_get.md b/openapi-specs/compute/33-01/desc/settings/forensic_get.md index 9c16b70b9..3486b2bf9 100644 --- a/openapi-specs/compute/33-01/desc/settings/forensic_get.md +++ b/openapi-specs/compute/33-01/desc/settings/forensic_get.md @@ -1,7 +1,7 @@ Retrieves the settings for the forensics system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/settings/forensic_post.md b/openapi-specs/compute/33-01/desc/settings/forensic_post.md index 31f809d39..8943842fb 100644 --- a/openapi-specs/compute/33-01/desc/settings/forensic_post.md +++ b/openapi-specs/compute/33-01/desc/settings/forensic_post.md @@ -3,7 +3,7 @@ Configures the forensics system. The following example curl command allocates 100 MB of local disk space for container forensic data and 10 MB for host forensics data. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/settings/initialized_get.md b/openapi-specs/compute/33-01/desc/settings/initialized_get.md index 3134912d1..2af8462f1 100644 --- a/openapi-specs/compute/33-01/desc/settings/initialized_get.md +++ b/openapi-specs/compute/33-01/desc/settings/initialized_get.md @@ -4,7 +4,7 @@ After first installing Console, the first thing you must do is create an admin a Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/settings/intelligence-windows_post.md b/openapi-specs/compute/33-01/desc/settings/intelligence-windows_post.md index c39e256d2..0721dab3b 100644 --- a/openapi-specs/compute/33-01/desc/settings/intelligence-windows_post.md +++ b/openapi-specs/compute/33-01/desc/settings/intelligence-windows_post.md @@ -3,7 +3,7 @@ This endpoint will enable or disable the Windows Intelligence Service from **Man The following example curl command uses basic auth to enable online updates of Windows vulnerabilities from the intelligence stream: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/settings/intelligence_get.md b/openapi-specs/compute/33-01/desc/settings/intelligence_get.md index 26c694246..15e9f24ae 100644 --- a/openapi-specs/compute/33-01/desc/settings/intelligence_get.md +++ b/openapi-specs/compute/33-01/desc/settings/intelligence_get.md @@ -5,7 +5,7 @@ Returns the details about the Intelligence Stream configuration. Refer to the following example cURL command that uses basic auth to retrieve your Intelligence Stream configuration settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/settings/intelligence_post.md b/openapi-specs/compute/33-01/desc/settings/intelligence_post.md index 74b06a3a0..2dbbd0168 100644 --- a/openapi-specs/compute/33-01/desc/settings/intelligence_post.md +++ b/openapi-specs/compute/33-01/desc/settings/intelligence_post.md @@ -7,7 +7,7 @@ For more information, see [Intelligence Stream](https://docs.paloaltonetworks.co Refer to the following example cURL command that uses basic auth to configure settings of your Intelligence Stream. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/settings/latest-version_get.md b/openapi-specs/compute/33-01/desc/settings/latest-version_get.md index c443fa7b5..16601fb5b 100644 --- a/openapi-specs/compute/33-01/desc/settings/latest-version_get.md +++ b/openapi-specs/compute/33-01/desc/settings/latest-version_get.md @@ -3,7 +3,7 @@ Retrieves the version number of the latest available Prisma Cloud Compute releas Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/settings/latest_version_get.md b/openapi-specs/compute/33-01/desc/settings/latest_version_get.md index 18e436668..5c64edff1 100644 --- a/openapi-specs/compute/33-01/desc/settings/latest_version_get.md +++ b/openapi-specs/compute/33-01/desc/settings/latest_version_get.md @@ -1,7 +1,7 @@ This endpoint will return the latest version of the product. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/settings/ldap_get.md b/openapi-specs/compute/33-01/desc/settings/ldap_get.md index 4ad0ad0c9..7d803ba1c 100644 --- a/openapi-specs/compute/33-01/desc/settings/ldap_get.md +++ b/openapi-specs/compute/33-01/desc/settings/ldap_get.md @@ -5,7 +5,7 @@ Returns the LDAP integration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/settings/ldap_post.md b/openapi-specs/compute/33-01/desc/settings/ldap_post.md index c152c7dc5..34bc06ef4 100644 --- a/openapi-specs/compute/33-01/desc/settings/ldap_post.md +++ b/openapi-specs/compute/33-01/desc/settings/ldap_post.md @@ -7,7 +7,7 @@ For more information, see [Active Directory](https://docs.paloaltonetworks.com/p Refer to the following example cURL command that enables the LDAP integration and specifies the parameters required to integrate with an Active Directory service. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/settings/license_get.md b/openapi-specs/compute/33-01/desc/settings/license_get.md index 5c792cae8..2b4b548e3 100644 --- a/openapi-specs/compute/33-01/desc/settings/license_get.md +++ b/openapi-specs/compute/33-01/desc/settings/license_get.md @@ -5,7 +5,7 @@ Returns the details about the installed license. Refer to the following example cURL request that retrieves the license details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/settings/license_post.md b/openapi-specs/compute/33-01/desc/settings/license_post.md index b77800a5f..ce74b0d0f 100644 --- a/openapi-specs/compute/33-01/desc/settings/license_post.md +++ b/openapi-specs/compute/33-01/desc/settings/license_post.md @@ -8,7 +8,7 @@ For more information, see [Licensing](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to set your license: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/settings/logging_get.md b/openapi-specs/compute/33-01/desc/settings/logging_get.md index 6eda3e484..012be5def 100644 --- a/openapi-specs/compute/33-01/desc/settings/logging_get.md +++ b/openapi-specs/compute/33-01/desc/settings/logging_get.md @@ -5,7 +5,7 @@ Returns the logging settings. Refer to the following example cURL request that uses basic auth to retrieve your logging details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/settings/logging_post.md b/openapi-specs/compute/33-01/desc/settings/logging_post.md index 3619d9c0f..8d27ee1b3 100644 --- a/openapi-specs/compute/33-01/desc/settings/logging_post.md +++ b/openapi-specs/compute/33-01/desc/settings/logging_post.md @@ -8,7 +8,7 @@ For more information, see [Logging](https://docs.paloaltonetworks.com/prisma/pri Refer to the following example cURL request that enables verbose scan output for syslog and stdout: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/settings/logon_get.md b/openapi-specs/compute/33-01/desc/settings/logon_get.md index 1559f2405..b1e9164f2 100644 --- a/openapi-specs/compute/33-01/desc/settings/logon_get.md +++ b/openapi-specs/compute/33-01/desc/settings/logon_get.md @@ -5,7 +5,7 @@ Configures the logon settings. Refer to the following example cURL request that uses basic auth to retrieve all current logon settings. ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/settings/logon_post.md b/openapi-specs/compute/33-01/desc/settings/logon_post.md index 5c2b60c9f..691e082fe 100644 --- a/openapi-specs/compute/33-01/desc/settings/logon_post.md +++ b/openapi-specs/compute/33-01/desc/settings/logon_post.md @@ -7,7 +7,7 @@ For more information, see [Logon Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that uses basic auth to set the timeout to 900 seconds (15 minutes): ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/33-01/desc/settings/oauth_get.md b/openapi-specs/compute/33-01/desc/settings/oauth_get.md index 6dcf70fb5..5d997f016 100644 --- a/openapi-specs/compute/33-01/desc/settings/oauth_get.md +++ b/openapi-specs/compute/33-01/desc/settings/oauth_get.md @@ -5,7 +5,7 @@ Returns the OAuth configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/settings/oauth_post.md b/openapi-specs/compute/33-01/desc/settings/oauth_post.md index c593b9237..da3c83d2f 100644 --- a/openapi-specs/compute/33-01/desc/settings/oauth_post.md +++ b/openapi-specs/compute/33-01/desc/settings/oauth_post.md @@ -7,7 +7,7 @@ For more information, see [GitHub OAuth](https://docs.paloaltonetworks.com/prism Refer to the following example cURL response: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/settings/oidc_get.md b/openapi-specs/compute/33-01/desc/settings/oidc_get.md index ee439622b..1f27f93ba 100644 --- a/openapi-specs/compute/33-01/desc/settings/oidc_get.md +++ b/openapi-specs/compute/33-01/desc/settings/oidc_get.md @@ -5,7 +5,7 @@ Returns the OpenID Connect configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/settings/oidc_post.md b/openapi-specs/compute/33-01/desc/settings/oidc_post.md index e0270247e..5bd3a9192 100644 --- a/openapi-specs/compute/33-01/desc/settings/oidc_post.md +++ b/openapi-specs/compute/33-01/desc/settings/oidc_post.md @@ -7,7 +7,7 @@ For more information, see [OIDC](https://docs.paloaltonetworks.com/prisma/prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/settings/pcf_get.md b/openapi-specs/compute/33-01/desc/settings/pcf_get.md index 5dc21eb17..c5e42a823 100644 --- a/openapi-specs/compute/33-01/desc/settings/pcf_get.md +++ b/openapi-specs/compute/33-01/desc/settings/pcf_get.md @@ -3,7 +3,7 @@ This endpoint will return settings for PCF (Pivotal Cloud Foundry)Blobstore scan The following example curl command uses basic auth to retrieve the current PCF Blobstore scanning settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/settings/pcf_post.md b/openapi-specs/compute/33-01/desc/settings/pcf_post.md index 139e947cb..657e14f27 100644 --- a/openapi-specs/compute/33-01/desc/settings/pcf_post.md +++ b/openapi-specs/compute/33-01/desc/settings/pcf_post.md @@ -3,7 +3,7 @@ This endpoint will allow for updating settings for PCF (Pivotal Cloud Foundry) B The following example curl command uses basic auth to set up a PCF Blobstore scanner that scans the last `5` droplets for every droplet in the PCF Blobstore: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/settings/projects_get.md b/openapi-specs/compute/33-01/desc/settings/projects_get.md index f5dd20395..bc95414a1 100644 --- a/openapi-specs/compute/33-01/desc/settings/projects_get.md +++ b/openapi-specs/compute/33-01/desc/settings/projects_get.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command retrieves the state of the Projects feature from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ All API calls must be proxied through Central Console, where the request is auto To retrieve the Projects settings from a supervisor Console, append the `project` query parameter to your request. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/settings/projects_post.md b/openapi-specs/compute/33-01/desc/settings/projects_post.md index d29f8e9d5..b3472e6b9 100644 --- a/openapi-specs/compute/33-01/desc/settings/projects_post.md +++ b/openapi-specs/compute/33-01/desc/settings/projects_post.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command designates `` as master. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/settings/proxy_get.md b/openapi-specs/compute/33-01/desc/settings/proxy_get.md index 9a4922d59..477563069 100644 --- a/openapi-specs/compute/33-01/desc/settings/proxy_get.md +++ b/openapi-specs/compute/33-01/desc/settings/proxy_get.md @@ -5,7 +5,7 @@ Returns the proxy settings for Prisma Cloud Compute containers to access the Int Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/settings/proxy_post.md b/openapi-specs/compute/33-01/desc/settings/proxy_post.md index a1bdc07ed..df926524e 100644 --- a/openapi-specs/compute/33-01/desc/settings/proxy_post.md +++ b/openapi-specs/compute/33-01/desc/settings/proxy_post.md @@ -7,7 +7,7 @@ For more information, see [Proxy Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that specifies the proxy to use to access the Internet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/settings/registry_get.md b/openapi-specs/compute/33-01/desc/settings/registry_get.md index 12745005d..64e70b698 100644 --- a/openapi-specs/compute/33-01/desc/settings/registry_get.md +++ b/openapi-specs/compute/33-01/desc/settings/registry_get.md @@ -17,7 +17,7 @@ Construct the full webhook using the publicly accessible DNS name or IP address, The following cURL command retrieves all the registries to scan and the URL suffix for the registry's webhook URL suffix. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/settings/registry_post.md b/openapi-specs/compute/33-01/desc/settings/registry_post.md index efabf4e67..decf80a65 100644 --- a/openapi-specs/compute/33-01/desc/settings/registry_post.md +++ b/openapi-specs/compute/33-01/desc/settings/registry_post.md @@ -30,7 +30,7 @@ The API response returns an HTTP 400 error if the number of registry specificati Refer to the following example cURL command that configures Prisma Cloud Compute to scan the Ubuntu 16.04 repository on Docker Hub: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -64,7 +64,7 @@ To add settings for a GitLab Container Registry, you must specify the following Refer to the following example cURL command: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/settings/registry_put.md b/openapi-specs/compute/33-01/desc/settings/registry_put.md index 3768914f6..75d6c79a2 100644 --- a/openapi-specs/compute/33-01/desc/settings/registry_put.md +++ b/openapi-specs/compute/33-01/desc/settings/registry_put.md @@ -127,7 +127,7 @@ To remove a registry from the list: To delete all entries, submit an empty `specifications` array. For example: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-01/desc/settings/saml_get.md b/openapi-specs/compute/33-01/desc/settings/saml_get.md index f2228a440..4fb940e80 100644 --- a/openapi-specs/compute/33-01/desc/settings/saml_get.md +++ b/openapi-specs/compute/33-01/desc/settings/saml_get.md @@ -5,7 +5,7 @@ Returns the configured SAML settings that is used to authenticate to the Prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/settings/saml_post.md b/openapi-specs/compute/33-01/desc/settings/saml_post.md index 0bd9c4a25..dfe8d380f 100644 --- a/openapi-specs/compute/33-01/desc/settings/saml_post.md +++ b/openapi-specs/compute/33-01/desc/settings/saml_post.md @@ -7,7 +7,7 @@ For more information, see [Okta via SAML 2.0](https://docs.paloaltonetworks.com/ Refer to the following example cURL request that uses the basic auth to set up and enable the SAML integration with Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/settings/scan_get.md b/openapi-specs/compute/33-01/desc/settings/scan_get.md index 5c1df30a2..543ea7662 100644 --- a/openapi-specs/compute/33-01/desc/settings/scan_get.md +++ b/openapi-specs/compute/33-01/desc/settings/scan_get.md @@ -5,7 +5,7 @@ Returns the global settings for image, host, container, and registry scanning. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/settings/scan_post.md b/openapi-specs/compute/33-01/desc/settings/scan_post.md index f043d1c9f..9ddb521a2 100644 --- a/openapi-specs/compute/33-01/desc/settings/scan_post.md +++ b/openapi-specs/compute/33-01/desc/settings/scan_post.md @@ -9,7 +9,7 @@ Refer to the following example cURL request that configures the following scan i * Scan images, containers, and hosts once per day. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/settings/secrets_get.md b/openapi-specs/compute/33-01/desc/settings/secrets_get.md index 75e2b32c7..339009641 100644 --- a/openapi-specs/compute/33-01/desc/settings/secrets_get.md +++ b/openapi-specs/compute/33-01/desc/settings/secrets_get.md @@ -3,7 +3,7 @@ This endpoint will return configured secret store already configured in the cons The following example curl command retrieves any configured secret stores, as well as the refresh period in hours: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/settings/secrets_post.md b/openapi-specs/compute/33-01/desc/settings/secrets_post.md index d302ecdf8..730d031bf 100644 --- a/openapi-specs/compute/33-01/desc/settings/secrets_post.md +++ b/openapi-specs/compute/33-01/desc/settings/secrets_post.md @@ -5,7 +5,7 @@ Please note the data structure returned from endpoint /settings/secrets GET to s Refer to the following example curl command that adds a CyberArk secret store to the console with the appID set to `Prisma_Cloud_Compute_Console` and set the URL to `https://services-myca.twistlock.com:10882`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/settings/serverless-scan_get.md b/openapi-specs/compute/33-01/desc/settings/serverless-scan_get.md index bb8ce06ba..eb42e4a12 100644 --- a/openapi-specs/compute/33-01/desc/settings/serverless-scan_get.md +++ b/openapi-specs/compute/33-01/desc/settings/serverless-scan_get.md @@ -8,7 +8,7 @@ This endpoint maps to the **Function scope** table data in the **Defend > Vulner Refer to the following example cURL command that retrieves a list of serverless scan scopes: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/settings/serverless_get.md b/openapi-specs/compute/33-01/desc/settings/serverless_get.md index b6122c460..8c654807c 100644 --- a/openapi-specs/compute/33-01/desc/settings/serverless_get.md +++ b/openapi-specs/compute/33-01/desc/settings/serverless_get.md @@ -3,7 +3,7 @@ This endpoint will return any configured serverless function scanners found in * The following example curl command uses basic auth to retrieve serverless settings in an array, sorted by Cloud Provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/settings/serverless_post.md b/openapi-specs/compute/33-01/desc/settings/serverless_post.md index 6e26ea1d3..c0e0f3225 100644 --- a/openapi-specs/compute/33-01/desc/settings/serverless_post.md +++ b/openapi-specs/compute/33-01/desc/settings/serverless_post.md @@ -3,7 +3,7 @@ This endpoint will add serverless function providers to scan for vulnerabilities The following example curl command uses basic auth to add a serverless account to scan for serverless functions. This is assuming that you already have the [credential](https://docs.twistlock.com/docs/latest/configure/credentials_store.html) added to the console that is needed to scan that provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/settings/system_get.md b/openapi-specs/compute/33-01/desc/settings/system_get.md index 6f893abf0..0e8a3cba3 100644 --- a/openapi-specs/compute/33-01/desc/settings/system_get.md +++ b/openapi-specs/compute/33-01/desc/settings/system_get.md @@ -3,7 +3,7 @@ This endpoint will return all system settings in JSON format. The following example curl command does exactly that: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/settings/tas_get.md b/openapi-specs/compute/33-01/desc/settings/tas_get.md index 52f392433..d2d0017f0 100644 --- a/openapi-specs/compute/33-01/desc/settings/tas_get.md +++ b/openapi-specs/compute/33-01/desc/settings/tas_get.md @@ -5,7 +5,7 @@ Retrieves Tanzu Application Service (TAS) settings. Refer to the following example cURL command that retrieves all TAS settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/settings/telemetry_get.md b/openapi-specs/compute/33-01/desc/settings/telemetry_get.md index 6460c3fc3..46a807e77 100644 --- a/openapi-specs/compute/33-01/desc/settings/telemetry_get.md +++ b/openapi-specs/compute/33-01/desc/settings/telemetry_get.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that retrieves the settings if telemetry is enabled or not: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/settings/telemetry_post.md b/openapi-specs/compute/33-01/desc/settings/telemetry_post.md index bc97a6d0f..662846f33 100644 --- a/openapi-specs/compute/33-01/desc/settings/telemetry_post.md +++ b/openapi-specs/compute/33-01/desc/settings/telemetry_post.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to turn off telemetry: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/settings/trusted_certificate_post.md b/openapi-specs/compute/33-01/desc/settings/trusted_certificate_post.md index 5a2a30bda..c54b96fa5 100644 --- a/openapi-specs/compute/33-01/desc/settings/trusted_certificate_post.md +++ b/openapi-specs/compute/33-01/desc/settings/trusted_certificate_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/trusted-certificates` endpoint. Refer to the following example cURL request that uses basic auth to add a certificate to the list: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/33-01/desc/settings/trusted_certificates_post.md b/openapi-specs/compute/33-01/desc/settings/trusted_certificates_post.md index 78c07982b..e9bdc72a1 100644 --- a/openapi-specs/compute/33-01/desc/settings/trusted_certificates_post.md +++ b/openapi-specs/compute/33-01/desc/settings/trusted_certificates_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/certificates` endpoint. Refer to the following example cURL request that uses basic auth to enable this feature: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/33-01/desc/settings/vm_get.md b/openapi-specs/compute/33-01/desc/settings/vm_get.md index 8043742f5..b98b94240 100644 --- a/openapi-specs/compute/33-01/desc/settings/vm_get.md +++ b/openapi-specs/compute/33-01/desc/settings/vm_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **VM images scope** table data in the **Defend > Vulne Refer to the following example cURL command that retrieves all the scopes used for pattern matching on VM functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/signup/post.md b/openapi-specs/compute/33-01/desc/signup/post.md index 1db21df29..67344a0b1 100644 --- a/openapi-specs/compute/33-01/desc/signup/post.md +++ b/openapi-specs/compute/33-01/desc/signup/post.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i The following cURL command creates the initial admin user with the username `admin` and password `password`. ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -X POST \ -d '{"username": "admin", "password": "password"}' \ diff --git a/openapi-specs/compute/33-01/desc/static/capabilities_get.md b/openapi-specs/compute/33-01/desc/static/capabilities_get.md index ea119d2a9..f9b60278c 100644 --- a/openapi-specs/compute/33-01/desc/static/capabilities_get.md +++ b/openapi-specs/compute/33-01/desc/static/capabilities_get.md @@ -1,7 +1,7 @@ Returns a list of capabilities used in host models. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/static/regions_get.md b/openapi-specs/compute/33-01/desc/static/regions_get.md index 4a07097ee..3b1adb5f1 100644 --- a/openapi-specs/compute/33-01/desc/static/regions_get.md +++ b/openapi-specs/compute/33-01/desc/static/regions_get.md @@ -1,7 +1,7 @@ Returns a list of regions used in cloud radar. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/static/syscalls_get.md b/openapi-specs/compute/33-01/desc/static/syscalls_get.md index 9e2ddcde7..09505ba39 100644 --- a/openapi-specs/compute/33-01/desc/static/syscalls_get.md +++ b/openapi-specs/compute/33-01/desc/static/syscalls_get.md @@ -2,7 +2,7 @@ Returns a list of the Linux kernel system calls. Runtime rules for containers can allow-list and deny-list specific system calls. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/static/vulnerabilities_get.md b/openapi-specs/compute/33-01/desc/static/vulnerabilities_get.md index cb6acab28..19809472b 100644 --- a/openapi-specs/compute/33-01/desc/static/vulnerabilities_get.md +++ b/openapi-specs/compute/33-01/desc/static/vulnerabilities_get.md @@ -3,7 +3,7 @@ This data can be used for building out reports with the API. This data can be correlated with the `/api/v1/images` endpoint, specifically the the `complianceVulnerabilities` and `cveVulnerabilities` objects, to generate more thorough reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/stats/compliance.md b/openapi-specs/compute/33-01/desc/stats/compliance.md index 5c5be3991..4f4c90071 100644 --- a/openapi-specs/compute/33-01/desc/stats/compliance.md +++ b/openapi-specs/compute/33-01/desc/stats/compliance.md @@ -5,7 +5,7 @@ For the current day, the response will also include detailed compliance stats fo The following example command that uses curl and basic auth to retrieve compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/stats/compliance_get.md b/openapi-specs/compute/33-01/desc/stats/compliance_get.md index 314f6a179..2ef2f9f75 100644 --- a/openapi-specs/compute/33-01/desc/stats/compliance_get.md +++ b/openapi-specs/compute/33-01/desc/stats/compliance_get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Compliance > Compliance explorer* Refer to the following example cURL command that retrieves compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/stats/compliance_refresh.md b/openapi-specs/compute/33-01/desc/stats/compliance_refresh.md index b75491a69..d8ce211a8 100644 --- a/openapi-specs/compute/33-01/desc/stats/compliance_refresh.md +++ b/openapi-specs/compute/33-01/desc/stats/compliance_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/compliance endpoint return The following example command that uses curl and basic auth to refresh compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/stats/compliance_refresh_post.md b/openapi-specs/compute/33-01/desc/stats/compliance_refresh_post.md index 541a54d16..0f329d1db 100644 --- a/openapi-specs/compute/33-01/desc/stats/compliance_refresh_post.md +++ b/openapi-specs/compute/33-01/desc/stats/compliance_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/compliance`, b Refer to the following example cURL command that refreshes compliance statistics for the current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/stats/daily.md b/openapi-specs/compute/33-01/desc/stats/daily.md index 082f58a27..9fd4c6138 100644 --- a/openapi-specs/compute/33-01/desc/stats/daily.md +++ b/openapi-specs/compute/33-01/desc/stats/daily.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/stats/daily_get.md b/openapi-specs/compute/33-01/desc/stats/daily_get.md index 0db89bdc3..fe852126c 100644 --- a/openapi-specs/compute/33-01/desc/stats/daily_get.md +++ b/openapi-specs/compute/33-01/desc/stats/daily_get.md @@ -3,7 +3,7 @@ Returns a historical list of per-day statistics for the resources protected by P The following example command uses curl and basic auth to retrieve the daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/stats/dashboard.md b/openapi-specs/compute/33-01/desc/stats/dashboard.md index be90a2d32..1e5fabf08 100644 --- a/openapi-specs/compute/33-01/desc/stats/dashboard.md +++ b/openapi-specs/compute/33-01/desc/stats/dashboard.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/stats/dashboard_get.md b/openapi-specs/compute/33-01/desc/stats/dashboard_get.md index 601769645..8f0bc827c 100644 --- a/openapi-specs/compute/33-01/desc/stats/dashboard_get.md +++ b/openapi-specs/compute/33-01/desc/stats/dashboard_get.md @@ -5,7 +5,7 @@ Returns statistics about the resources protected by Prisma Cloud Compute, includ Refer to the following example cURL command that retrieves dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/stats/events_get.md b/openapi-specs/compute/33-01/desc/stats/events_get.md index 3be5eb4e7..e64f98e57 100644 --- a/openapi-specs/compute/33-01/desc/stats/events_get.md +++ b/openapi-specs/compute/33-01/desc/stats/events_get.md @@ -5,7 +5,7 @@ Returns events statistics for your environment. Refer to the following example cURL command retrieves event stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/stats/vulnerabilities.md b/openapi-specs/compute/33-01/desc/stats/vulnerabilities.md index 40c4dd1f1..199cfab62 100644 --- a/openapi-specs/compute/33-01/desc/stats/vulnerabilities.md +++ b/openapi-specs/compute/33-01/desc/stats/vulnerabilities.md @@ -5,7 +5,7 @@ For the current day, the response will also include descriptions of the CVEs cur The following example command that uses curl and basic auth to retrieve vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/stats/vulnerabilities_download_get.md b/openapi-specs/compute/33-01/desc/stats/vulnerabilities_download_get.md index 753af8c7f..9930a636b 100644 --- a/openapi-specs/compute/33-01/desc/stats/vulnerabilities_download_get.md +++ b/openapi-specs/compute/33-01/desc/stats/vulnerabilities_download_get.md @@ -17,7 +17,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a summary count of the CVEs and detailed descriptions for each CVE in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/stats/vulnerabilities_get.md b/openapi-specs/compute/33-01/desc/stats/vulnerabilities_get.md index 2fe5d4e18..978e96cfe 100644 --- a/openapi-specs/compute/33-01/desc/stats/vulnerabilities_get.md +++ b/openapi-specs/compute/33-01/desc/stats/vulnerabilities_get.md @@ -20,7 +20,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a summary count of the CVEs and detailed descriptions for each CVE: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/stats/vulnerabilities_impacted_resources_download_get.md b/openapi-specs/compute/33-01/desc/stats/vulnerabilities_impacted_resources_download_get.md index 0821d6a9f..502c09a6c 100644 --- a/openapi-specs/compute/33-01/desc/stats/vulnerabilities_impacted_resources_download_get.md +++ b/openapi-specs/compute/33-01/desc/stats/vulnerabilities_impacted_resources_download_get.md @@ -15,7 +15,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a list of impacted resources for `CVE-2015-0313` in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/stats/vulnerabilities_impacted_resources_get.md b/openapi-specs/compute/33-01/desc/stats/vulnerabilities_impacted_resources_get.md index c1e6d0ba2..014a5f4a2 100644 --- a/openapi-specs/compute/33-01/desc/stats/vulnerabilities_impacted_resources_get.md +++ b/openapi-specs/compute/33-01/desc/stats/vulnerabilities_impacted_resources_get.md @@ -18,7 +18,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a list of impacted resources for `CVE-2022-28391`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -95,7 +95,7 @@ Refer to the following example JSON response that shows the risk tree for the im Refer to the following example cURL command that retrieves a the impacted registry images `CVE-2015-0313` by using an optional query parameter `resourceType`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -108,7 +108,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a paginated list of impacted resources for `CVE-2015-0313` by using optional query parameters `limit` and `offset`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/stats/vulnerabilities_refresh.md b/openapi-specs/compute/33-01/desc/stats/vulnerabilities_refresh.md index 505a99d98..2aa7da8a1 100644 --- a/openapi-specs/compute/33-01/desc/stats/vulnerabilities_refresh.md +++ b/openapi-specs/compute/33-01/desc/stats/vulnerabilities_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/vulnerabilities endpoint r The following example command that uses curl and basic auth to refresh vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/stats/vulnerabilities_refresh_post.md b/openapi-specs/compute/33-01/desc/stats/vulnerabilities_refresh_post.md index 1e3210e18..85e3ddd7a 100644 --- a/openapi-specs/compute/33-01/desc/stats/vulnerabilities_refresh_post.md +++ b/openapi-specs/compute/33-01/desc/stats/vulnerabilities_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/vulnerabilitie Refer to the following example cURL command that refreshes the vulnerability statistics for current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/stats/workload_get.md b/openapi-specs/compute/33-01/desc/stats/workload_get.md index a25deed5c..940a835ee 100644 --- a/openapi-specs/compute/33-01/desc/stats/workload_get.md +++ b/openapi-specs/compute/33-01/desc/stats/workload_get.md @@ -1,7 +1,7 @@ Returns the workload statistics from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/statuses/intelligence.md b/openapi-specs/compute/33-01/desc/statuses/intelligence.md index 74da8c7ff..ac102e81f 100644 --- a/openapi-specs/compute/33-01/desc/statuses/intelligence.md +++ b/openapi-specs/compute/33-01/desc/statuses/intelligence.md @@ -3,7 +3,7 @@ Returns the connection status of the intelligence stream and the last intelligen The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/statuses/intelligence_get.md b/openapi-specs/compute/33-01/desc/statuses/intelligence_get.md index c18dd9611..b5f620ad9 100644 --- a/openapi-specs/compute/33-01/desc/statuses/intelligence_get.md +++ b/openapi-specs/compute/33-01/desc/statuses/intelligence_get.md @@ -3,7 +3,7 @@ Returns the connection status for the Intelligence Stream, along with the time o The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/statuses/registry_get.md b/openapi-specs/compute/33-01/desc/statuses/registry_get.md index 427c4915c..e4fd09fe9 100644 --- a/openapi-specs/compute/33-01/desc/statuses/registry_get.md +++ b/openapi-specs/compute/33-01/desc/statuses/registry_get.md @@ -13,7 +13,7 @@ To view the more details about the progress of a regular or on-demand registry s Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/statuses/secrets_get.md b/openapi-specs/compute/33-01/desc/statuses/secrets_get.md index 510f15161..e77c5ed70 100644 --- a/openapi-specs/compute/33-01/desc/statuses/secrets_get.md +++ b/openapi-specs/compute/33-01/desc/statuses/secrets_get.md @@ -3,7 +3,7 @@ Returns the connection status of any secret stores you have configured, as well The following is an example curl using basic auth to find the secret store status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/statuses/serverless-radar_get.md b/openapi-specs/compute/33-01/desc/statuses/serverless-radar_get.md index 3bfdbb5bf..4ab5d0c1d 100644 --- a/openapi-specs/compute/33-01/desc/statuses/serverless-radar_get.md +++ b/openapi-specs/compute/33-01/desc/statuses/serverless-radar_get.md @@ -1,7 +1,7 @@ Returns the status of the serverless scans. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/tags/get.md b/openapi-specs/compute/33-01/desc/tags/get.md index 6da7ad135..604eee98e 100644 --- a/openapi-specs/compute/33-01/desc/tags/get.md +++ b/openapi-specs/compute/33-01/desc/tags/get.md @@ -5,7 +5,7 @@ Retrieves a list of tags. Refer to the following example cURL command that retrieves a list of tags: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/tags/name_delete.md b/openapi-specs/compute/33-01/desc/tags/name_delete.md index 2ed010e57..6dedfce8f 100644 --- a/openapi-specs/compute/33-01/desc/tags/name_delete.md +++ b/openapi-specs/compute/33-01/desc/tags/name_delete.md @@ -5,7 +5,7 @@ Deletes a tag from the system. Refer to the following example cURL command that deletes a tag named *my tag*: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-01/desc/tags/name_put.md b/openapi-specs/compute/33-01/desc/tags/name_put.md index cbaea40d3..a5923b8ef 100644 --- a/openapi-specs/compute/33-01/desc/tags/name_put.md +++ b/openapi-specs/compute/33-01/desc/tags/name_put.md @@ -9,7 +9,7 @@ You must define all parameters in your PUT request. Refer to the following example cURL command that updates the parameters in a tag named `my_tag`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-01/desc/tags/post.md b/openapi-specs/compute/33-01/desc/tags/post.md index d55ae8b96..8e1a493d6 100644 --- a/openapi-specs/compute/33-01/desc/tags/post.md +++ b/openapi-specs/compute/33-01/desc/tags/post.md @@ -8,7 +8,7 @@ You can use tags as policy exceptions or assign them to vulnerabilities for acti Refer to the following example cURL command that creates a tag named "my-tag": ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/tags/tag_cve_delete.md b/openapi-specs/compute/33-01/desc/tags/tag_cve_delete.md index 8caed79cf..3031029b9 100644 --- a/openapi-specs/compute/33-01/desc/tags/tag_cve_delete.md +++ b/openapi-specs/compute/33-01/desc/tags/tag_cve_delete.md @@ -6,7 +6,7 @@ When you delete a tag, the tag is deleted from a wider scope. All the packages a Refer to the following example cURL command that removes the tag named `ignored` from the CVE `CVE-2017-15088`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-01/desc/tags/tag_cve_post.md b/openapi-specs/compute/33-01/desc/tags/tag_cve_post.md index 966a80bd8..1b4ead89b 100644 --- a/openapi-specs/compute/33-01/desc/tags/tag_cve_post.md +++ b/openapi-specs/compute/33-01/desc/tags/tag_cve_post.md @@ -45,7 +45,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the source package `perl`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -72,7 +72,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2021-20305` on the binary package `gnutls`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -98,7 +98,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -120,7 +120,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `image` and to all the packages and resources. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -140,7 +140,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `host`, resource `servo-vmware71`, and to all the packages. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/tas-droplets/download_get.md b/openapi-specs/compute/33-01/desc/tas-droplets/download_get.md index db92ec66a..7fdd6e259 100644 --- a/openapi-specs/compute/33-01/desc/tas-droplets/download_get.md +++ b/openapi-specs/compute/33-01/desc/tas-droplets/download_get.md @@ -9,7 +9,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo The following cURL command downloads all TAS droplets to a CSV file called `tas_droplets.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/tas-droplets/get.md b/openapi-specs/compute/33-01/desc/tas-droplets/get.md index d820517c2..ce07f8527 100644 --- a/openapi-specs/compute/33-01/desc/tas-droplets/get.md +++ b/openapi-specs/compute/33-01/desc/tas-droplets/get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > VMware Tanzu bl The following cURL command retrieves all TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/tas-droplets/get_tas_addresses.md b/openapi-specs/compute/33-01/desc/tas-droplets/get_tas_addresses.md index 528281613..8333cd24f 100644 --- a/openapi-specs/compute/33-01/desc/tas-droplets/get_tas_addresses.md +++ b/openapi-specs/compute/33-01/desc/tas-droplets/get_tas_addresses.md @@ -9,7 +9,7 @@ Gets the Cloud Controller Addresses of scanned Tanzu Application Service (TAS) d The following cURL command retrieves the Cloud Controller Addresses of scanned TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/tas-droplets/progress_get.md b/openapi-specs/compute/33-01/desc/tas-droplets/progress_get.md index 504a21e84..507d001bf 100644 --- a/openapi-specs/compute/33-01/desc/tas-droplets/progress_get.md +++ b/openapi-specs/compute/33-01/desc/tas-droplets/progress_get.md @@ -5,7 +5,7 @@ Returns the details of the TAS Droplets ongoing scan. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/tas-droplets/scan_post.md b/openapi-specs/compute/33-01/desc/tas-droplets/scan_post.md index aad2174af..13c4eeeb9 100644 --- a/openapi-specs/compute/33-01/desc/tas-droplets/scan_post.md +++ b/openapi-specs/compute/33-01/desc/tas-droplets/scan_post.md @@ -5,7 +5,7 @@ Scans the TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/tas-droplets/stop_post.md b/openapi-specs/compute/33-01/desc/tas-droplets/stop_post.md index 5f5a019b1..53d709ec7 100644 --- a/openapi-specs/compute/33-01/desc/tas-droplets/stop_post.md +++ b/openapi-specs/compute/33-01/desc/tas-droplets/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing scan of TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/trust/data_get.md b/openapi-specs/compute/33-01/desc/trust/data_get.md index dd55d47a3..88983f139 100644 --- a/openapi-specs/compute/33-01/desc/trust/data_get.md +++ b/openapi-specs/compute/33-01/desc/trust/data_get.md @@ -5,7 +5,7 @@ Returns the trusted registries, repositories, and images. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/trust/data_put.md b/openapi-specs/compute/33-01/desc/trust/data_put.md index 0e6a0ba49..733514505 100644 --- a/openapi-specs/compute/33-01/desc/trust/data_put.md +++ b/openapi-specs/compute/33-01/desc/trust/data_put.md @@ -6,7 +6,7 @@ Specify trusted images using either the image name or layers properties. Refer to the following example cURL command that uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -19,7 +19,7 @@ To edit a trust group based on image base layers, use PUT to specify a list of S Refer to the following example that specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-01/desc/trust/get.md b/openapi-specs/compute/33-01/desc/trust/get.md index 1226cd0a3..57ff5bdb5 100644 --- a/openapi-specs/compute/33-01/desc/trust/get.md +++ b/openapi-specs/compute/33-01/desc/trust/get.md @@ -3,7 +3,7 @@ Retrieves a list of all trusted images. The following example curl command uses basic auth to retrieve all trusted images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/trust/id_delete.md b/openapi-specs/compute/33-01/desc/trust/id_delete.md index b3114775f..d63cdf71a 100644 --- a/openapi-specs/compute/33-01/desc/trust/id_delete.md +++ b/openapi-specs/compute/33-01/desc/trust/id_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to specify a image trust grou ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-01/desc/trust/id_put.md b/openapi-specs/compute/33-01/desc/trust/id_put.md index 44d2c8b8b..c98617bcd 100644 --- a/openapi-specs/compute/33-01/desc/trust/id_put.md +++ b/openapi-specs/compute/33-01/desc/trust/id_put.md @@ -9,7 +9,7 @@ For more information about handles, see the `_id` in the response body for the G The following example curl command uses basic auth to modify the image property for an existing trusted image entry, where the handle for the entry is `docker-ubuntu-group`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-01/desc/trust/learn_get.md b/openapi-specs/compute/33-01/desc/trust/learn_get.md index d8a3414d0..004b16b02 100644 --- a/openapi-specs/compute/33-01/desc/trust/learn_get.md +++ b/openapi-specs/compute/33-01/desc/trust/learn_get.md @@ -1,7 +1,7 @@ Returns the state of the trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/trust/learn_post.md b/openapi-specs/compute/33-01/desc/trust/learn_post.md index 094817738..008657fa2 100644 --- a/openapi-specs/compute/33-01/desc/trust/learn_post.md +++ b/openapi-specs/compute/33-01/desc/trust/learn_post.md @@ -1,7 +1,7 @@ Sets the state of trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/trust/post.md b/openapi-specs/compute/33-01/desc/trust/post.md index 1072275a1..23a324c6c 100644 --- a/openapi-specs/compute/33-01/desc/trust/post.md +++ b/openapi-specs/compute/33-01/desc/trust/post.md @@ -7,7 +7,7 @@ For more information about handles, see the `_id` key in the response body for t The following example curl command uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ To create a trust group based on image base layers, POST a list of SHA256 hashes The following example specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/users/get.md b/openapi-specs/compute/33-01/desc/users/get.md index e4e6966ec..cd5a661ba 100644 --- a/openapi-specs/compute/33-01/desc/users/get.md +++ b/openapi-specs/compute/33-01/desc/users/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Manage > Authentication > Users** in the Console UI. The following cURL command retrieves all users. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/users/id_delete.md b/openapi-specs/compute/33-01/desc/users/id_delete.md index 1cfa5642d..66a1102f9 100644 --- a/openapi-specs/compute/33-01/desc/users/id_delete.md +++ b/openapi-specs/compute/33-01/desc/users/id_delete.md @@ -17,7 +17,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes user `ID` from the system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-01/desc/util/osx_twistcli_arm64_get.md b/openapi-specs/compute/33-01/desc/util/osx_twistcli_arm64_get.md index b385d0d3b..a30686374 100644 --- a/openapi-specs/compute/33-01/desc/util/osx_twistcli_arm64_get.md +++ b/openapi-specs/compute/33-01/desc/util/osx_twistcli_arm64_get.md @@ -7,7 +7,7 @@ Downloads the twistcli binary executable for MacOS platforms based on ARM64 arch Refer to the following example cURL command that downloads and saves the “twistcli” binary executable for ARM64 bit MacOS platforms to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/compute/33-01/desc/util/osx_twistcli_get.md b/openapi-specs/compute/33-01/desc/util/osx_twistcli_get.md index c49f96c41..2353ea338 100644 --- a/openapi-specs/compute/33-01/desc/util/osx_twistcli_get.md +++ b/openapi-specs/compute/33-01/desc/util/osx_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **MacOS platform** hyperlink in **Manage > System > Ut The following cURL command downloads the twistcli binary executable for MacOS platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli \ diff --git a/openapi-specs/compute/33-01/desc/util/twistcli_arm64_get.md b/openapi-specs/compute/33-01/desc/util/twistcli_arm64_get.md index 7ec36d3f5..a3d7318ab 100644 --- a/openapi-specs/compute/33-01/desc/util/twistcli_arm64_get.md +++ b/openapi-specs/compute/33-01/desc/util/twistcli_arm64_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/compute/33-01/desc/util/twistcli_get.md b/openapi-specs/compute/33-01/desc/util/twistcli_get.md index f9d2d295c..08a3ae8aa 100644 --- a/openapi-specs/compute/33-01/desc/util/twistcli_get.md +++ b/openapi-specs/compute/33-01/desc/util/twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -X GET -o \ 'https:///api/v/util/twistcli' diff --git a/openapi-specs/compute/33-01/desc/util/twistlock_jenkins_plugin_get.md b/openapi-specs/compute/33-01/desc/util/twistlock_jenkins_plugin_get.md index 9fb8d4a02..c9f180e5e 100644 --- a/openapi-specs/compute/33-01/desc/util/twistlock_jenkins_plugin_get.md +++ b/openapi-specs/compute/33-01/desc/util/twistlock_jenkins_plugin_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-jenkins-plugin.hpi \ diff --git a/openapi-specs/compute/33-01/desc/util/twistlock_tas_tile_get.md b/openapi-specs/compute/33-01/desc/util/twistlock_tas_tile_get.md index fea28aaad..3fd114e2d 100644 --- a/openapi-specs/compute/33-01/desc/util/twistlock_tas_tile_get.md +++ b/openapi-specs/compute/33-01/desc/util/twistlock_tas_tile_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-tile.pivotal \ diff --git a/openapi-specs/compute/33-01/desc/util/windows_twistcli_get.md b/openapi-specs/compute/33-01/desc/util/windows_twistcli_get.md index 1c545dbbb..38c609b08 100644 --- a/openapi-specs/compute/33-01/desc/util/windows_twistcli_get.md +++ b/openapi-specs/compute/33-01/desc/util/windows_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Windows platform** hyperlink in **Manage > System > The following cURL command downloads the twistcli binary executable for Windows platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli.exe \ diff --git a/openapi-specs/compute/33-01/desc/version/get.md b/openapi-specs/compute/33-01/desc/version/get.md index 28be315e0..5787e90fd 100644 --- a/openapi-specs/compute/33-01/desc/version/get.md +++ b/openapi-specs/compute/33-01/desc/version/get.md @@ -5,7 +5,7 @@ Retrieves the version number for Console. The following cURL command retrieves the version number for Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/vms/download_get.md b/openapi-specs/compute/33-01/desc/vms/download_get.md index e65e4efc9..3cc813bc5 100644 --- a/openapi-specs/compute/33-01/desc/vms/download_get.md +++ b/openapi-specs/compute/33-01/desc/vms/download_get.md @@ -7,7 +7,7 @@ Returns all VM image scan reports in CSV format. Refer to the following example cURL command that retrieves all VM image scan reports and saves the results in a CSV file called `vm_images_scan.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/vms/get.md b/openapi-specs/compute/33-01/desc/vms/get.md index e78a28c76..03ed8deb3 100644 --- a/openapi-specs/compute/33-01/desc/vms/get.md +++ b/openapi-specs/compute/33-01/desc/vms/get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > Hosts > VM imag Refer to the following example cURL command that retrieves all VM image scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/vms/labels_get.md b/openapi-specs/compute/33-01/desc/vms/labels_get.md index 0aed1a217..f509da479 100644 --- a/openapi-specs/compute/33-01/desc/vms/labels_get.md +++ b/openapi-specs/compute/33-01/desc/vms/labels_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-01/desc/vms/names_get.md b/openapi-specs/compute/33-01/desc/vms/names_get.md index 1145cfa0d..9f92e0156 100644 --- a/openapi-specs/compute/33-01/desc/vms/names_get.md +++ b/openapi-specs/compute/33-01/desc/vms/names_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/33-01/desc/vms/scan_post.md b/openapi-specs/compute/33-01/desc/vms/scan_post.md index 1caa2dcaf..4d4de3ab1 100644 --- a/openapi-specs/compute/33-01/desc/vms/scan_post.md +++ b/openapi-specs/compute/33-01/desc/vms/scan_post.md @@ -5,7 +5,7 @@ Re-scans all VM images immediately. This endpoint returns the time that the scan Refer to the following example cURL command that forces Prisma Cloud to re-scan all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-01/desc/vms/stop_post.md b/openapi-specs/compute/33-01/desc/vms/stop_post.md index 4a74743eb..49b2b26f9 100644 --- a/openapi-specs/compute/33-01/desc/vms/stop_post.md +++ b/openapi-specs/compute/33-01/desc/vms/stop_post.md @@ -7,7 +7,7 @@ Note: It might take a few minutes for the scan to stop completely. Refer to the following example cURL command that forces Prisma Cloud to stop scanning all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/SCAP/get.md b/openapi-specs/compute/33-02/desc/SCAP/get.md index a25abe94e..f5870d822 100644 --- a/openapi-specs/compute/33-02/desc/SCAP/get.md +++ b/openapi-specs/compute/33-02/desc/SCAP/get.md @@ -3,7 +3,7 @@ This endpoint will return any SCAP datastreams uploaded to the console. This end The following is an example curl command that uses basic auth to retrieve any uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/SCAP/id_delete.md b/openapi-specs/compute/33-02/desc/SCAP/id_delete.md index 39f1b0132..52923f20a 100644 --- a/openapi-specs/compute/33-02/desc/SCAP/id_delete.md +++ b/openapi-specs/compute/33-02/desc/SCAP/id_delete.md @@ -3,7 +3,7 @@ This endpoint will delete any SCAP datastreams uploaded to the console. You can The following is an example curl command that uses basic auth to delete an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-02/desc/SCAP/post.md b/openapi-specs/compute/33-02/desc/SCAP/post.md index d459a0e97..c45fd6b4e 100644 --- a/openapi-specs/compute/33-02/desc/SCAP/post.md +++ b/openapi-specs/compute/33-02/desc/SCAP/post.md @@ -3,7 +3,7 @@ This endpoint will allow you to add a SCAP datastream to the console. The following is an example curl command that uses basic auth to add an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/_ping/get.md b/openapi-specs/compute/33-02/desc/_ping/get.md index 8e143ef67..b7ffdc653 100644 --- a/openapi-specs/compute/33-02/desc/_ping/get.md +++ b/openapi-specs/compute/33-02/desc/_ping/get.md @@ -5,7 +5,7 @@ Checks if Console is reachable from your network host. Refer to the following cURL example command that pings Console and prints the HTTP response code: ```bash -$ curl -k \ +$ curl \ -s \ -o /dev/null \ -w "%{http_code}\n" \ diff --git a/openapi-specs/compute/33-02/desc/agentless/get_agentless_progress.md b/openapi-specs/compute/33-02/desc/agentless/get_agentless_progress.md index b98ed9da5..78396eec6 100644 --- a/openapi-specs/compute/33-02/desc/agentless/get_agentless_progress.md +++ b/openapi-specs/compute/33-02/desc/agentless/get_agentless_progress.md @@ -5,7 +5,7 @@ Shows the progress of an ongoing scan on hosts or containers for vulnerabilities Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/agentless/post_agentless_scan.md b/openapi-specs/compute/33-02/desc/agentless/post_agentless_scan.md index f1295cdc4..e2f8a4e11 100644 --- a/openapi-specs/compute/33-02/desc/agentless/post_agentless_scan.md +++ b/openapi-specs/compute/33-02/desc/agentless/post_agentless_scan.md @@ -9,7 +9,7 @@ Make sure that you download (use the agentless/templates API) and apply the perm Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/agentless/post_agentless_stop.md b/openapi-specs/compute/33-02/desc/agentless/post_agentless_stop.md index ab83960cc..ddee6ec7a 100644 --- a/openapi-specs/compute/33-02/desc/agentless/post_agentless_stop.md +++ b/openapi-specs/compute/33-02/desc/agentless/post_agentless_stop.md @@ -5,7 +5,7 @@ Stops an ongoing scan on hosts or containers for vulnerabilities and compliance. Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/agentless/post_agentless_templates.md b/openapi-specs/compute/33-02/desc/agentless/post_agentless_templates.md index 96be32555..5159c439a 100644 --- a/openapi-specs/compute/33-02/desc/agentless/post_agentless_templates.md +++ b/openapi-specs/compute/33-02/desc/agentless/post_agentless_templates.md @@ -31,7 +31,7 @@ Add the supported cloud accounts (AWS, Azure, GCP, and OCI) in Prisma Cloud Comp Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/alert-profiles/get.md b/openapi-specs/compute/33-02/desc/alert-profiles/get.md index 82647e248..f17191ac4 100644 --- a/openapi-specs/compute/33-02/desc/alert-profiles/get.md +++ b/openapi-specs/compute/33-02/desc/alert-profiles/get.md @@ -3,7 +3,7 @@ Retrieve a list of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/alert-profiles/id_delete.md b/openapi-specs/compute/33-02/desc/alert-profiles/id_delete.md index 1a67fe20e..2cf21b57e 100644 --- a/openapi-specs/compute/33-02/desc/alert-profiles/id_delete.md +++ b/openapi-specs/compute/33-02/desc/alert-profiles/id_delete.md @@ -5,7 +5,7 @@ This method has no response data. The following example curl command deletes an existing alert profile named `PROFILE-NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-02/desc/alert-profiles/names_get.md b/openapi-specs/compute/33-02/desc/alert-profiles/names_get.md index cac14437b..38a1f78ca 100644 --- a/openapi-specs/compute/33-02/desc/alert-profiles/names_get.md +++ b/openapi-specs/compute/33-02/desc/alert-profiles/names_get.md @@ -3,7 +3,7 @@ Retrieve a list of only the names of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles' names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/alert-profiles/post.md b/openapi-specs/compute/33-02/desc/alert-profiles/post.md index 9fa643429..19db863d5 100644 --- a/openapi-specs/compute/33-02/desc/alert-profiles/post.md +++ b/openapi-specs/compute/33-02/desc/alert-profiles/post.md @@ -3,7 +3,7 @@ Update an existing alert profile created in the system. The following example curl command uses basic auth to add a Jira Alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/alert-profiles/test_post.md b/openapi-specs/compute/33-02/desc/alert-profiles/test_post.md index 1fc745efa..2205a6e73 100644 --- a/openapi-specs/compute/33-02/desc/alert-profiles/test_post.md +++ b/openapi-specs/compute/33-02/desc/alert-profiles/test_post.md @@ -3,7 +3,7 @@ Sends a test alert to verify successful configuration of the alert profile setti The following example curl command uses basic auth to send test alert for an email alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/application-control/get.md b/openapi-specs/compute/33-02/desc/application-control/get.md index 5bd600beb..535584284 100644 --- a/openapi-specs/compute/33-02/desc/application-control/get.md +++ b/openapi-specs/compute/33-02/desc/application-control/get.md @@ -3,7 +3,7 @@ Retrieves the host application control rules. The following example curl command uses basic auth to retrieve the control rules: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/access_delete.md b/openapi-specs/compute/33-02/desc/audits/access_delete.md index 37f33ca64..0450b534c 100644 --- a/openapi-specs/compute/33-02/desc/audits/access_delete.md +++ b/openapi-specs/compute/33-02/desc/audits/access_delete.md @@ -2,7 +2,7 @@ Deletes **all** access audits. This deletion cannot be undone. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-02/desc/audits/access_download_get.md b/openapi-specs/compute/33-02/desc/audits/access_download_get.md index 1700deb8d..8d8fee259 100644 --- a/openapi-specs/compute/33-02/desc/audits/access_download_get.md +++ b/openapi-specs/compute/33-02/desc/audits/access_download_get.md @@ -3,7 +3,7 @@ Returns the docker access audit events data in CSV format that are logged and ag **Note**: You can download the access events from Console under **Monitor > Events > Docker audits > Download CSV**. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/access_filters_get.md b/openapi-specs/compute/33-02/desc/audits/access_filters_get.md index 00ac061c1..4b8e9cd9b 100644 --- a/openapi-specs/compute/33-02/desc/audits/access_filters_get.md +++ b/openapi-specs/compute/33-02/desc/audits/access_filters_get.md @@ -5,7 +5,7 @@ The following example uses basic auth to list history of commands that are run o ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ The following command gives list of sudo events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -27,7 +27,7 @@ $ curl -k \ The following command gives list of SSHD events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/access_get.md b/openapi-specs/compute/33-02/desc/audits/access_get.md index 2401391c7..56e53fe12 100644 --- a/openapi-specs/compute/33-02/desc/audits/access_get.md +++ b/openapi-specs/compute/33-02/desc/audits/access_get.md @@ -8,7 +8,7 @@ You can configure Prisma Cloud Compute to log and aggregate events such as sudo Refer to the following example cURL command that gives a list of all access audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/admission_download_get.md b/openapi-specs/compute/33-02/desc/audits/admission_download_get.md index 9571c483f..d45f47c4e 100644 --- a/openapi-specs/compute/33-02/desc/audits/admission_download_get.md +++ b/openapi-specs/compute/33-02/desc/audits/admission_download_get.md @@ -4,7 +4,7 @@ Returns the access admission events data in CSV format that were alerted or bloc Refer to the following example cURL command that downloads the admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/admission_get.md b/openapi-specs/compute/33-02/desc/audits/admission_get.md index 84414496c..3640c737c 100644 --- a/openapi-specs/compute/33-02/desc/audits/admission_get.md +++ b/openapi-specs/compute/33-02/desc/audits/admission_get.md @@ -4,7 +4,7 @@ Returns all activities that were alerted or blocked by Defender functioning as O Refer to the following example cURL command that gives a list of all admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/firewall_network_container_download_get.md b/openapi-specs/compute/33-02/desc/audits/firewall_network_container_download_get.md index 29029ac6d..434e09acd 100644 --- a/openapi-specs/compute/33-02/desc/audits/firewall_network_container_download_get.md +++ b/openapi-specs/compute/33-02/desc/audits/firewall_network_container_download_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/firewall_network_container_get.md b/openapi-specs/compute/33-02/desc/audits/firewall_network_container_get.md index 454558a44..be03b2c45 100644 --- a/openapi-specs/compute/33-02/desc/audits/firewall_network_container_get.md +++ b/openapi-specs/compute/33-02/desc/audits/firewall_network_container_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/firewall_network_host_download_get.md b/openapi-specs/compute/33-02/desc/audits/firewall_network_host_download_get.md index 768dd00d7..e83e8e1c3 100644 --- a/openapi-specs/compute/33-02/desc/audits/firewall_network_host_download_get.md +++ b/openapi-specs/compute/33-02/desc/audits/firewall_network_host_download_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/firewall_network_host_get.md b/openapi-specs/compute/33-02/desc/audits/firewall_network_host_get.md index e5dc4c399..6cbda0d4b 100644 --- a/openapi-specs/compute/33-02/desc/audits/firewall_network_host_get.md +++ b/openapi-specs/compute/33-02/desc/audits/firewall_network_host_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/incidents_archive_patch.md b/openapi-specs/compute/33-02/desc/audits/incidents_archive_patch.md index a1127a001..d1f42eedd 100644 --- a/openapi-specs/compute/33-02/desc/audits/incidents_archive_patch.md +++ b/openapi-specs/compute/33-02/desc/audits/incidents_archive_patch.md @@ -7,7 +7,7 @@ You can get an incident ID from the list of incidents using the endpoint GET /ap Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/compute/33-02/desc/audits/incidents_download_get.md b/openapi-specs/compute/33-02/desc/audits/incidents_download_get.md index 2266c3471..5958756bf 100644 --- a/openapi-specs/compute/33-02/desc/audits/incidents_download_get.md +++ b/openapi-specs/compute/33-02/desc/audits/incidents_download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the **CSV** hyperlink in **Monitor > Runtime > Incident ex The following cURL command downloads all incidents and saves the result in a CSV file called `incidents.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/incidents_filters_get.md b/openapi-specs/compute/33-02/desc/audits/incidents_filters_get.md index 7d1c6f303..856881c90 100644 --- a/openapi-specs/compute/33-02/desc/audits/incidents_filters_get.md +++ b/openapi-specs/compute/33-02/desc/audits/incidents_filters_get.md @@ -3,7 +3,7 @@ This endpoint lists the incident categories found in your environment. The following example lists incident filters. ```bash -$ curl -k \ +$ curl \ -u \ https://console:8083/api/v1/audits/incidents/filters ``` diff --git a/openapi-specs/compute/33-02/desc/audits/incidents_get.md b/openapi-specs/compute/33-02/desc/audits/incidents_get.md index 7724a08c1..9b9451821 100644 --- a/openapi-specs/compute/33-02/desc/audits/incidents_get.md +++ b/openapi-specs/compute/33-02/desc/audits/incidents_get.md @@ -9,7 +9,7 @@ This endpoint maps to the table in **Monitor > Runtime > Incident explorer** in Refer to the following example cURL command that retrieves a list of unacknowledged incidents (not in the archived state): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/kubernetes_download_get.md b/openapi-specs/compute/33-02/desc/audits/kubernetes_download_get.md index 6008bd92a..62992095c 100644 --- a/openapi-specs/compute/33-02/desc/audits/kubernetes_download_get.md +++ b/openapi-specs/compute/33-02/desc/audits/kubernetes_download_get.md @@ -7,7 +7,7 @@ Returns the audit events data that occur in an integrated Kubernetes cluster tha Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/kubernetes_get.md b/openapi-specs/compute/33-02/desc/audits/kubernetes_get.md index e1ecb8a88..2e3f51b71 100644 --- a/openapi-specs/compute/33-02/desc/audits/kubernetes_get.md +++ b/openapi-specs/compute/33-02/desc/audits/kubernetes_get.md @@ -7,7 +7,7 @@ Retrieves events that occur in an integrated Kubernetes cluster that you configu Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/mgmt_download_get.md b/openapi-specs/compute/33-02/desc/audits/mgmt_download_get.md index ae3ef45b6..bcee17342 100644 --- a/openapi-specs/compute/33-02/desc/audits/mgmt_download_get.md +++ b/openapi-specs/compute/33-02/desc/audits/mgmt_download_get.md @@ -10,7 +10,7 @@ Management audits are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/mgmt_filters_get.md b/openapi-specs/compute/33-02/desc/audits/mgmt_filters_get.md index 854977b99..f910a4c2a 100644 --- a/openapi-specs/compute/33-02/desc/audits/mgmt_filters_get.md +++ b/openapi-specs/compute/33-02/desc/audits/mgmt_filters_get.md @@ -6,7 +6,7 @@ Use these filters to query management audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/mgmt_get.md b/openapi-specs/compute/33-02/desc/audits/mgmt_get.md index 5b586cb5e..abe802348 100644 --- a/openapi-specs/compute/33-02/desc/audits/mgmt_get.md +++ b/openapi-specs/compute/33-02/desc/audits/mgmt_get.md @@ -10,7 +10,7 @@ Management audit events are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/runtime_app_embedded_download_get.md b/openapi-specs/compute/33-02/desc/audits/runtime_app_embedded_download_get.md index f3d844ead..ec5ae0f2a 100644 --- a/openapi-specs/compute/33-02/desc/audits/runtime_app_embedded_download_get.md +++ b/openapi-specs/compute/33-02/desc/audits/runtime_app_embedded_download_get.md @@ -5,7 +5,7 @@ Returns the app-embedded runtime audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/runtime_app_embedded_get.md b/openapi-specs/compute/33-02/desc/audits/runtime_app_embedded_get.md index c1d72acfa..51a43b7f5 100644 --- a/openapi-specs/compute/33-02/desc/audits/runtime_app_embedded_get.md +++ b/openapi-specs/compute/33-02/desc/audits/runtime_app_embedded_get.md @@ -5,7 +5,7 @@ Retrieves all app-embedded runtime audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/runtime_container_delete.md b/openapi-specs/compute/33-02/desc/audits/runtime_container_delete.md index ddc8e82d6..62050c71f 100644 --- a/openapi-specs/compute/33-02/desc/audits/runtime_container_delete.md +++ b/openapi-specs/compute/33-02/desc/audits/runtime_container_delete.md @@ -3,7 +3,7 @@ Deletes all container runtime audits. The following example curl command uses basic auth to delete all the audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-02/desc/audits/runtime_container_download_get.md b/openapi-specs/compute/33-02/desc/audits/runtime_container_download_get.md index 20e673b5e..81286d929 100644 --- a/openapi-specs/compute/33-02/desc/audits/runtime_container_download_get.md +++ b/openapi-specs/compute/33-02/desc/audits/runtime_container_download_get.md @@ -6,7 +6,7 @@ Returns the container audit events data in CSV format when a runtime sensor such Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o \ diff --git a/openapi-specs/compute/33-02/desc/audits/runtime_container_get.md b/openapi-specs/compute/33-02/desc/audits/runtime_container_get.md index 11beffb24..a6b6ba484 100644 --- a/openapi-specs/compute/33-02/desc/audits/runtime_container_get.md +++ b/openapi-specs/compute/33-02/desc/audits/runtime_container_get.md @@ -7,7 +7,7 @@ Retrieves all container audit events when a runtime sensor such as process, netw Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/runtime_container_timeslice_get.md b/openapi-specs/compute/33-02/desc/audits/runtime_container_timeslice_get.md index f65d477af..01df48f28 100644 --- a/openapi-specs/compute/33-02/desc/audits/runtime_container_timeslice_get.md +++ b/openapi-specs/compute/33-02/desc/audits/runtime_container_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/runtime_file-integrity_download_get.md b/openapi-specs/compute/33-02/desc/audits/runtime_file-integrity_download_get.md index 99ec70c52..234c3ce32 100644 --- a/openapi-specs/compute/33-02/desc/audits/runtime_file-integrity_download_get.md +++ b/openapi-specs/compute/33-02/desc/audits/runtime_file-integrity_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for file-integrity checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/runtime_file-integrity_get.md b/openapi-specs/compute/33-02/desc/audits/runtime_file-integrity_get.md index 53fec9f9f..c31904422 100644 --- a/openapi-specs/compute/33-02/desc/audits/runtime_file-integrity_get.md +++ b/openapi-specs/compute/33-02/desc/audits/runtime_file-integrity_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for file-integrity checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/runtime_host_delete.md b/openapi-specs/compute/33-02/desc/audits/runtime_host_delete.md index 0ab1c877e..2ada9b15a 100644 --- a/openapi-specs/compute/33-02/desc/audits/runtime_host_delete.md +++ b/openapi-specs/compute/33-02/desc/audits/runtime_host_delete.md @@ -3,7 +3,7 @@ Deletes all host audits from the database. The following example curl command uses basic auth to delete all host audits: ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/audits/runtime/host diff --git a/openapi-specs/compute/33-02/desc/audits/runtime_host_download_get.md b/openapi-specs/compute/33-02/desc/audits/runtime_host_download_get.md index 4d0454f56..d85cc39d0 100644 --- a/openapi-specs/compute/33-02/desc/audits/runtime_host_download_get.md +++ b/openapi-specs/compute/33-02/desc/audits/runtime_host_download_get.md @@ -5,7 +5,7 @@ Returns the runtime host audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/runtime_host_get.md b/openapi-specs/compute/33-02/desc/audits/runtime_host_get.md index 044b8b42d..e063550d6 100644 --- a/openapi-specs/compute/33-02/desc/audits/runtime_host_get.md +++ b/openapi-specs/compute/33-02/desc/audits/runtime_host_get.md @@ -5,7 +5,7 @@ Retrieves the runtime host audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/runtime_host_timeslice_get.md b/openapi-specs/compute/33-02/desc/audits/runtime_host_timeslice_get.md index 8933efa74..aafd869b8 100644 --- a/openapi-specs/compute/33-02/desc/audits/runtime_host_timeslice_get.md +++ b/openapi-specs/compute/33-02/desc/audits/runtime_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/runtime_log-inspection_download_get.md b/openapi-specs/compute/33-02/desc/audits/runtime_log-inspection_download_get.md index f047ed96f..0aa1a5710 100644 --- a/openapi-specs/compute/33-02/desc/audits/runtime_log-inspection_download_get.md +++ b/openapi-specs/compute/33-02/desc/audits/runtime_log-inspection_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for log inspection checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/runtime_log-inspection_get.md b/openapi-specs/compute/33-02/desc/audits/runtime_log-inspection_get.md index 49f0d7be4..8292b623e 100644 --- a/openapi-specs/compute/33-02/desc/audits/runtime_log-inspection_get.md +++ b/openapi-specs/compute/33-02/desc/audits/runtime_log-inspection_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for log inspection checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/runtime_rasp_delete.md b/openapi-specs/compute/33-02/desc/audits/runtime_rasp_delete.md index 688e04038..14315c55b 100644 --- a/openapi-specs/compute/33-02/desc/audits/runtime_rasp_delete.md +++ b/openapi-specs/compute/33-02/desc/audits/runtime_rasp_delete.md @@ -1,7 +1,7 @@ Deletes all RASP Defender runtime audits. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-02/desc/audits/runtime_rasp_download_get.md b/openapi-specs/compute/33-02/desc/audits/runtime_rasp_download_get.md index 303c75858..11a85100d 100644 --- a/openapi-specs/compute/33-02/desc/audits/runtime_rasp_download_get.md +++ b/openapi-specs/compute/33-02/desc/audits/runtime_rasp_download_get.md @@ -1,7 +1,7 @@ Returns CSV data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/runtime_rasp_get.md b/openapi-specs/compute/33-02/desc/audits/runtime_rasp_get.md index 229d908b1..0475cb149 100644 --- a/openapi-specs/compute/33-02/desc/audits/runtime_rasp_get.md +++ b/openapi-specs/compute/33-02/desc/audits/runtime_rasp_get.md @@ -1,7 +1,7 @@ Returns JSON data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/runtime_serverless_delete.md b/openapi-specs/compute/33-02/desc/audits/runtime_serverless_delete.md index 99ada0515..e27ebe858 100644 --- a/openapi-specs/compute/33-02/desc/audits/runtime_serverless_delete.md +++ b/openapi-specs/compute/33-02/desc/audits/runtime_serverless_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to delete the current audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-02/desc/audits/runtime_serverless_download_get.md b/openapi-specs/compute/33-02/desc/audits/runtime_serverless_download_get.md index f829d2342..91693c145 100644 --- a/openapi-specs/compute/33-02/desc/audits/runtime_serverless_download_get.md +++ b/openapi-specs/compute/33-02/desc/audits/runtime_serverless_download_get.md @@ -5,7 +5,7 @@ Returns the scan audit events data in CSV format for any configured serverless f Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/runtime_serverless_filters_get.md b/openapi-specs/compute/33-02/desc/audits/runtime_serverless_filters_get.md index b9bf38610..babda78dd 100644 --- a/openapi-specs/compute/33-02/desc/audits/runtime_serverless_filters_get.md +++ b/openapi-specs/compute/33-02/desc/audits/runtime_serverless_filters_get.md @@ -2,7 +2,7 @@ Returns all serverless filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/runtime_serverless_get.md b/openapi-specs/compute/33-02/desc/audits/runtime_serverless_get.md index 045946886..f6aeb748e 100644 --- a/openapi-specs/compute/33-02/desc/audits/runtime_serverless_get.md +++ b/openapi-specs/compute/33-02/desc/audits/runtime_serverless_get.md @@ -5,7 +5,7 @@ Retrieves all scan events for any configured serverless functions in Prisma Clou Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/runtime_serverless_timeslice_get.md b/openapi-specs/compute/33-02/desc/audits/runtime_serverless_timeslice_get.md index 863890174..a2456cec0 100644 --- a/openapi-specs/compute/33-02/desc/audits/runtime_serverless_timeslice_get.md +++ b/openapi-specs/compute/33-02/desc/audits/runtime_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/trust_delete.md b/openapi-specs/compute/33-02/desc/audits/trust_delete.md index 0bfb2bd81..4aaeef3fe 100644 --- a/openapi-specs/compute/33-02/desc/audits/trust_delete.md +++ b/openapi-specs/compute/33-02/desc/audits/trust_delete.md @@ -1,7 +1,7 @@ Deletes all the trust audits from the events page in Console. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-02/desc/audits/trust_download_get.md b/openapi-specs/compute/33-02/desc/audits/trust_download_get.md index 21c0e55a2..234089449 100644 --- a/openapi-specs/compute/33-02/desc/audits/trust_download_get.md +++ b/openapi-specs/compute/33-02/desc/audits/trust_download_get.md @@ -5,7 +5,7 @@ Returns the trust audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/trust_get.md b/openapi-specs/compute/33-02/desc/audits/trust_get.md index 8fb3a341d..de7d47e96 100644 --- a/openapi-specs/compute/33-02/desc/audits/trust_get.md +++ b/openapi-specs/compute/33-02/desc/audits/trust_get.md @@ -4,7 +4,7 @@ Retrieves all the trust audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/waas_agentless_download_get.md b/openapi-specs/compute/33-02/desc/audits/waas_agentless_download_get.md index bbfcd12f5..f930ef6b3 100644 --- a/openapi-specs/compute/33-02/desc/audits/waas_agentless_download_get.md +++ b/openapi-specs/compute/33-02/desc/audits/waas_agentless_download_get.md @@ -7,7 +7,7 @@ Returns the agentless Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/waas_agentless_get.md b/openapi-specs/compute/33-02/desc/audits/waas_agentless_get.md index ad40ae497..b257b0385 100644 --- a/openapi-specs/compute/33-02/desc/audits/waas_agentless_get.md +++ b/openapi-specs/compute/33-02/desc/audits/waas_agentless_get.md @@ -7,7 +7,7 @@ Retrieves all agentless Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/waas_agentless_timeslice_get.md b/openapi-specs/compute/33-02/desc/audits/waas_agentless_timeslice_get.md index 007c6dba3..3eaf34b25 100644 --- a/openapi-specs/compute/33-02/desc/audits/waas_agentless_timeslice_get.md +++ b/openapi-specs/compute/33-02/desc/audits/waas_agentless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/waas_app_embedded_download_get.md b/openapi-specs/compute/33-02/desc/audits/waas_app_embedded_download_get.md index 149c10376..c94aa87b0 100644 --- a/openapi-specs/compute/33-02/desc/audits/waas_app_embedded_download_get.md +++ b/openapi-specs/compute/33-02/desc/audits/waas_app_embedded_download_get.md @@ -6,7 +6,7 @@ Returns the app-embedded WAAS audit events data in CSV format for the specified Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/waas_app_embedded_get.md b/openapi-specs/compute/33-02/desc/audits/waas_app_embedded_get.md index 400fa447d..6318fb299 100644 --- a/openapi-specs/compute/33-02/desc/audits/waas_app_embedded_get.md +++ b/openapi-specs/compute/33-02/desc/audits/waas_app_embedded_get.md @@ -6,7 +6,7 @@ Returns all app-embedded WAAS audit events for the specified query parameters. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/waas_app_embedded_timeslice_get.md b/openapi-specs/compute/33-02/desc/audits/waas_app_embedded_timeslice_get.md index 79a60038e..42a76d08c 100644 --- a/openapi-specs/compute/33-02/desc/audits/waas_app_embedded_timeslice_get.md +++ b/openapi-specs/compute/33-02/desc/audits/waas_app_embedded_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the app-embedded WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/waas_container_download_get.md b/openapi-specs/compute/33-02/desc/audits/waas_container_download_get.md index 9a5e04fad..7d26c34f4 100644 --- a/openapi-specs/compute/33-02/desc/audits/waas_container_download_get.md +++ b/openapi-specs/compute/33-02/desc/audits/waas_container_download_get.md @@ -6,7 +6,7 @@ Returns the container Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that downloads the WAAS container audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/waas_container_get.md b/openapi-specs/compute/33-02/desc/audits/waas_container_get.md index ac0df80fd..c1ad08f3c 100644 --- a/openapi-specs/compute/33-02/desc/audits/waas_container_get.md +++ b/openapi-specs/compute/33-02/desc/audits/waas_container_get.md @@ -6,7 +6,7 @@ Retrieves all container Web-Application and API Security (WAAS) audits. Refer to the following example cURL command that retrieves all container WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/waas_container_timeslice_get.md b/openapi-specs/compute/33-02/desc/audits/waas_container_timeslice_get.md index a56b4c48f..be56260d6 100644 --- a/openapi-specs/compute/33-02/desc/audits/waas_container_timeslice_get.md +++ b/openapi-specs/compute/33-02/desc/audits/waas_container_timeslice_get.md @@ -11,7 +11,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the container WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s):: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/waas_host_download_get.md b/openapi-specs/compute/33-02/desc/audits/waas_host_download_get.md index 4bc66202b..71692e682 100644 --- a/openapi-specs/compute/33-02/desc/audits/waas_host_download_get.md +++ b/openapi-specs/compute/33-02/desc/audits/waas_host_download_get.md @@ -7,7 +7,7 @@ Returns the host Web-Application and API Security (WAAS) audit events data in CS Refer to the following example cURL command that downloads the host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/waas_host_get.md b/openapi-specs/compute/33-02/desc/audits/waas_host_get.md index 14c967594..f6e3df050 100644 --- a/openapi-specs/compute/33-02/desc/audits/waas_host_get.md +++ b/openapi-specs/compute/33-02/desc/audits/waas_host_get.md @@ -7,7 +7,7 @@ Retrieves all host Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/waas_host_timeslice_get.md b/openapi-specs/compute/33-02/desc/audits/waas_host_timeslice_get.md index e28ed7b7a..67b3a54c3 100644 --- a/openapi-specs/compute/33-02/desc/audits/waas_host_timeslice_get.md +++ b/openapi-specs/compute/33-02/desc/audits/waas_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves host WAAS audit events for a specific time frame: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/waas_serverless_download_get.md b/openapi-specs/compute/33-02/desc/audits/waas_serverless_download_get.md index da05504df..0c0dbe698 100644 --- a/openapi-specs/compute/33-02/desc/audits/waas_serverless_download_get.md +++ b/openapi-specs/compute/33-02/desc/audits/waas_serverless_download_get.md @@ -7,7 +7,7 @@ Returns the serverless function Web-Application and API Security (WAAS) audit ev Refer to the following example cURL command that downloads the serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/waas_serverless_get.md b/openapi-specs/compute/33-02/desc/audits/waas_serverless_get.md index fe482a3f3..82488f7ee 100644 --- a/openapi-specs/compute/33-02/desc/audits/waas_serverless_get.md +++ b/openapi-specs/compute/33-02/desc/audits/waas_serverless_get.md @@ -7,7 +7,7 @@ Retrieves all serverless function Web-Application and API Security (WAAS) audit Refer to the following example cURL command that retrieves all serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/audits/waas_serverless_timeslice_get.md b/openapi-specs/compute/33-02/desc/audits/waas_serverless_timeslice_get.md index ec9ff3df1..a0a9a1368 100644 --- a/openapi-specs/compute/33-02/desc/audits/waas_serverless_timeslice_get.md +++ b/openapi-specs/compute/33-02/desc/audits/waas_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the serverless WAAS audit events for a : ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/authenticate-client/post.md b/openapi-specs/compute/33-02/desc/authenticate-client/post.md index bc493d04e..ce6f00afe 100644 --- a/openapi-specs/compute/33-02/desc/authenticate-client/post.md +++ b/openapi-specs/compute/33-02/desc/authenticate-client/post.md @@ -8,7 +8,7 @@ This endpoint checks the supplied client certificate and authorizes the user bas Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X POST \ --cert \ https:///api/v/authenticate-client diff --git a/openapi-specs/compute/33-02/desc/authenticate/post.md b/openapi-specs/compute/33-02/desc/authenticate/post.md index cb018de64..4f85c5d34 100644 --- a/openapi-specs/compute/33-02/desc/authenticate/post.md +++ b/openapi-specs/compute/33-02/desc/authenticate/post.md @@ -9,7 +9,7 @@ You can set the validity period in Console under **Manage > Authentication > Log Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H "Content-Type: application/json" \ -X POST \ -d \ diff --git a/openapi-specs/compute/33-02/desc/authenticate/renew_get.md b/openapi-specs/compute/33-02/desc/authenticate/renew_get.md index 6040d58e1..3458b500a 100644 --- a/openapi-specs/compute/33-02/desc/authenticate/renew_get.md +++ b/openapi-specs/compute/33-02/desc/authenticate/renew_get.md @@ -5,7 +5,7 @@ Renews an old (unexpired) access token and returns a new token. The following cURL command retrieves a new access token using an old access token. ```bash -$ curl -k \ +$ curl \ -H "Authorization: Bearer " \ https:///api/v1/authenticate/renew ``` diff --git a/openapi-specs/compute/33-02/desc/certs/capem_get.md b/openapi-specs/compute/33-02/desc/certs/capem_get.md index f0f0f1bf3..945476c9b 100644 --- a/openapi-specs/compute/33-02/desc/certs/capem_get.md +++ b/openapi-specs/compute/33-02/desc/certs/capem_get.md @@ -5,7 +5,7 @@ Retrieves the Base64-encoded SSL root certificate self-signed by primary certifi Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/certs/client-certs_get.md b/openapi-specs/compute/33-02/desc/certs/client-certs_get.md index d099b3e3d..279d196b1 100644 --- a/openapi-specs/compute/33-02/desc/certs/client-certs_get.md +++ b/openapi-specs/compute/33-02/desc/certs/client-certs_get.md @@ -3,7 +3,7 @@ Downloads a script that installs a client certificate, client private key, and c The following example curl command uses basic auth to download and run the install script for your client certs: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/certs/client-certs.sh | sh diff --git a/openapi-specs/compute/33-02/desc/certs/server-certs_get.md b/openapi-specs/compute/33-02/desc/certs/server-certs_get.md index 0bb13f51d..118a4d9b0 100644 --- a/openapi-specs/compute/33-02/desc/certs/server-certs_get.md +++ b/openapi-specs/compute/33-02/desc/certs/server-certs_get.md @@ -12,7 +12,7 @@ Retrieves the server certificate bundle from Prisma Cloud Compute that contains Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -u \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/cloud/compliance_download_get.md b/openapi-specs/compute/33-02/desc/cloud/compliance_download_get.md index 7b1ec9fea..14f2725b1 100644 --- a/openapi-specs/compute/33-02/desc/cloud/compliance_download_get.md +++ b/openapi-specs/compute/33-02/desc/cloud/compliance_download_get.md @@ -2,7 +2,7 @@ Download all cloud scan data in CSV format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/cloud/compliance_get.md b/openapi-specs/compute/33-02/desc/cloud/compliance_get.md index 48c2fe5bb..ad47e0998 100644 --- a/openapi-specs/compute/33-02/desc/cloud/compliance_get.md +++ b/openapi-specs/compute/33-02/desc/cloud/compliance_get.md @@ -2,7 +2,7 @@ Returns a list of all cloud compliance scan results. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/cloud/compliance_scan_post.md b/openapi-specs/compute/33-02/desc/cloud/compliance_scan_post.md index 7f87bf1f4..7321c3b9d 100644 --- a/openapi-specs/compute/33-02/desc/cloud/compliance_scan_post.md +++ b/openapi-specs/compute/33-02/desc/cloud/compliance_scan_post.md @@ -2,7 +2,7 @@ Initiates a new cloud compliance scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/cloud/compliance_stop_post.md b/openapi-specs/compute/33-02/desc/cloud/compliance_stop_post.md index df0febb56..60c31dc51 100644 --- a/openapi-specs/compute/33-02/desc/cloud/compliance_stop_post.md +++ b/openapi-specs/compute/33-02/desc/cloud/compliance_stop_post.md @@ -2,7 +2,7 @@ Terminates a cloud compliance scan that's in progress.. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/cloud/discovery_download_get.md b/openapi-specs/compute/33-02/desc/cloud/discovery_download_get.md index 44d60a113..a667c8471 100644 --- a/openapi-specs/compute/33-02/desc/cloud/discovery_download_get.md +++ b/openapi-specs/compute/33-02/desc/cloud/discovery_download_get.md @@ -5,7 +5,7 @@ Downloads all cloud scan data in a CSV file. Refer to the following cURL example command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/cloud/discovery_entities_get.md b/openapi-specs/compute/33-02/desc/cloud/discovery_entities_get.md index a7abbdfb6..85f1be971 100644 --- a/openapi-specs/compute/33-02/desc/cloud/discovery_entities_get.md +++ b/openapi-specs/compute/33-02/desc/cloud/discovery_entities_get.md @@ -7,7 +7,7 @@ Use this API endpoint along with the `GET, api/vVERSION/cloud/discovery` to get Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/cloud/discovery_get.md b/openapi-specs/compute/33-02/desc/cloud/discovery_get.md index 28025f140..c2b4c6e3c 100644 --- a/openapi-specs/compute/33-02/desc/cloud/discovery_get.md +++ b/openapi-specs/compute/33-02/desc/cloud/discovery_get.md @@ -8,7 +8,7 @@ Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/cloud/discovery_scan_post.md b/openapi-specs/compute/33-02/desc/cloud/discovery_scan_post.md index 51799ebdb..0717096f8 100644 --- a/openapi-specs/compute/33-02/desc/cloud/discovery_scan_post.md +++ b/openapi-specs/compute/33-02/desc/cloud/discovery_scan_post.md @@ -5,7 +5,7 @@ Initiates a new cloud discovery scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/cloud/discovery_stop_post.md b/openapi-specs/compute/33-02/desc/cloud/discovery_stop_post.md index 6a6c7a5a5..73dbf46e7 100644 --- a/openapi-specs/compute/33-02/desc/cloud/discovery_stop_post.md +++ b/openapi-specs/compute/33-02/desc/cloud/discovery_stop_post.md @@ -5,7 +5,7 @@ Terminates a cloud discovery scan that's in progress. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/cloud/discovery_vms_get.md b/openapi-specs/compute/33-02/desc/cloud/discovery_vms_get.md index 6766f4e5a..2264a27fe 100644 --- a/openapi-specs/compute/33-02/desc/cloud/discovery_vms_get.md +++ b/openapi-specs/compute/33-02/desc/cloud/discovery_vms_get.md @@ -5,7 +5,7 @@ Returns the discovered cloud VM instances. Refer to the following example cURL command that retrieves all the discovered cloud VM instances: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/coderepos/download_get.md b/openapi-specs/compute/33-02/desc/coderepos/download_get.md index 4ec0197bb..b06dd9f17 100644 --- a/openapi-specs/compute/33-02/desc/coderepos/download_get.md +++ b/openapi-specs/compute/33-02/desc/coderepos/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Code re The following cURL command generates a CSV file containing the reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/coderepos/get.md b/openapi-specs/compute/33-02/desc/coderepos/get.md index 54c4e99bf..42dc16fb6 100644 --- a/openapi-specs/compute/33-02/desc/coderepos/get.md +++ b/openapi-specs/compute/33-02/desc/coderepos/get.md @@ -10,7 +10,7 @@ This endpoint maps to the **Code repositories** table in **Monitor > Vulnerabili The following cURL command retrieves all code repository scan reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/collections/get.md b/openapi-specs/compute/33-02/desc/collections/get.md index 99120d17d..5a9e8a50c 100755 --- a/openapi-specs/compute/33-02/desc/collections/get.md +++ b/openapi-specs/compute/33-02/desc/collections/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table in **Manage > Collections and Tags > Collections Refer to the following example cURL command that returns a list of collections: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/collections/name_delete.md b/openapi-specs/compute/33-02/desc/collections/name_delete.md index 3e2debd01..033358000 100755 --- a/openapi-specs/compute/33-02/desc/collections/name_delete.md +++ b/openapi-specs/compute/33-02/desc/collections/name_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that deletes a collection with the name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-02/desc/collections/name_usages_get.md b/openapi-specs/compute/33-02/desc/collections/name_usages_get.md index 5c9c40424..89e383cce 100755 --- a/openapi-specs/compute/33-02/desc/collections/name_usages_get.md +++ b/openapi-specs/compute/33-02/desc/collections/name_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that retrieves all policies with name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/containers/count_get.md b/openapi-specs/compute/33-02/desc/containers/count_get.md index 4c6ecdcb4..aca59a913 100644 --- a/openapi-specs/compute/33-02/desc/containers/count_get.md +++ b/openapi-specs/compute/33-02/desc/containers/count_get.md @@ -5,7 +5,7 @@ Returns an integer representing the number of containers in your environment. Refer to the following example cURL command that returns the number of containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/containers/download_get.md b/openapi-specs/compute/33-02/desc/containers/download_get.md index 5c0811d7c..5ed3fec35 100644 --- a/openapi-specs/compute/33-02/desc/containers/download_get.md +++ b/openapi-specs/compute/33-02/desc/containers/download_get.md @@ -9,7 +9,7 @@ You can download the container scan reports in CSV format in Console under **Mon Refer to the following example cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/containers/filters_get.md b/openapi-specs/compute/33-02/desc/containers/filters_get.md index c8a1dfca4..6c2777819 100644 --- a/openapi-specs/compute/33-02/desc/containers/filters_get.md +++ b/openapi-specs/compute/33-02/desc/containers/filters_get.md @@ -1,7 +1,7 @@ Returns all container filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/containers/get.md b/openapi-specs/compute/33-02/desc/containers/get.md index 4cacdde60..3de9dd4af 100644 --- a/openapi-specs/compute/33-02/desc/containers/get.md +++ b/openapi-specs/compute/33-02/desc/containers/get.md @@ -16,7 +16,7 @@ Refer to the following available options for the `fields` query parameters: Refer to the following example cURL command that retrieves a scan report for all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -26,7 +26,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a scan report for a container with the collection ``: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/containers/labels_get.md b/openapi-specs/compute/33-02/desc/containers/labels_get.md index eb40a748d..7a63ab6fb 100644 --- a/openapi-specs/compute/33-02/desc/containers/labels_get.md +++ b/openapi-specs/compute/33-02/desc/containers/labels_get.md @@ -1,7 +1,7 @@ Returns an array of strings containing all of the labels. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/containers/names_get.md b/openapi-specs/compute/33-02/desc/containers/names_get.md index 8b32465d5..9025e2e10 100644 --- a/openapi-specs/compute/33-02/desc/containers/names_get.md +++ b/openapi-specs/compute/33-02/desc/containers/names_get.md @@ -5,7 +5,7 @@ Returns an array of strings containing all container names. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/containers/scan_post.md b/openapi-specs/compute/33-02/desc/containers/scan_post.md index 6b2bdaaba..56137cf64 100644 --- a/openapi-specs/compute/33-02/desc/containers/scan_post.md +++ b/openapi-specs/compute/33-02/desc/containers/scan_post.md @@ -4,7 +4,7 @@ This endpoint returns the time that the scans were initiated. The following example command uses curl and basic auth to force Prisma Cloud Compute to re-scan all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/credentials/get.md b/openapi-specs/compute/33-02/desc/credentials/get.md index ee4309dee..b807ce8f3 100644 --- a/openapi-specs/compute/33-02/desc/credentials/get.md +++ b/openapi-specs/compute/33-02/desc/credentials/get.md @@ -6,7 +6,7 @@ This endpoint maps to **Manage > Authentication > Credentials store** in the Con Refer to the following example cURL command that retrieves all credentials: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/credentials/id_delete.md b/openapi-specs/compute/33-02/desc/credentials/id_delete.md index e5c70259e..27f090158 100644 --- a/openapi-specs/compute/33-02/desc/credentials/id_delete.md +++ b/openapi-specs/compute/33-02/desc/credentials/id_delete.md @@ -14,7 +14,7 @@ To invoke this endpoint in the Prisma Cloud Compute user interface: Refer to the following example cURL command that deletes an existing credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-02/desc/credentials/id_usages_get.md b/openapi-specs/compute/33-02/desc/credentials/id_usages_get.md index 76c1099aa..ca2ce6216 100644 --- a/openapi-specs/compute/33-02/desc/credentials/id_usages_get.md +++ b/openapi-specs/compute/33-02/desc/credentials/id_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following cURL command that retrieves all usages for a credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/curl_examples.md b/openapi-specs/compute/33-02/desc/curl_examples.md index 3d4fcd468..745d21db3 100644 --- a/openapi-specs/compute/33-02/desc/curl_examples.md +++ b/openapi-specs/compute/33-02/desc/curl_examples.md @@ -6,7 +6,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -17,7 +17,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -29,7 +29,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/compute/33-02/desc/custom-compliance/get.md b/openapi-specs/compute/33-02/desc/custom-compliance/get.md index 9022a87b7..9dddcff4e 100644 --- a/openapi-specs/compute/33-02/desc/custom-compliance/get.md +++ b/openapi-specs/compute/33-02/desc/custom-compliance/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example curl command that gets the list of custom compliance checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/custom-compliance/id_delete.md b/openapi-specs/compute/33-02/desc/custom-compliance/id_delete.md index 72c7183ee..f6536e51d 100644 --- a/openapi-specs/compute/33-02/desc/custom-compliance/id_delete.md +++ b/openapi-specs/compute/33-02/desc/custom-compliance/id_delete.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example cURL command that uses basic auth to delete the compliance check with id 9000: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-02/desc/custom-compliance/put.md b/openapi-specs/compute/33-02/desc/custom-compliance/put.md index 480e41b54..b8760a11f 100644 --- a/openapi-specs/compute/33-02/desc/custom-compliance/put.md +++ b/openapi-specs/compute/33-02/desc/custom-compliance/put.md @@ -21,7 +21,7 @@ Create `custom_check.json` file (example): Refer to the following example curl command that uses basic auth to update the checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-02/desc/custom-rules/get.md b/openapi-specs/compute/33-02/desc/custom-rules/get.md index f0385f81a..f77924be8 100644 --- a/openapi-specs/compute/33-02/desc/custom-rules/get.md +++ b/openapi-specs/compute/33-02/desc/custom-rules/get.md @@ -7,7 +7,7 @@ This endpoint maps to the policy table in **Defend > Custom rules** in the Conso Refer to the following example cURL command that retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/custom-rules/id_delete.md b/openapi-specs/compute/33-02/desc/custom-rules/id_delete.md index c0d6dc8b0..01412abf3 100644 --- a/openapi-specs/compute/33-02/desc/custom-rules/id_delete.md +++ b/openapi-specs/compute/33-02/desc/custom-rules/id_delete.md @@ -5,7 +5,7 @@ Deletes a custom rule. Refer to the following example cURL command that deletes a custom rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-02/desc/cves/distribution_get.md b/openapi-specs/compute/33-02/desc/cves/distribution_get.md index aecddce23..7365e1a5e 100644 --- a/openapi-specs/compute/33-02/desc/cves/distribution_get.md +++ b/openapi-specs/compute/33-02/desc/cves/distribution_get.md @@ -3,7 +3,7 @@ Retrieves CVEs from the vulnerability database grouped into distribution where y The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/cves/get.md b/openapi-specs/compute/33-02/desc/cves/get.md index 469ea4b28..f81223298 100644 --- a/openapi-specs/compute/33-02/desc/cves/get.md +++ b/openapi-specs/compute/33-02/desc/cves/get.md @@ -6,7 +6,7 @@ A null response indicates that the CVE is not in our database. The following example curl command queries the Prisma Cloud Compute database for `CVE-2018-1102`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/defenders/app_embedded_post.md b/openapi-specs/compute/33-02/desc/defenders/app_embedded_post.md index 9167469d0..7999cbadb 100644 --- a/openapi-specs/compute/33-02/desc/defenders/app_embedded_post.md +++ b/openapi-specs/compute/33-02/desc/defenders/app_embedded_post.md @@ -5,7 +5,7 @@ Creates an augmented Dockerfile with Defender and dependencies included as a ZIP Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/defenders/daemonset_yaml_get.md b/openapi-specs/compute/33-02/desc/defenders/daemonset_yaml_get.md index 678901a8a..b68869081 100644 --- a/openapi-specs/compute/33-02/desc/defenders/daemonset_yaml_get.md +++ b/openapi-specs/compute/33-02/desc/defenders/daemonset_yaml_get.md @@ -10,7 +10,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https://:8083/api/v1/defenders/daemonset.yaml?consoleaddr=&listener=none&namespace=twistlock&orchestration=kubernetes' diff --git a/openapi-specs/compute/33-02/desc/defenders/daemonset_yaml_post.md b/openapi-specs/compute/33-02/desc/defenders/daemonset_yaml_post.md index 268e3ba81..af006122b 100644 --- a/openapi-specs/compute/33-02/desc/defenders/daemonset_yaml_post.md +++ b/openapi-specs/compute/33-02/desc/defenders/daemonset_yaml_post.md @@ -5,7 +5,7 @@ Creates a DaemonSet deployment file in YAML format that you can use to deploy De Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/defenders/download_get.md b/openapi-specs/compute/33-02/desc/defenders/download_get.md index 2d9435506..67f08c0e5 100644 --- a/openapi-specs/compute/33-02/desc/defenders/download_get.md +++ b/openapi-specs/compute/33-02/desc/defenders/download_get.md @@ -8,7 +8,7 @@ Use the query parameters to filter what data is returned. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o \ diff --git a/openapi-specs/compute/33-02/desc/defenders/fargate_json_post.md b/openapi-specs/compute/33-02/desc/defenders/fargate_json_post.md index 5128e90a1..e2e4e85ab 100644 --- a/openapi-specs/compute/33-02/desc/defenders/fargate_json_post.md +++ b/openapi-specs/compute/33-02/desc/defenders/fargate_json_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command: Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -23,7 +23,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/defenders/fargate_yaml_post.md b/openapi-specs/compute/33-02/desc/defenders/fargate_yaml_post.md index 9a8306a1b..95560526a 100644 --- a/openapi-specs/compute/33-02/desc/defenders/fargate_yaml_post.md +++ b/openapi-specs/compute/33-02/desc/defenders/fargate_yaml_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.yaml` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/yaml' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/defenders/get.md b/openapi-specs/compute/33-02/desc/defenders/get.md index 471e7ef9d..8d2f5cd4c 100644 --- a/openapi-specs/compute/33-02/desc/defenders/get.md +++ b/openapi-specs/compute/33-02/desc/defenders/get.md @@ -7,7 +7,7 @@ This endpoint maps to the UI Console page in **Manage > Defenders > Defenders**. Refer to the following example cURL command that retrieves all deployed Defenders. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/defenders/helm_get.md b/openapi-specs/compute/33-02/desc/defenders/helm_get.md index b11f9c4b9..487c8b7e8 100644 --- a/openapi-specs/compute/33-02/desc/defenders/helm_get.md +++ b/openapi-specs/compute/33-02/desc/defenders/helm_get.md @@ -13,7 +13,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o twistlock-defender-helm.tar.gz \ diff --git a/openapi-specs/compute/33-02/desc/defenders/helm_post.md b/openapi-specs/compute/33-02/desc/defenders/helm_post.md index 2046e63eb..fb76807ae 100644 --- a/openapi-specs/compute/33-02/desc/defenders/helm_post.md +++ b/openapi-specs/compute/33-02/desc/defenders/helm_post.md @@ -5,7 +5,7 @@ Creates a Helm deployment file that you can use to deploy Defenders to your clus Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/defenders/id_delete.md b/openapi-specs/compute/33-02/desc/defenders/id_delete.md index f637ef850..e3ac52daf 100644 --- a/openapi-specs/compute/33-02/desc/defenders/id_delete.md +++ b/openapi-specs/compute/33-02/desc/defenders/id_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes an existing Defender on a host. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-02/desc/defenders/id_features_post.md b/openapi-specs/compute/33-02/desc/defenders/id_features_post.md index ec8e4c5f3..9b42f5fa0 100644 --- a/openapi-specs/compute/33-02/desc/defenders/id_features_post.md +++ b/openapi-specs/compute/33-02/desc/defenders/id_features_post.md @@ -3,7 +3,7 @@ Updates a deployed Defender's configuration. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/defenders/id_restart_post.md b/openapi-specs/compute/33-02/desc/defenders/id_restart_post.md index da0cc7811..7296a186b 100644 --- a/openapi-specs/compute/33-02/desc/defenders/id_restart_post.md +++ b/openapi-specs/compute/33-02/desc/defenders/id_restart_post.md @@ -3,7 +3,7 @@ Restarts Defender on a given host. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/defenders/id_upgrade_post.md b/openapi-specs/compute/33-02/desc/defenders/id_upgrade_post.md index f0d30d1e9..3e63c6414 100644 --- a/openapi-specs/compute/33-02/desc/defenders/id_upgrade_post.md +++ b/openapi-specs/compute/33-02/desc/defenders/id_upgrade_post.md @@ -7,7 +7,7 @@ Upgrades Defender on ``. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/defenders/image-name_get.md b/openapi-specs/compute/33-02/desc/defenders/image-name_get.md index e81ba3e19..19f360c07 100644 --- a/openapi-specs/compute/33-02/desc/defenders/image-name_get.md +++ b/openapi-specs/compute/33-02/desc/defenders/image-name_get.md @@ -5,7 +5,7 @@ Returns the full Docker image name for Defender. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/defenders/install-bundle_get.md b/openapi-specs/compute/33-02/desc/defenders/install-bundle_get.md index 882d0cd53..9b09e733f 100644 --- a/openapi-specs/compute/33-02/desc/defenders/install-bundle_get.md +++ b/openapi-specs/compute/33-02/desc/defenders/install-bundle_get.md @@ -5,7 +5,7 @@ Returns the certificate bundle that Defender needs to securely connect to Consol Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/defenders/names_get.md b/openapi-specs/compute/33-02/desc/defenders/names_get.md index 728eb6364..6339c1483 100644 --- a/openapi-specs/compute/33-02/desc/defenders/names_get.md +++ b/openapi-specs/compute/33-02/desc/defenders/names_get.md @@ -5,7 +5,7 @@ Retrieves a list of Defender hostnames that can be used as the `{id}` query para Refer to the following example cURL command that retrieves a list of all Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -15,7 +15,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of connected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -25,7 +25,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of disconnected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -37,7 +37,7 @@ The endpoint enlists all the connected and disconnected Defenders if do not spec Refer to the following example cURL command that retrieves a list of Defenders by type: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/defenders/rasp_post.md b/openapi-specs/compute/33-02/desc/defenders/rasp_post.md index 526a9e112..e110044dd 100644 --- a/openapi-specs/compute/33-02/desc/defenders/rasp_post.md +++ b/openapi-specs/compute/33-02/desc/defenders/rasp_post.md @@ -7,7 +7,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o rasp-defender.zip diff --git a/openapi-specs/compute/33-02/desc/defenders/serverless-bundle_post.md b/openapi-specs/compute/33-02/desc/defenders/serverless-bundle_post.md index df4f13e6a..7533e436b 100644 --- a/openapi-specs/compute/33-02/desc/defenders/serverless-bundle_post.md +++ b/openapi-specs/compute/33-02/desc/defenders/serverless-bundle_post.md @@ -5,7 +5,7 @@ Downloads a ZIP file with serverless Defender bundle. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/octet-stream' \ -o serverless_bundle.zip \ diff --git a/openapi-specs/compute/33-02/desc/defenders/summary_get.md b/openapi-specs/compute/33-02/desc/defenders/summary_get.md index 08be4ebc4..e308ef64b 100644 --- a/openapi-specs/compute/33-02/desc/defenders/summary_get.md +++ b/openapi-specs/compute/33-02/desc/defenders/summary_get.md @@ -6,7 +6,7 @@ Lists the number of Defenders in each defender category. Refer to the following example cURL command that retrieves a summary of Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/defenders/upgrade_post.md b/openapi-specs/compute/33-02/desc/defenders/upgrade_post.md index 2f0b4d39e..eacd6b779 100644 --- a/openapi-specs/compute/33-02/desc/defenders/upgrade_post.md +++ b/openapi-specs/compute/33-02/desc/defenders/upgrade_post.md @@ -9,7 +9,7 @@ To upgrade Serverless and Fargate Defenders, re-embed them. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/deployment/daemonsets_deploy_post.md b/openapi-specs/compute/33-02/desc/deployment/daemonsets_deploy_post.md index 94ec9386b..b60f28346 100644 --- a/openapi-specs/compute/33-02/desc/deployment/daemonsets_deploy_post.md +++ b/openapi-specs/compute/33-02/desc/deployment/daemonsets_deploy_post.md @@ -5,7 +5,7 @@ It identifies the cluster's API server, user, and credentials. Use the various request parameters to control the properties of the deployed DaemonSet. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/deployment/daemonsets_get.md b/openapi-specs/compute/33-02/desc/deployment/daemonsets_get.md index a0b7f3798..0385acf75 100644 --- a/openapi-specs/compute/33-02/desc/deployment/daemonsets_get.md +++ b/openapi-specs/compute/33-02/desc/deployment/daemonsets_get.md @@ -3,7 +3,7 @@ You must specify a `credentialID`, of type `kubeconfig`, which identifies your c Credentials are managed in Console's credentials store (`/api/v1/credentials`). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/feeds/custom-vulnerabilities_get.md b/openapi-specs/compute/33-02/desc/feeds/custom-vulnerabilities_get.md index 71834f19d..d661acf55 100644 --- a/openapi-specs/compute/33-02/desc/feeds/custom-vulnerabilities_get.md +++ b/openapi-specs/compute/33-02/desc/feeds/custom-vulnerabilities_get.md @@ -11,7 +11,7 @@ Vulnerability rules can be created using the Prisma Cloud Compute. Refer to the following cURL command that retrieves a list of all the custom vulnerabilities and associated rules. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/feeds/custom-vulnerabilities_put.md b/openapi-specs/compute/33-02/desc/feeds/custom-vulnerabilities_put.md index 4fe1c1898..149ada978 100644 --- a/openapi-specs/compute/33-02/desc/feeds/custom-vulnerabilities_put.md +++ b/openapi-specs/compute/33-02/desc/feeds/custom-vulnerabilities_put.md @@ -5,7 +5,7 @@ Updates all the custom vulnerabilities and associated rules simultaneously for h Refer to the following cURL command that updates a vulnerability for a library named `internal-lib`, and specifies that its versions `1.1` to `1.8` are known to be vulnerable. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -37,7 +37,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: **Note:** You will need `jq` to execute this command. ``` - $ curl -k \ + $ curl \ -u \ https:///api/v/feeds/custom/custom-vulnerabilities \ | jq '.' > custom_vulnerability_rules.json @@ -66,7 +66,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 3. Update the rules by pushing the new JSON payload. **Note:** Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -77,7 +77,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 4. Run the cURL command for the `GET /api/vVERSION/feeds/custom/custom-vulnerabilities` endpoint and you can see that the previously installed rules are now overwritten with your new rules. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/feeds/custom_vulnerabilities_digest_get.md b/openapi-specs/compute/33-02/desc/feeds/custom_vulnerabilities_digest_get.md index 0eb501d9b..02af9a3ab 100644 --- a/openapi-specs/compute/33-02/desc/feeds/custom_vulnerabilities_digest_get.md +++ b/openapi-specs/compute/33-02/desc/feeds/custom_vulnerabilities_digest_get.md @@ -5,7 +5,7 @@ Returns the unique digest for the custom vulnerabilities and associated rules fo The following cURL command retrieves the digest for the configured custom vulnerabilities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/feeds/cve_allow_list_digest_get.md b/openapi-specs/compute/33-02/desc/feeds/cve_allow_list_digest_get.md index e27f21251..911a07fd9 100644 --- a/openapi-specs/compute/33-02/desc/feeds/cve_allow_list_digest_get.md +++ b/openapi-specs/compute/33-02/desc/feeds/cve_allow_list_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the Common Vulnerabilities and Exposures (CVE) a The following cURL command retrieves the digest for the configured CVE allow list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/feeds/cve_allow_list_get.md b/openapi-specs/compute/33-02/desc/feeds/cve_allow_list_get.md index 34fb2c7f8..d73ce17c2 100644 --- a/openapi-specs/compute/33-02/desc/feeds/cve_allow_list_get.md +++ b/openapi-specs/compute/33-02/desc/feeds/cve_allow_list_get.md @@ -5,7 +5,7 @@ Retrieves the globally allow-listed Common Vulnerabilities and Exposures (CVE). The following cURL command retrieves the globally allow-listed CVEs. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/feeds/cve_allow_list_put.md b/openapi-specs/compute/33-02/desc/feeds/cve_allow_list_put.md index 850016965..c4e2ce0af 100644 --- a/openapi-specs/compute/33-02/desc/feeds/cve_allow_list_put.md +++ b/openapi-specs/compute/33-02/desc/feeds/cve_allow_list_put.md @@ -7,7 +7,7 @@ Globally allow-lists a set of Common Vulnerabilities and Exposures (CVE). The following cURL command installs a global CVE allow-list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-02/desc/feeds/ips_digest_get.md b/openapi-specs/compute/33-02/desc/feeds/ips_digest_get.md index d059271ea..ae2a09915 100644 --- a/openapi-specs/compute/33-02/desc/feeds/ips_digest_get.md +++ b/openapi-specs/compute/33-02/desc/feeds/ips_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the list of suspicious or high risk IP endpoints The following cURL command retrieves the digest for the banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/feeds/ips_get.md b/openapi-specs/compute/33-02/desc/feeds/ips_get.md index 381257d47..f51c577a7 100644 --- a/openapi-specs/compute/33-02/desc/feeds/ips_get.md +++ b/openapi-specs/compute/33-02/desc/feeds/ips_get.md @@ -5,7 +5,7 @@ Retrieves the customized list of block-listed suspicious or high-risk IP address The following cURL command retrieves the list of globally block-listed suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/feeds/ips_put.md b/openapi-specs/compute/33-02/desc/feeds/ips_put.md index 6f8fc2419..5bf791044 100644 --- a/openapi-specs/compute/33-02/desc/feeds/ips_put.md +++ b/openapi-specs/compute/33-02/desc/feeds/ips_put.md @@ -7,7 +7,7 @@ Bans a custom list of suspicious or high-risk IP addresses. The following cURL command installs a custom list of banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-02/desc/feeds/malware_digest_get.md b/openapi-specs/compute/33-02/desc/feeds/malware_digest_get.md index 005c476a2..522a59aef 100644 --- a/openapi-specs/compute/33-02/desc/feeds/malware_digest_get.md +++ b/openapi-specs/compute/33-02/desc/feeds/malware_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for all the MD5 signatures of malicious executables The following cURL command retrieves the digest for the configured list for the MD5 signatures of malicious executables. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/feeds/malware_get.md b/openapi-specs/compute/33-02/desc/feeds/malware_get.md index 2a7aa128b..72bee6594 100644 --- a/openapi-specs/compute/33-02/desc/feeds/malware_get.md +++ b/openapi-specs/compute/33-02/desc/feeds/malware_get.md @@ -5,7 +5,7 @@ Returns the customized list of MD5 signatures of malicious executables. Refer to the following cURL command that retrieves the list of MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/feeds/malware_put.md b/openapi-specs/compute/33-02/desc/feeds/malware_put.md index 7e6ec5da0..176304cb9 100644 --- a/openapi-specs/compute/33-02/desc/feeds/malware_put.md +++ b/openapi-specs/compute/33-02/desc/feeds/malware_put.md @@ -7,7 +7,7 @@ Creates a custom list of malware MD5 signatures of malicious executables. Refer to the following cURL command that installs a custom list of malware MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-02/desc/feeds/refresh_post.md b/openapi-specs/compute/33-02/desc/feeds/refresh_post.md index a83c40d10..1c756edae 100644 --- a/openapi-specs/compute/33-02/desc/feeds/refresh_post.md +++ b/openapi-specs/compute/33-02/desc/feeds/refresh_post.md @@ -1,7 +1,7 @@ Triggers Console to refresh its data from the **Intelligence Stream** ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/forensic/activities_download_get.md b/openapi-specs/compute/33-02/desc/forensic/activities_download_get.md index 8a2dbd926..1918e3790 100644 --- a/openapi-specs/compute/33-02/desc/forensic/activities_download_get.md +++ b/openapi-specs/compute/33-02/desc/forensic/activities_download_get.md @@ -3,7 +3,7 @@ Downloads all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/forensic/activities_get.md b/openapi-specs/compute/33-02/desc/forensic/activities_get.md index c8fb1d0cd..c0761aa60 100644 --- a/openapi-specs/compute/33-02/desc/forensic/activities_get.md +++ b/openapi-specs/compute/33-02/desc/forensic/activities_get.md @@ -3,7 +3,7 @@ Retrieves all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/groups/get.md b/openapi-specs/compute/33-02/desc/groups/get.md index 6a0daa2eb..34a2711e0 100644 --- a/openapi-specs/compute/33-02/desc/groups/get.md +++ b/openapi-specs/compute/33-02/desc/groups/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups. ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/33-02/desc/groups/id_delete.md b/openapi-specs/compute/33-02/desc/groups/id_delete.md index 5962a1135..0c3cfa1cd 100644 --- a/openapi-specs/compute/33-02/desc/groups/id_delete.md +++ b/openapi-specs/compute/33-02/desc/groups/id_delete.md @@ -13,7 +13,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes a collection with the name `{id}`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-02/desc/groups/names.md b/openapi-specs/compute/33-02/desc/groups/names.md index 80f34f536..9c2dd1089 100644 --- a/openapi-specs/compute/33-02/desc/groups/names.md +++ b/openapi-specs/compute/33-02/desc/groups/names.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/33-02/desc/groups/post.md b/openapi-specs/compute/33-02/desc/groups/post.md index d0fc23a6d..ebad011f4 100644 --- a/openapi-specs/compute/33-02/desc/groups/post.md +++ b/openapi-specs/compute/33-02/desc/groups/post.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that creates a new group named `my-group`: ```bash -$ curl -k \ +$ curl \ -X POST \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/33-02/desc/high-availability/get.md b/openapi-specs/compute/33-02/desc/high-availability/get.md index a988d47ef..83d5d9b46 100644 --- a/openapi-specs/compute/33-02/desc/high-availability/get.md +++ b/openapi-specs/compute/33-02/desc/high-availability/get.md @@ -3,7 +3,7 @@ Returns the status of high high availability. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/33-02/desc/hosts/download_get.md b/openapi-specs/compute/33-02/desc/hosts/download_get.md index ab691fb49..34e546573 100644 --- a/openapi-specs/compute/33-02/desc/hosts/download_get.md +++ b/openapi-specs/compute/33-02/desc/hosts/download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Hosts > Refer to the following example cURL command that downloads all host scan reports to a CSV file called `hosts_report.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o hosts_report.csv \ diff --git a/openapi-specs/compute/33-02/desc/hosts/filters_get.md b/openapi-specs/compute/33-02/desc/hosts/filters_get.md index 4bf6df5e6..a39ec8a97 100644 --- a/openapi-specs/compute/33-02/desc/hosts/filters_get.md +++ b/openapi-specs/compute/33-02/desc/hosts/filters_get.md @@ -3,7 +3,7 @@ Returns host filters such as distribution and host name. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/hosts/get.md b/openapi-specs/compute/33-02/desc/hosts/get.md index 43020558a..9bdf69c6c 100644 --- a/openapi-specs/compute/33-02/desc/hosts/get.md +++ b/openapi-specs/compute/33-02/desc/hosts/get.md @@ -37,7 +37,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following cURL command that retrieves all host scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/hosts/info_get.md b/openapi-specs/compute/33-02/desc/hosts/info_get.md index 5b3903b7e..523024735 100644 --- a/openapi-specs/compute/33-02/desc/hosts/info_get.md +++ b/openapi-specs/compute/33-02/desc/hosts/info_get.md @@ -5,7 +5,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/hosts/scan_post.md b/openapi-specs/compute/33-02/desc/hosts/scan_post.md index 6b72cbfa3..0e0e7b074 100644 --- a/openapi-specs/compute/33-02/desc/hosts/scan_post.md +++ b/openapi-specs/compute/33-02/desc/hosts/scan_post.md @@ -3,7 +3,7 @@ Re-scan all hosts immediately. Refer to the following example command that forces Prisma Cloud Compute to re-scan all hosts: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/hosts/scan diff --git a/openapi-specs/compute/33-02/desc/images/defender_layer_get.md b/openapi-specs/compute/33-02/desc/images/defender_layer_get.md index 1dfe3633d..4bb88d62c 100644 --- a/openapi-specs/compute/33-02/desc/images/defender_layer_get.md +++ b/openapi-specs/compute/33-02/desc/images/defender_layer_get.md @@ -5,7 +5,7 @@ Returns the the Prisma Cloud Compute Defender in as a layer that can be used in Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/compute/33-02/desc/images/defender_rasp_get.md b/openapi-specs/compute/33-02/desc/images/defender_rasp_get.md index a8e145ff7..260e271a1 100644 --- a/openapi-specs/compute/33-02/desc/images/defender_rasp_get.md +++ b/openapi-specs/compute/33-02/desc/images/defender_rasp_get.md @@ -3,7 +3,7 @@ Returns the the Prisma Cloud Compute Defender as the RASP Defender A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/compute/33-02/desc/images/download_get.md b/openapi-specs/compute/33-02/desc/images/download_get.md index d0eaceb19..5d4971a46 100644 --- a/openapi-specs/compute/33-02/desc/images/download_get.md +++ b/openapi-specs/compute/33-02/desc/images/download_get.md @@ -16,7 +16,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -27,7 +27,7 @@ $ curl -k \ Refer to the following example cURL command that might be useful for developers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/images/get.md b/openapi-specs/compute/33-02/desc/images/get.md index 3f594c6c8..dcef1b0a4 100644 --- a/openapi-specs/compute/33-02/desc/images/get.md +++ b/openapi-specs/compute/33-02/desc/images/get.md @@ -26,7 +26,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following cURL command that retrieves a compact scan report for all images: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -36,7 +36,7 @@ $ curl -k \ Refer to the following cURL command that retrieves a compact scan report for an Ubuntu image: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -47,7 +47,7 @@ The name query is synonymous with the filter images text field in the Console UI Refer to the following cURL command that retrieves the scan report for an image with the matching SHA-256 hash: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/images/names_get.md b/openapi-specs/compute/33-02/desc/images/names_get.md index 3a234df98..311b33574 100644 --- a/openapi-specs/compute/33-02/desc/images/names_get.md +++ b/openapi-specs/compute/33-02/desc/images/names_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/33-02/desc/images/scan_post.md b/openapi-specs/compute/33-02/desc/images/scan_post.md index 8d802727a..36278249b 100644 --- a/openapi-specs/compute/33-02/desc/images/scan_post.md +++ b/openapi-specs/compute/33-02/desc/images/scan_post.md @@ -5,7 +5,7 @@ Re-scan all images immediately. This endpoint returns the time that the scans we Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all images: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/images/scan diff --git a/openapi-specs/compute/33-02/desc/images/twistlock_defender_tar_gz_get.md b/openapi-specs/compute/33-02/desc/images/twistlock_defender_tar_gz_get.md index 7852e12ba..36fb66ae8 100644 --- a/openapi-specs/compute/33-02/desc/images/twistlock_defender_tar_gz_get.md +++ b/openapi-specs/compute/33-02/desc/images/twistlock_defender_tar_gz_get.md @@ -1,7 +1,7 @@ Download the Container Defender image for Linux platforms. ```bash -$ curl -k \ +$ curl \ -u \ -H "Content-Type: application/octet-stream" \ -o twistlock_defender.tar.gz \ diff --git a/openapi-specs/compute/33-02/desc/intro.md b/openapi-specs/compute/33-02/desc/intro.md index 9038a3734..5b4ed5864 100644 --- a/openapi-specs/compute/33-02/desc/intro.md +++ b/openapi-specs/compute/33-02/desc/intro.md @@ -47,7 +47,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -58,7 +58,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -70,7 +70,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/compute/33-02/desc/kubernetes/scan_post.md b/openapi-specs/compute/33-02/desc/kubernetes/scan_post.md index 15d614c1a..ab74d5d96 100644 --- a/openapi-specs/compute/33-02/desc/kubernetes/scan_post.md +++ b/openapi-specs/compute/33-02/desc/kubernetes/scan_post.md @@ -3,7 +3,7 @@ This endpoint will trigger a Kubernetes scan. The following example curl command uses basic auth to initiate this scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/logs/console_get.md b/openapi-specs/compute/33-02/desc/logs/console_get.md index 80ece6611..113543540 100644 --- a/openapi-specs/compute/33-02/desc/logs/console_get.md +++ b/openapi-specs/compute/33-02/desc/logs/console_get.md @@ -3,7 +3,7 @@ Retrieves the latest Console log messages. The following example curl command retrieves the 10 latest Console log messages: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/logs/defender_download_get.md b/openapi-specs/compute/33-02/desc/logs/defender_download_get.md index 5d6718db0..05bbc6a75 100644 --- a/openapi-specs/compute/33-02/desc/logs/defender_download_get.md +++ b/openapi-specs/compute/33-02/desc/logs/defender_download_get.md @@ -5,7 +5,7 @@ The hostname can be returned from the endpoint `/defenders/names` The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/logs/defender_get.md b/openapi-specs/compute/33-02/desc/logs/defender_get.md index 1e733a746..f2e3b25df 100644 --- a/openapi-specs/compute/33-02/desc/logs/defender_get.md +++ b/openapi-specs/compute/33-02/desc/logs/defender_get.md @@ -7,7 +7,7 @@ Note that you must quote the URL when running the following command. Otherwise the shell misinterprets the ampersand (`&`) as the end of the command, and puts the curl command in the background. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/logs/system_download_get.md b/openapi-specs/compute/33-02/desc/logs/system_download_get.md index 1e5b5b873..43bb0abce 100644 --- a/openapi-specs/compute/33-02/desc/logs/system_download_get.md +++ b/openapi-specs/compute/33-02/desc/logs/system_download_get.md @@ -4,7 +4,7 @@ This endpoint will return the system debug logs with `tar.gz` file extension. The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/pcf-droplets/addresses_get.md b/openapi-specs/compute/33-02/desc/pcf-droplets/addresses_get.md index 257a47455..bb3365015 100644 --- a/openapi-specs/compute/33-02/desc/pcf-droplets/addresses_get.md +++ b/openapi-specs/compute/33-02/desc/pcf-droplets/addresses_get.md @@ -5,7 +5,7 @@ You can also add optional query parameters to this API call, in this example `cl The following example curl command retrieves the list of addresses: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/pcf-droplets/download_get.md b/openapi-specs/compute/33-02/desc/pcf-droplets/download_get.md index ad761e744..ac8546a25 100644 --- a/openapi-specs/compute/33-02/desc/pcf-droplets/download_get.md +++ b/openapi-specs/compute/33-02/desc/pcf-droplets/download_get.md @@ -3,7 +3,7 @@ This endpoint will download the list of configured cloud controller addresses co The following example curl command retrieves the list of addresses and outputs it to a file call `PCF_blobstores.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/pcf-droplets/get.md b/openapi-specs/compute/33-02/desc/pcf-droplets/get.md index 930d16948..aad607cba 100644 --- a/openapi-specs/compute/33-02/desc/pcf-droplets/get.md +++ b/openapi-specs/compute/33-02/desc/pcf-droplets/get.md @@ -3,7 +3,7 @@ This endpoint will return the full metadata of PCF blobstore from page **Monitor The following example curl command will retrieve this: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/pcf-droplets/scan_post.md b/openapi-specs/compute/33-02/desc/pcf-droplets/scan_post.md index 34e75b26c..d9c9df4dd 100644 --- a/openapi-specs/compute/33-02/desc/pcf-droplets/scan_post.md +++ b/openapi-specs/compute/33-02/desc/pcf-droplets/scan_post.md @@ -3,7 +3,7 @@ This endpoint will kick off a scan of the any PCF Blobstores you have configured Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/pcf-droplets/stop_post.md b/openapi-specs/compute/33-02/desc/pcf-droplets/stop_post.md index 94c376972..2c4d5264a 100644 --- a/openapi-specs/compute/33-02/desc/pcf-droplets/stop_post.md +++ b/openapi-specs/compute/33-02/desc/pcf-droplets/stop_post.md @@ -3,7 +3,7 @@ This endpoint will instruct the PFC Defenders to stop scanning. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/policies/compliance_ci_images_get.md b/openapi-specs/compute/33-02/desc/policies/compliance_ci_images_get.md index f97130a97..9a2b2abf5 100644 --- a/openapi-specs/compute/33-02/desc/policies/compliance_ci_images_get.md +++ b/openapi-specs/compute/33-02/desc/policies/compliance_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > CI** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/policies/compliance_ci_serverless_get.md b/openapi-specs/compute/33-02/desc/policies/compliance_ci_serverless_get.md index 59195f070..2f30e2d74 100644 --- a/openapi-specs/compute/33-02/desc/policies/compliance_ci_serverless_get.md +++ b/openapi-specs/compute/33-02/desc/policies/compliance_ci_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Functions > CI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/policies/compliance_container_get.md b/openapi-specs/compute/33-02/desc/policies/compliance_container_get.md index 7f10245ea..657d4f2dd 100644 --- a/openapi-specs/compute/33-02/desc/policies/compliance_container_get.md +++ b/openapi-specs/compute/33-02/desc/policies/compliance_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > Deployed** Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/policies/compliance_container_impacted_get.md b/openapi-specs/compute/33-02/desc/policies/compliance_container_impacted_get.md index 607bfa3c8..de9e0ee77 100644 --- a/openapi-specs/compute/33-02/desc/policies/compliance_container_impacted_get.md +++ b/openapi-specs/compute/33-02/desc/policies/compliance_container_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of containers captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/compliance/container/impacted?ruleName=' diff --git a/openapi-specs/compute/33-02/desc/policies/compliance_host_get.md b/openapi-specs/compute/33-02/desc/policies/compliance_host_get.md index c029ecf7f..a5e429af5 100755 --- a/openapi-specs/compute/33-02/desc/policies/compliance_host_get.md +++ b/openapi-specs/compute/33-02/desc/policies/compliance_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Hosts > Running hosts** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/policies/compliance_serverless_get.md b/openapi-specs/compute/33-02/desc/policies/compliance_serverless_get.md index c7de886c1..f559179f6 100755 --- a/openapi-specs/compute/33-02/desc/policies/compliance_serverless_get.md +++ b/openapi-specs/compute/33-02/desc/policies/compliance_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Functions > Functions** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/policies/compliance_vms_get.md b/openapi-specs/compute/33-02/desc/policies/compliance_vms_get.md index f7d7e1a49..b61d20d9d 100755 --- a/openapi-specs/compute/33-02/desc/policies/compliance_vms_get.md +++ b/openapi-specs/compute/33-02/desc/policies/compliance_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Hosts > VM ima The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/policies/compliance_vms_impacted_get.md b/openapi-specs/compute/33-02/desc/policies/compliance_vms_impacted_get.md index 9cf5b9d03..4ac3f2832 100644 --- a/openapi-specs/compute/33-02/desc/policies/compliance_vms_impacted_get.md +++ b/openapi-specs/compute/33-02/desc/policies/compliance_vms_impacted_get.md @@ -8,7 +8,7 @@ Use query parameters to retrieve the list of impacted resources by *account ID*, Refer to the following example cURL command, which retrieves a list of impacted resources: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/policies/docker_get.md b/openapi-specs/compute/33-02/desc/policies/docker_get.md index f56872c67..e8ab3d5bb 100644 --- a/openapi-specs/compute/33-02/desc/policies/docker_get.md +++ b/openapi-specs/compute/33-02/desc/policies/docker_get.md @@ -3,7 +3,7 @@ Retrieves a list of all access control rules for Docker Engine commands. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/policies/docker_put.md b/openapi-specs/compute/33-02/desc/policies/docker_put.md index 860e2bb1e..a5d0c0230 100644 --- a/openapi-specs/compute/33-02/desc/policies/docker_put.md +++ b/openapi-specs/compute/33-02/desc/policies/docker_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove Docker access control rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/docker \ | jq '.' > docker_access_control_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove Docker access control rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/33-02/desc/policies/firewall_app-embedded_get.md b/openapi-specs/compute/33-02/desc/policies/firewall_app-embedded_get.md index 3da2a7cd6..4e59c4c21 100644 --- a/openapi-specs/compute/33-02/desc/policies/firewall_app-embedded_get.md +++ b/openapi-specs/compute/33-02/desc/policies/firewall_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > App-Embedded** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/policies/firewall_app_container_get.md b/openapi-specs/compute/33-02/desc/policies/firewall_app_container_get.md index 3b8c157fa..f0486aa4c 100644 --- a/openapi-specs/compute/33-02/desc/policies/firewall_app_container_get.md +++ b/openapi-specs/compute/33-02/desc/policies/firewall_app_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Container** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/container' diff --git a/openapi-specs/compute/33-02/desc/policies/firewall_app_host_get.md b/openapi-specs/compute/33-02/desc/policies/firewall_app_host_get.md index adb90128a..75c22add4 100644 --- a/openapi-specs/compute/33-02/desc/policies/firewall_app_host_get.md +++ b/openapi-specs/compute/33-02/desc/policies/firewall_app_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Host** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/policies/firewall_app_network_list_get.md b/openapi-specs/compute/33-02/desc/policies/firewall_app_network_list_get.md index 13f7fb450..5a1f87d85 100644 --- a/openapi-specs/compute/33-02/desc/policies/firewall_app_network_list_get.md +++ b/openapi-specs/compute/33-02/desc/policies/firewall_app_network_list_get.md @@ -11,7 +11,7 @@ This endpoint maps to **Defend > WAAS > Network lists** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/network-list' diff --git a/openapi-specs/compute/33-02/desc/policies/firewall_app_out-of-band_get.md b/openapi-specs/compute/33-02/desc/policies/firewall_app_out-of-band_get.md index d4f72d041..9ae662687 100644 --- a/openapi-specs/compute/33-02/desc/policies/firewall_app_out-of-band_get.md +++ b/openapi-specs/compute/33-02/desc/policies/firewall_app_out-of-band_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/policies/firewall_app_out-of-band_impacted_get.md b/openapi-specs/compute/33-02/desc/policies/firewall_app_out-of-band_impacted_get.md index 25d2c6691..96a427f94 100644 --- a/openapi-specs/compute/33-02/desc/policies/firewall_app_out-of-band_impacted_get.md +++ b/openapi-specs/compute/33-02/desc/policies/firewall_app_out-of-band_impacted_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/policies/firewall_app_rasp_get.md b/openapi-specs/compute/33-02/desc/policies/firewall_app_rasp_get.md index 15d481cf3..a201d3beb 100644 --- a/openapi-specs/compute/33-02/desc/policies/firewall_app_rasp_get.md +++ b/openapi-specs/compute/33-02/desc/policies/firewall_app_rasp_get.md @@ -1,7 +1,7 @@ Retrieves a list of all application firewall (CNAF) rules for RASP. ``` -$ curl -k \ +$ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp ``` diff --git a/openapi-specs/compute/33-02/desc/policies/firewall_app_rasp_put.md b/openapi-specs/compute/33-02/desc/policies/firewall_app_rasp_put.md index 04ba86483..1101c7690 100644 --- a/openapi-specs/compute/33-02/desc/policies/firewall_app_rasp_put.md +++ b/openapi-specs/compute/33-02/desc/policies/firewall_app_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp \ | jq '.' > app_firewall_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/33-02/desc/policies/firewall_app_serverless_get.md b/openapi-specs/compute/33-02/desc/policies/firewall_app_serverless_get.md index d19e909f3..90cac0015 100644 --- a/openapi-specs/compute/33-02/desc/policies/firewall_app_serverless_get.md +++ b/openapi-specs/compute/33-02/desc/policies/firewall_app_serverless_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Serverless** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/serverless' diff --git a/openapi-specs/compute/33-02/desc/policies/firewall_network_container_get.md b/openapi-specs/compute/33-02/desc/policies/firewall_network_container_get.md index 3f1343b53..82e656818 100644 --- a/openapi-specs/compute/33-02/desc/policies/firewall_network_container_get.md +++ b/openapi-specs/compute/33-02/desc/policies/firewall_network_container_get.md @@ -4,7 +4,7 @@ Retrieves a list of all CNNS container and host rules. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/policies/firewall_network_container_put.md b/openapi-specs/compute/33-02/desc/policies/firewall_network_container_put.md index fd9263430..cffb3f1c4 100644 --- a/openapi-specs/compute/33-02/desc/policies/firewall_network_container_put.md +++ b/openapi-specs/compute/33-02/desc/policies/firewall_network_container_put.md @@ -9,7 +9,7 @@ The procedure to add, edit, or remove rules is: Refer to the following example cURL command that retrieves a list of all rules, pretty-print the JSON response, and save the results to a file: ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -26,7 +26,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/33-02/desc/policies/firewall_network_entities_get.md b/openapi-specs/compute/33-02/desc/policies/firewall_network_entities_get.md index 757121f70..28ed8dbcb 100644 --- a/openapi-specs/compute/33-02/desc/policies/firewall_network_entities_get.md +++ b/openapi-specs/compute/33-02/desc/policies/firewall_network_entities_get.md @@ -1,7 +1,7 @@ Retrieves a list of all CNNF network objects. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/policies/firewall_network_entities_put.md b/openapi-specs/compute/33-02/desc/policies/firewall_network_entities_put.md index 83c023286..39044ee10 100644 --- a/openapi-specs/compute/33-02/desc/policies/firewall_network_entities_put.md +++ b/openapi-specs/compute/33-02/desc/policies/firewall_network_entities_put.md @@ -3,7 +3,7 @@ Updates the list of CNNF network objects. The following example curl command updates the network objects. There is an example of all three types (images,subnets, and applications ): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-02/desc/policies/policies.md b/openapi-specs/compute/33-02/desc/policies/policies.md index 69768c03d..97be7b616 100644 --- a/openapi-specs/compute/33-02/desc/policies/policies.md +++ b/openapi-specs/compute/33-02/desc/policies/policies.md @@ -21,7 +21,7 @@ To add, edit, or remove vulnerability rules from a policy: For example, the following cURL command uses basic auth to retrieve a list of all image vulnerability rules, pretty-prints the JSON response, and saves the results to a `vulnerability_rules.json` file. ```bash - $ curl -k \ + $ curl \ -u \ https:///api/v1/policies/runtime/host \ | jq '.' > vulnerability_rules.json @@ -36,7 +36,7 @@ To add, edit, or remove vulnerability rules from a policy: **Note:** Remember to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -107,7 +107,7 @@ Use the `PUT` method to delete all rules by submitting an empty JSON object. For example, to delete all host runtime rules: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-02/desc/policies/runtime_app-embedded_get.md b/openapi-specs/compute/33-02/desc/policies/runtime_app-embedded_get.md index fcf0ba8b9..517b741bb 100755 --- a/openapi-specs/compute/33-02/desc/policies/runtime_app-embedded_get.md +++ b/openapi-specs/compute/33-02/desc/policies/runtime_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > App-Embedded policy** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/policies/runtime_container_get.md b/openapi-specs/compute/33-02/desc/policies/runtime_container_get.md index f1b50b727..65cd10660 100644 --- a/openapi-specs/compute/33-02/desc/policies/runtime_container_get.md +++ b/openapi-specs/compute/33-02/desc/policies/runtime_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Container policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/policies/runtime_container_impacted_get.md b/openapi-specs/compute/33-02/desc/policies/runtime_container_impacted_get.md index 195f75547..e026d33b9 100644 --- a/openapi-specs/compute/33-02/desc/policies/runtime_container_impacted_get.md +++ b/openapi-specs/compute/33-02/desc/policies/runtime_container_impacted_get.md @@ -6,7 +6,7 @@ In the Console UI, you can see how it works by going to the **Defend > Runtime > Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ $ curl -k \ For additional help with your `ruleName`: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/policies/runtime_host_get.md b/openapi-specs/compute/33-02/desc/policies/runtime_host_get.md index 38800596c..559ef690a 100644 --- a/openapi-specs/compute/33-02/desc/policies/runtime_host_get.md +++ b/openapi-specs/compute/33-02/desc/policies/runtime_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Host policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/policies/runtime_rasp_get.md b/openapi-specs/compute/33-02/desc/policies/runtime_rasp_get.md index 5b7a76457..55a6ff05b 100644 --- a/openapi-specs/compute/33-02/desc/policies/runtime_rasp_get.md +++ b/openapi-specs/compute/33-02/desc/policies/runtime_rasp_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your RASP runtime policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/policies/runtime_rasp_put.md b/openapi-specs/compute/33-02/desc/policies/runtime_rasp_put.md index bba60ba81..f71fb4b93 100644 --- a/openapi-specs/compute/33-02/desc/policies/runtime_rasp_put.md +++ b/openapi-specs/compute/33-02/desc/policies/runtime_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve the rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET @@ -24,7 +24,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -H "Content-Type:application/json" \ -X PUT \ diff --git a/openapi-specs/compute/33-02/desc/policies/runtime_serverless_get.md b/openapi-specs/compute/33-02/desc/policies/runtime_serverless_get.md index 44326bbf6..c98489e16 100644 --- a/openapi-specs/compute/33-02/desc/policies/runtime_serverless_get.md +++ b/openapi-specs/compute/33-02/desc/policies/runtime_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Serverless policy** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/policies/secrets_get.md b/openapi-specs/compute/33-02/desc/policies/secrets_get.md index 89e6b9c0e..cb4ecb37c 100644 --- a/openapi-specs/compute/33-02/desc/policies/secrets_get.md +++ b/openapi-specs/compute/33-02/desc/policies/secrets_get.md @@ -3,7 +3,7 @@ Retrieves a list of all secrets rules. The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/policies/secrets diff --git a/openapi-specs/compute/33-02/desc/policies/secrets_put.md b/openapi-specs/compute/33-02/desc/policies/secrets_put.md index 1e8877ca1..04fd41f24 100644 --- a/openapi-specs/compute/33-02/desc/policies/secrets_put.md +++ b/openapi-specs/compute/33-02/desc/policies/secrets_put.md @@ -10,7 +10,7 @@ The procedure to add, edit, or remove secrets rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/secrets \ | jq '.' > secrets_rules.json @@ -24,7 +24,7 @@ The procedure to add, edit, or remove secrets rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/33-02/desc/policies/trust_get.md b/openapi-specs/compute/33-02/desc/policies/trust_get.md index 8de1ba409..0805d6777 100644 --- a/openapi-specs/compute/33-02/desc/policies/trust_get.md +++ b/openapi-specs/compute/33-02/desc/policies/trust_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/policies/trust_put.md b/openapi-specs/compute/33-02/desc/policies/trust_put.md index fccd4b91e..7fec72031 100644 --- a/openapi-specs/compute/33-02/desc/policies/trust_put.md +++ b/openapi-specs/compute/33-02/desc/policies/trust_put.md @@ -1,7 +1,7 @@ Updates the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-02/desc/policies/vulnerability_ci_images_get.md b/openapi-specs/compute/33-02/desc/policies/vulnerability_ci_images_get.md index abc3da8fa..ce0d50a29 100644 --- a/openapi-specs/compute/33-02/desc/policies/vulnerability_ci_images_get.md +++ b/openapi-specs/compute/33-02/desc/policies/vulnerability_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/policies/vulnerability_ci_serverless_get.md b/openapi-specs/compute/33-02/desc/policies/vulnerability_ci_serverless_get.md index 958c86495..6fb5f93ce 100644 --- a/openapi-specs/compute/33-02/desc/policies/vulnerability_ci_serverless_get.md +++ b/openapi-specs/compute/33-02/desc/policies/vulnerability_ci_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/policies/vulnerability_coderepos_get.md b/openapi-specs/compute/33-02/desc/policies/vulnerability_coderepos_get.md index 08dfed8e1..a4ac62f33 100644 --- a/openapi-specs/compute/33-02/desc/policies/vulnerability_coderepos_get.md +++ b/openapi-specs/compute/33-02/desc/policies/vulnerability_coderepos_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Code repositories** in the Co Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/vulnerability/coderepos' diff --git a/openapi-specs/compute/33-02/desc/policies/vulnerability_coderepos_impacted_get.md b/openapi-specs/compute/33-02/desc/policies/vulnerability_coderepos_impacted_get.md index a401a12c4..e64ef768e 100644 --- a/openapi-specs/compute/33-02/desc/policies/vulnerability_coderepos_impacted_get.md +++ b/openapi-specs/compute/33-02/desc/policies/vulnerability_coderepos_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/coderepos/impacted?project=&ruleName=' ``` diff --git a/openapi-specs/compute/33-02/desc/policies/vulnerability_coderepos_put.md b/openapi-specs/compute/33-02/desc/policies/vulnerability_coderepos_put.md index 514eec136..a002415b9 100644 --- a/openapi-specs/compute/33-02/desc/policies/vulnerability_coderepos_put.md +++ b/openapi-specs/compute/33-02/desc/policies/vulnerability_coderepos_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Code repo Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT 'https:///api/v/policies/vulnerability/coderepos' \ diff --git a/openapi-specs/compute/33-02/desc/policies/vulnerability_host_get.md b/openapi-specs/compute/33-02/desc/policies/vulnerability_host_get.md index 3b9b14b9c..260da7675 100644 --- a/openapi-specs/compute/33-02/desc/policies/vulnerability_host_get.md +++ b/openapi-specs/compute/33-02/desc/policies/vulnerability_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Hosts > Running hosts** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/policies/vulnerability_host_impacted_get.md b/openapi-specs/compute/33-02/desc/policies/vulnerability_host_impacted_get.md index 346368518..f44592830 100644 --- a/openapi-specs/compute/33-02/desc/policies/vulnerability_host_impacted_get.md +++ b/openapi-specs/compute/33-02/desc/policies/vulnerability_host_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by `RULE_NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/host/impacted?project={PROJECT_NAME}&ruleName={RULE_NAME}' ``` diff --git a/openapi-specs/compute/33-02/desc/policies/vulnerability_images_get.md b/openapi-specs/compute/33-02/desc/policies/vulnerability_images_get.md index 33581be37..57359bb8f 100644 --- a/openapi-specs/compute/33-02/desc/policies/vulnerability_images_get.md +++ b/openapi-specs/compute/33-02/desc/policies/vulnerability_images_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images?project=" diff --git a/openapi-specs/compute/33-02/desc/policies/vulnerability_images_impacted_get.md b/openapi-specs/compute/33-02/desc/policies/vulnerability_images_impacted_get.md index ae1d5e396..e2a4efa23 100644 --- a/openapi-specs/compute/33-02/desc/policies/vulnerability_images_impacted_get.md +++ b/openapi-specs/compute/33-02/desc/policies/vulnerability_images_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of images caught by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images/impacted?project=&ruleName=" diff --git a/openapi-specs/compute/33-02/desc/policies/vulnerability_images_put.md b/openapi-specs/compute/33-02/desc/policies/vulnerability_images_put.md index b3330dab7..8c3cc8af2 100644 --- a/openapi-specs/compute/33-02/desc/policies/vulnerability_images_put.md +++ b/openapi-specs/compute/33-02/desc/policies/vulnerability_images_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -X PUT 'https:///api/v/policies/vulnerability/images' \ --data '{ diff --git a/openapi-specs/compute/33-02/desc/policies/vulnerability_serverless_get.md b/openapi-specs/compute/33-02/desc/policies/vulnerability_serverless_get.md index c7a8e2ef5..41c7e75d8 100644 --- a/openapi-specs/compute/33-02/desc/policies/vulnerability_serverless_get.md +++ b/openapi-specs/compute/33-02/desc/policies/vulnerability_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Functions** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/policies/vulnerability_serverless_put.md b/openapi-specs/compute/33-02/desc/policies/vulnerability_serverless_put.md index 2b567b5b1..5199f0997 100644 --- a/openapi-specs/compute/33-02/desc/policies/vulnerability_serverless_put.md +++ b/openapi-specs/compute/33-02/desc/policies/vulnerability_serverless_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k 'https:///api/v/policies/vulnerability/serverless' \ +$ curl 'https:///api/v/policies/vulnerability/serverless' \ -X PUT \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/33-02/desc/policies/vulnerability_vms_get.md b/openapi-specs/compute/33-02/desc/policies/vulnerability_vms_get.md index 117d2cc4a..e37c1520f 100644 --- a/openapi-specs/compute/33-02/desc/policies/vulnerability_vms_get.md +++ b/openapi-specs/compute/33-02/desc/policies/vulnerability_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Hosts > V The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/policies/vulnerability_vms_impacted_get.md b/openapi-specs/compute/33-02/desc/policies/vulnerability_vms_impacted_get.md index 29d9621ea..f1a7f7ef5 100644 --- a/openapi-specs/compute/33-02/desc/policies/vulnerability_vms_impacted_get.md +++ b/openapi-specs/compute/33-02/desc/policies/vulnerability_vms_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/vms?project=&ruleName=' ``` diff --git a/openapi-specs/compute/33-02/desc/profiles/app-embedded_download_get.md b/openapi-specs/compute/33-02/desc/profiles/app-embedded_download_get.md index 4b3f7ff8a..2e8cac56d 100644 --- a/openapi-specs/compute/33-02/desc/profiles/app-embedded_download_get.md +++ b/openapi-specs/compute/33-02/desc/profiles/app-embedded_download_get.md @@ -5,7 +5,7 @@ Downloads the app-embedded observations in a CSV format. Refer to the following example cURL command that downloads all the app-embedded runtime profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/profiles/app-embedded_get.md b/openapi-specs/compute/33-02/desc/profiles/app-embedded_get.md index f3ddb3125..c332061e5 100644 --- a/openapi-specs/compute/33-02/desc/profiles/app-embedded_get.md +++ b/openapi-specs/compute/33-02/desc/profiles/app-embedded_get.md @@ -5,7 +5,7 @@ Retrieves the app-embedded observations. Refer to the following example cURL command that lists all the app-embedded runtime: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/profiles/container_download_get.md b/openapi-specs/compute/33-02/desc/profiles/container_download_get.md index ad7a86101..ee9d5e9e4 100644 --- a/openapi-specs/compute/33-02/desc/profiles/container_download_get.md +++ b/openapi-specs/compute/33-02/desc/profiles/container_download_get.md @@ -6,7 +6,7 @@ Retrieves the details and state of all runtime models in CSV format. Refer to the following example cURL command that downloads a complete list in CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/profiles/container_filters_get.md b/openapi-specs/compute/33-02/desc/profiles/container_filters_get.md index 8b6122b80..13535b520 100644 --- a/openapi-specs/compute/33-02/desc/profiles/container_filters_get.md +++ b/openapi-specs/compute/33-02/desc/profiles/container_filters_get.md @@ -4,7 +4,7 @@ Returns a list of os and images from page monitor/runtime/container-models in Co Example curl command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/profiles/container_get.md b/openapi-specs/compute/33-02/desc/profiles/container_get.md index cdbc24c3e..59a3764fb 100644 --- a/openapi-specs/compute/33-02/desc/profiles/container_get.md +++ b/openapi-specs/compute/33-02/desc/profiles/container_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of all runtime models. Refer to the following example cURL command that lists all runtime models in a system: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/profiles/container_learn_post.md b/openapi-specs/compute/33-02/desc/profiles/container_learn_post.md index 5fef2e31e..2c1d08af1 100644 --- a/openapi-specs/compute/33-02/desc/profiles/container_learn_post.md +++ b/openapi-specs/compute/33-02/desc/profiles/container_learn_post.md @@ -7,7 +7,7 @@ For more information, refer to [Learning mode](https://docs.prismacloud.io/en/cl Refer to the following example cURL command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/profiles/host_download_get.md b/openapi-specs/compute/33-02/desc/profiles/host_download_get.md index ace270a32..2dfb51ec0 100644 --- a/openapi-specs/compute/33-02/desc/profiles/host_download_get.md +++ b/openapi-specs/compute/33-02/desc/profiles/host_download_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of each host service runtime model in CSV format Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/profiles/host_get.md b/openapi-specs/compute/33-02/desc/profiles/host_get.md index 208a24de3..55d8bf8ff 100644 --- a/openapi-specs/compute/33-02/desc/profiles/host_get.md +++ b/openapi-specs/compute/33-02/desc/profiles/host_get.md @@ -15,7 +15,7 @@ The returned JSON object has the following structure: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/profiles/host_id_rule_get.md b/openapi-specs/compute/33-02/desc/profiles/host_id_rule_get.md index 672cb4c62..8be668fca 100644 --- a/openapi-specs/compute/33-02/desc/profiles/host_id_rule_get.md +++ b/openapi-specs/compute/33-02/desc/profiles/host_id_rule_get.md @@ -10,7 +10,7 @@ This is the `PROFILE_ID`. The following example command uses curl and basic auth to specify the learning mode for a profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/profiles/service_download_get.md b/openapi-specs/compute/33-02/desc/profiles/service_download_get.md index 63dff3354..4c1c431c1 100644 --- a/openapi-specs/compute/33-02/desc/profiles/service_download_get.md +++ b/openapi-specs/compute/33-02/desc/profiles/service_download_get.md @@ -1,7 +1,7 @@ Retrieves the details and state of all host service runtime models in CSV format ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/profiles/service_get.md b/openapi-specs/compute/33-02/desc/profiles/service_get.md index a4f8c348d..5d786d919 100644 --- a/openapi-specs/compute/33-02/desc/profiles/service_get.md +++ b/openapi-specs/compute/33-02/desc/profiles/service_get.md @@ -10,7 +10,7 @@ The returned JSON object has the following structure: Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/profiles/service_id_learn_post.md b/openapi-specs/compute/33-02/desc/profiles/service_id_learn_post.md index fb338b80d..fa85fc3a2 100644 --- a/openapi-specs/compute/33-02/desc/profiles/service_id_learn_post.md +++ b/openapi-specs/compute/33-02/desc/profiles/service_id_learn_post.md @@ -11,7 +11,7 @@ The `PROFILE_ID` is typically the service's name, such as `sshd` or `ntpd`. The following example command uses curl and basic auth to specify the learning mode for a host service profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/profiles/service_learn_post.md b/openapi-specs/compute/33-02/desc/profiles/service_learn_post.md index 02a1f299e..ceff8e5a5 100644 --- a/openapi-specs/compute/33-02/desc/profiles/service_learn_post.md +++ b/openapi-specs/compute/33-02/desc/profiles/service_learn_post.md @@ -3,7 +3,7 @@ Specify the learning mode for all host service profiles. The following example command uses curl and basic auth to specify the learning mode for all host service profiles. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/profiles/service_names_get.md b/openapi-specs/compute/33-02/desc/profiles/service_names_get.md index 7da863545..afae56f0d 100644 --- a/openapi-specs/compute/33-02/desc/profiles/service_names_get.md +++ b/openapi-specs/compute/33-02/desc/profiles/service_names_get.md @@ -3,7 +3,7 @@ Retrieves the name of all host service runtime models from within the app at **M The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/projects/get.md b/openapi-specs/compute/33-02/desc/projects/get.md index 05485c24c..1ac04d2c0 100644 --- a/openapi-specs/compute/33-02/desc/projects/get.md +++ b/openapi-specs/compute/33-02/desc/projects/get.md @@ -3,7 +3,7 @@ Lists all projects visible to the given user. Assuming the given user is an admin, the following example curl command would list all projects: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/projects/name_delete.md b/openapi-specs/compute/33-02/desc/projects/name_delete.md index fba889f7e..0a34e72a2 100644 --- a/openapi-specs/compute/33-02/desc/projects/name_delete.md +++ b/openapi-specs/compute/33-02/desc/projects/name_delete.md @@ -6,7 +6,7 @@ The value for `` can be retrieved from the `_id` field in the resp The DELETE method returns the decommissioned supervisor's admin username and password. ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/compute/33-02/desc/projects/name_put.md b/openapi-specs/compute/33-02/desc/projects/name_put.md index b5a83a67d..1bde9b0c7 100644 --- a/openapi-specs/compute/33-02/desc/projects/name_put.md +++ b/openapi-specs/compute/33-02/desc/projects/name_put.md @@ -4,7 +4,7 @@ The following example curl command updates a project named ``. The value for `` can be retrieved from the `_id` field in the response object from `GET /api/v1/projects`. ```bash -$ curl -k \ +$ curl \ -u \ -X PUT \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/compute/33-02/desc/projects/post.md b/openapi-specs/compute/33-02/desc/projects/post.md index 8862c0fd4..38c574173 100644 --- a/openapi-specs/compute/33-02/desc/projects/post.md +++ b/openapi-specs/compute/33-02/desc/projects/post.md @@ -3,7 +3,7 @@ Provisions a new project. The following example curl command provisions a new project named `my-project`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ $ curl -k \ If you have installed a new instance of Console, and you have already created an initial admin user for it, then you can specify the admin username name and password when you provision the project. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/projects/projects.md b/openapi-specs/compute/33-02/desc/projects/projects.md index 7e7dcff66..19c904e9e 100644 --- a/openapi-specs/compute/33-02/desc/projects/projects.md +++ b/openapi-specs/compute/33-02/desc/projects/projects.md @@ -20,7 +20,7 @@ If `project` is not specified, it is set to `Central+Console`. For example, to retrieve the compliance policies for a tenant project named `mobile_payments_division`, use the following curl command: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/radar/container_clean_post.md b/openapi-specs/compute/33-02/desc/radar/container_clean_post.md index 662b6d53f..d4f87e91e 100644 --- a/openapi-specs/compute/33-02/desc/radar/container_clean_post.md +++ b/openapi-specs/compute/33-02/desc/radar/container_clean_post.md @@ -1,7 +1,7 @@ Cleans the container runtime profiles and Radar entities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/radar/container_delete.md b/openapi-specs/compute/33-02/desc/radar/container_delete.md index 4eabe337f..b6cc69cf2 100644 --- a/openapi-specs/compute/33-02/desc/radar/container_delete.md +++ b/openapi-specs/compute/33-02/desc/radar/container_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-02/desc/radar/container_export_get.md b/openapi-specs/compute/33-02/desc/radar/container_export_get.md index 7f577568f..f776c7e6c 100644 --- a/openapi-specs/compute/33-02/desc/radar/container_export_get.md +++ b/openapi-specs/compute/33-02/desc/radar/container_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for containers) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/radar/container_filters_get.md b/openapi-specs/compute/33-02/desc/radar/container_filters_get.md index f66463da1..8d7cd6df3 100644 --- a/openapi-specs/compute/33-02/desc/radar/container_filters_get.md +++ b/openapi-specs/compute/33-02/desc/radar/container_filters_get.md @@ -1,7 +1,7 @@ Returns the namespaces from the container view on the Radar page. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/radar/container_get.md b/openapi-specs/compute/33-02/desc/radar/container_get.md index 280d683d9..404629a25 100644 --- a/openapi-specs/compute/33-02/desc/radar/container_get.md +++ b/openapi-specs/compute/33-02/desc/radar/container_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (container view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/radar/host_delete.md b/openapi-specs/compute/33-02/desc/radar/host_delete.md index 738fa7a7c..b4910a8b7 100644 --- a/openapi-specs/compute/33-02/desc/radar/host_delete.md +++ b/openapi-specs/compute/33-02/desc/radar/host_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two apps in CNNF for hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-02/desc/radar/host_export_get.md b/openapi-specs/compute/33-02/desc/radar/host_export_get.md index dd91b5335..851d6f40f 100644 --- a/openapi-specs/compute/33-02/desc/radar/host_export_get.md +++ b/openapi-specs/compute/33-02/desc/radar/host_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for hosts) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/radar/host_get.md b/openapi-specs/compute/33-02/desc/radar/host_get.md index a12025856..222d075aa 100644 --- a/openapi-specs/compute/33-02/desc/radar/host_get.md +++ b/openapi-specs/compute/33-02/desc/radar/host_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (host view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/radar/serverless_get.md b/openapi-specs/compute/33-02/desc/radar/serverless_get.md index b2f329149..170cfb48d 100644 --- a/openapi-specs/compute/33-02/desc/radar/serverless_get.md +++ b/openapi-specs/compute/33-02/desc/radar/serverless_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/radar/serverless_progress_get.md b/openapi-specs/compute/33-02/desc/radar/serverless_progress_get.md index a11c1ae20..0808dfbf4 100644 --- a/openapi-specs/compute/33-02/desc/radar/serverless_progress_get.md +++ b/openapi-specs/compute/33-02/desc/radar/serverless_progress_get.md @@ -1,7 +1,7 @@ Returns the scan progress from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/radar/serverless_scan_post.md b/openapi-specs/compute/33-02/desc/radar/serverless_scan_post.md index 0d519ba88..2d444ac88 100644 --- a/openapi-specs/compute/33-02/desc/radar/serverless_scan_post.md +++ b/openapi-specs/compute/33-02/desc/radar/serverless_scan_post.md @@ -1,7 +1,7 @@ Initiates a serverless scan of your environments. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/radar/serverless_stop_post.md b/openapi-specs/compute/33-02/desc/radar/serverless_stop_post.md index 5c0bdf186..f15bef34d 100644 --- a/openapi-specs/compute/33-02/desc/radar/serverless_stop_post.md +++ b/openapi-specs/compute/33-02/desc/radar/serverless_stop_post.md @@ -1,7 +1,7 @@ Stops an in-progress serverless scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/rbac/role_delete.md b/openapi-specs/compute/33-02/desc/rbac/role_delete.md index 87015b6e8..46efcf9c9 100644 --- a/openapi-specs/compute/33-02/desc/rbac/role_delete.md +++ b/openapi-specs/compute/33-02/desc/rbac/role_delete.md @@ -4,7 +4,7 @@ System roles and roles assigned to users/groups cannot be deleted. The following example curl command uses basic auth to delete role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-02/desc/rbac/roles_get.md b/openapi-specs/compute/33-02/desc/rbac/roles_get.md index 4cd1d9bc7..112026937 100644 --- a/openapi-specs/compute/33-02/desc/rbac/roles_get.md +++ b/openapi-specs/compute/33-02/desc/rbac/roles_get.md @@ -3,7 +3,7 @@ This endpoint will return a list in JSON format of the roles can be found under The following example curl command uses basic auth to return: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/rbac/roles_post.md b/openapi-specs/compute/33-02/desc/rbac/roles_post.md index 1f20772ce..6988766e8 100644 --- a/openapi-specs/compute/33-02/desc/rbac/roles_post.md +++ b/openapi-specs/compute/33-02/desc/rbac/roles_post.md @@ -37,7 +37,7 @@ The added role must contain the "user" permission with read-write access. This p The following example curl command uses basic auth to create the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/rbac/roles_put.md b/openapi-specs/compute/33-02/desc/rbac/roles_put.md index 34d7b41a7..f62e34ccb 100644 --- a/openapi-specs/compute/33-02/desc/rbac/roles_put.md +++ b/openapi-specs/compute/33-02/desc/rbac/roles_put.md @@ -38,7 +38,7 @@ The updated role must contain the "user" permission with read-write access. This The following example curl command uses basic auth to update the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-02/desc/recovery/backup_get.md b/openapi-specs/compute/33-02/desc/recovery/backup_get.md index 4da46f356..bf735905a 100644 --- a/openapi-specs/compute/33-02/desc/recovery/backup_get.md +++ b/openapi-specs/compute/33-02/desc/recovery/backup_get.md @@ -3,7 +3,7 @@ Returns a list of available backups. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/recovery/backup_id_delete.md b/openapi-specs/compute/33-02/desc/recovery/backup_id_delete.md index ae9c33e90..80cd4c3f6 100644 --- a/openapi-specs/compute/33-02/desc/recovery/backup_id_delete.md +++ b/openapi-specs/compute/33-02/desc/recovery/backup_id_delete.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-02/desc/recovery/backup_id_patch.md b/openapi-specs/compute/33-02/desc/recovery/backup_id_patch.md index 4a78cd67d..b3699972f 100644 --- a/openapi-specs/compute/33-02/desc/recovery/backup_id_patch.md +++ b/openapi-specs/compute/33-02/desc/recovery/backup_id_patch.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/compute/33-02/desc/recovery/backup_post.md b/openapi-specs/compute/33-02/desc/recovery/backup_post.md index f45161712..41436fe5f 100644 --- a/openapi-specs/compute/33-02/desc/recovery/backup_post.md +++ b/openapi-specs/compute/33-02/desc/recovery/backup_post.md @@ -3,7 +3,7 @@ Creates a backup named `backup_name` by invoking the MongoDB dump process. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/recovery/restore_id_post.md b/openapi-specs/compute/33-02/desc/recovery/restore_id_post.md index 850fceeaa..e424641cc 100644 --- a/openapi-specs/compute/33-02/desc/recovery/restore_id_post.md +++ b/openapi-specs/compute/33-02/desc/recovery/restore_id_post.md @@ -5,7 +5,7 @@ Restores Prisma Cloud Compute from the given backup. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/registry/download_get.md b/openapi-specs/compute/33-02/desc/registry/download_get.md index 5a3eb0141..3eef8d50e 100644 --- a/openapi-specs/compute/33-02/desc/registry/download_get.md +++ b/openapi-specs/compute/33-02/desc/registry/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Compliance > Images > Reg Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/registry/get.md b/openapi-specs/compute/33-02/desc/registry/get.md index e8b87080e..208b2f1e3 100644 --- a/openapi-specs/compute/33-02/desc/registry/get.md +++ b/openapi-specs/compute/33-02/desc/registry/get.md @@ -21,7 +21,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that retrieves a scan report for all images in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -33,7 +33,7 @@ The compact query can be used to get a general overview of the number of Vulnera Refer to the following cURL command that retrieves a compact scan report for the Ubuntu image in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -44,7 +44,7 @@ The name query is synonymous with the filter registry text field in the Console Refer to the following cURL that retrieves the scan report for the image in the registry with the matching **sha256** hash: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -54,7 +54,7 @@ $ curl -k \ Refer to the following cURL command that retrieves the images in the first 10 registries: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/registry/get_registry_progress.md b/openapi-specs/compute/33-02/desc/registry/get_registry_progress.md index ddc319c1b..cc6feac3d 100644 --- a/openapi-specs/compute/33-02/desc/registry/get_registry_progress.md +++ b/openapi-specs/compute/33-02/desc/registry/get_registry_progress.md @@ -11,7 +11,7 @@ For a regular scan, use the API path only without any query parameters. Refer to the following example cURL request that retrieves the ongoing scan details for a regular registry scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -61,7 +61,7 @@ For an on-demand scan that is started using the `/registry/scan` endpoint with t Refer to the following example cURL request that retrieves the ongoing scan details for an on-demand registry scan that is started using the `/registry/scan` endpoint for the repository `alpine` with tag `3.16`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/registry/names_get.md b/openapi-specs/compute/33-02/desc/registry/names_get.md index 6933a570c..25afb48b8 100644 --- a/openapi-specs/compute/33-02/desc/registry/names_get.md +++ b/openapi-specs/compute/33-02/desc/registry/names_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command that retrieves a list of image names from your scanned registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/registry/scan_post.md b/openapi-specs/compute/33-02/desc/registry/scan_post.md index ce7e19533..96bfd5f16 100644 --- a/openapi-specs/compute/33-02/desc/registry/scan_post.md +++ b/openapi-specs/compute/33-02/desc/registry/scan_post.md @@ -17,7 +17,7 @@ For information on scan result, see [Get Registry Scan Report](https://prisma.pa Refer to the following example cURL command that forces Prisma Cloud Compute to rescan all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -27,7 +27,7 @@ $ curl -k \ Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan a specific image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -52,7 +52,7 @@ For information on scan result, see [Get Registry Scan Report](https://pan.dev/p Refer to the following example cURL command to trigger an on-demand scan for an image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/registry/stop_post.md b/openapi-specs/compute/33-02/desc/registry/stop_post.md index 29e103ac1..05ac2f436 100644 --- a/openapi-specs/compute/33-02/desc/registry/stop_post.md +++ b/openapi-specs/compute/33-02/desc/registry/stop_post.md @@ -5,7 +5,7 @@ Stops current registry scan immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to stop scanning all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/scans/download_get.md b/openapi-specs/compute/33-02/desc/scans/download_get.md index 61a0ccc2d..3785bf562 100644 --- a/openapi-specs/compute/33-02/desc/scans/download_get.md +++ b/openapi-specs/compute/33-02/desc/scans/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Images The following cURL command retrieves and saves your Jenkins and twistcli scan reports to a CSV file called `scans_report.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/scans/filter_get.md b/openapi-specs/compute/33-02/desc/scans/filter_get.md index 58550ad35..df3e9cdb0 100644 --- a/openapi-specs/compute/33-02/desc/scans/filter_get.md +++ b/openapi-specs/compute/33-02/desc/scans/filter_get.md @@ -3,7 +3,7 @@ Retrieves the list of Jenkins projects that have been scanned by the Jenkins plu The following example curl command uses basic auth to retrieve the list of Jenkins project names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/scans/get.md b/openapi-specs/compute/33-02/desc/scans/get.md index e28506972..107b733bd 100644 --- a/openapi-specs/compute/33-02/desc/scans/get.md +++ b/openapi-specs/compute/33-02/desc/scans/get.md @@ -11,7 +11,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command that retrieves the scan reports for all images scanned using the Jenkins CI plugin or the twistcli tool: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -23,7 +23,7 @@ To get the report of a specific scan, add query parameters to narrow the scope o The following cURL command retrieves the scan report for an image with a SHA256 ID of `sha256:f756e84300d8e53006090573dd33abe5b8cfac3e42d104fc4be37f435fe512f3`. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/scans/id_get.md b/openapi-specs/compute/33-02/desc/scans/id_get.md index 7a342ef60..1557b1905 100644 --- a/openapi-specs/compute/33-02/desc/scans/id_get.md +++ b/openapi-specs/compute/33-02/desc/scans/id_get.md @@ -3,7 +3,7 @@ Retrieves all scan reports for images scanned by the Jenkins plugin or twistcli The following example curl command uses basic auth to retrieve the scan report for just an image with a SHA256 ID of `5c3385fd2e76c5c16124c077`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/scripts/console_sh_get.md b/openapi-specs/compute/33-02/desc/scripts/console_sh_get.md index d8f02038f..1622321ca 100644 --- a/openapi-specs/compute/33-02/desc/scripts/console_sh_get.md +++ b/openapi-specs/compute/33-02/desc/scripts/console_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/scripts/defender_ps1_get.md b/openapi-specs/compute/33-02/desc/scripts/defender_ps1_get.md index a47616983..45e4a6133 100644 --- a/openapi-specs/compute/33-02/desc/scripts/defender_ps1_get.md +++ b/openapi-specs/compute/33-02/desc/scripts/defender_ps1_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/scripts/defender_sh_get.md b/openapi-specs/compute/33-02/desc/scripts/defender_sh_get.md index 98ad6cf62..a8a302426 100644 --- a/openapi-specs/compute/33-02/desc/scripts/defender_sh_get.md +++ b/openapi-specs/compute/33-02/desc/scripts/defender_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/serverless/download_get.md b/openapi-specs/compute/33-02/desc/serverless/download_get.md index a8e49ff25..4d7d3adc1 100644 --- a/openapi-specs/compute/33-02/desc/serverless/download_get.md +++ b/openapi-specs/compute/33-02/desc/serverless/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Functio The following cURL command retrieves a list of all serverless resources monitored by Prisma Cloud Compute and saves the results in a CSV file called `serverless.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/serverless/download' \ diff --git a/openapi-specs/compute/33-02/desc/serverless/embed_post.md b/openapi-specs/compute/33-02/desc/serverless/embed_post.md index 6cce784b8..353b5721c 100644 --- a/openapi-specs/compute/33-02/desc/serverless/embed_post.md +++ b/openapi-specs/compute/33-02/desc/serverless/embed_post.md @@ -1,7 +1,7 @@ The following curl command uses basic auth to retrieve a list of all Serverless resources that monitored by Prisma Cloud Compute, and save the results to a CSV file: ```bash -$ curl -k \ +$ curl \ -X POST \ -H "Content-Type: application/octet-stream" \ -u \ diff --git a/openapi-specs/compute/33-02/desc/serverless/get.md b/openapi-specs/compute/33-02/desc/serverless/get.md index aee50492f..430ee065a 100644 --- a/openapi-specs/compute/33-02/desc/serverless/get.md +++ b/openapi-specs/compute/33-02/desc/serverless/get.md @@ -11,7 +11,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Functions > Scanned function Refer to the following example cURL command that retrieves the scan reports for serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/serverless/names_get.md b/openapi-specs/compute/33-02/desc/serverless/names_get.md index 3cab17092..90285574a 100644 --- a/openapi-specs/compute/33-02/desc/serverless/names_get.md +++ b/openapi-specs/compute/33-02/desc/serverless/names_get.md @@ -5,7 +5,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo The following curl command uses basic auth to retrieve a list of names of all Serverless resources monitored by Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -X GET \ -H "Content-Type: application/json" \ -u \ diff --git a/openapi-specs/compute/33-02/desc/serverless/scan_post.md b/openapi-specs/compute/33-02/desc/serverless/scan_post.md index 159285349..70a3a3b4e 100644 --- a/openapi-specs/compute/33-02/desc/serverless/scan_post.md +++ b/openapi-specs/compute/33-02/desc/serverless/scan_post.md @@ -5,7 +5,7 @@ Re-scan all serverless functions immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/scan diff --git a/openapi-specs/compute/33-02/desc/serverless/stop_post.md b/openapi-specs/compute/33-02/desc/serverless/stop_post.md index 763710842..67c0d2239 100644 --- a/openapi-specs/compute/33-02/desc/serverless/stop_post.md +++ b/openapi-specs/compute/33-02/desc/serverless/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing serverless scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/stop diff --git a/openapi-specs/compute/33-02/desc/settings/alerts_get.md b/openapi-specs/compute/33-02/desc/settings/alerts_get.md index 060114c39..2b25dc6c9 100644 --- a/openapi-specs/compute/33-02/desc/settings/alerts_get.md +++ b/openapi-specs/compute/33-02/desc/settings/alerts_get.md @@ -1,7 +1,7 @@ Retrieves a list of your alert settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/settings/alerts_options_get.md b/openapi-specs/compute/33-02/desc/settings/alerts_options_get.md index 095c1f1b7..aa7a1d250 100644 --- a/openapi-specs/compute/33-02/desc/settings/alerts_options_get.md +++ b/openapi-specs/compute/33-02/desc/settings/alerts_options_get.md @@ -3,7 +3,7 @@ This endpoint will return the alert profile configuration options that can be fo The following example curl command uses basic auth to retrieve all alert profile configuration options: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/settings/alerts_post.md b/openapi-specs/compute/33-02/desc/settings/alerts_post.md index 3acb8d543..cd303f880 100644 --- a/openapi-specs/compute/33-02/desc/settings/alerts_post.md +++ b/openapi-specs/compute/33-02/desc/settings/alerts_post.md @@ -3,7 +3,7 @@ Configure alerts. The following example curl command sets the aggregation period for alerts to one hour. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/settings/certificates_post.md b/openapi-specs/compute/33-02/desc/settings/certificates_post.md index fbdc8a5a9..bd30ea399 100644 --- a/openapi-specs/compute/33-02/desc/settings/certificates_post.md +++ b/openapi-specs/compute/33-02/desc/settings/certificates_post.md @@ -9,7 +9,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to set the validity period for client certificates to seven days: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/33-02/desc/settings/certs_get.md b/openapi-specs/compute/33-02/desc/settings/certs_get.md index ba6674a3c..dbf1d3790 100644 --- a/openapi-specs/compute/33-02/desc/settings/certs_get.md +++ b/openapi-specs/compute/33-02/desc/settings/certs_get.md @@ -6,7 +6,7 @@ Defenders use these names to connect to Console. Refer to the following example cURL request that uses basic auth to retrieve the SANs in Console's cert: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/settings/certs_post.md b/openapi-specs/compute/33-02/desc/settings/certs_post.md index a6e429006..fb2cedee5 100644 --- a/openapi-specs/compute/33-02/desc/settings/certs_post.md +++ b/openapi-specs/compute/33-02/desc/settings/certs_post.md @@ -12,7 +12,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to add `node-01.example.com` to the `subjectAltName` field in the certificate: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/33-02/desc/settings/coderepos_get.md b/openapi-specs/compute/33-02/desc/settings/coderepos_get.md index 6cbfb78cb..286a8d905 100644 --- a/openapi-specs/compute/33-02/desc/settings/coderepos_get.md +++ b/openapi-specs/compute/33-02/desc/settings/coderepos_get.md @@ -20,7 +20,7 @@ Construct the full webhook using Console's publicly accessible DNS name or IP ad Refer to the following example cURL command that retrieves all code repositories to scan, as well as the webhook URL suffix: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/settings/console-certificates_post.md b/openapi-specs/compute/33-02/desc/settings/console-certificates_post.md index 5673af840..392061c8f 100644 --- a/openapi-specs/compute/33-02/desc/settings/console-certificates_post.md +++ b/openapi-specs/compute/33-02/desc/settings/console-certificates_post.md @@ -9,7 +9,7 @@ For the custom TLS certificate for securing browser access, this file must be in Refer to the following example cURL request that uses basic auth and configures the custom certificate to use for securing browser access to the console: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/settings/custom-labels_get.md b/openapi-specs/compute/33-02/desc/settings/custom-labels_get.md index a849dd8a8..19c1cadde 100644 --- a/openapi-specs/compute/33-02/desc/settings/custom-labels_get.md +++ b/openapi-specs/compute/33-02/desc/settings/custom-labels_get.md @@ -5,7 +5,7 @@ Returns the list of alert labels configured in Prisma Cloud Compute. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/settings/custom-labels_post.md b/openapi-specs/compute/33-02/desc/settings/custom-labels_post.md index 6bb66e706..9b0702fe8 100644 --- a/openapi-specs/compute/33-02/desc/settings/custom-labels_post.md +++ b/openapi-specs/compute/33-02/desc/settings/custom-labels_post.md @@ -5,7 +5,7 @@ Creates a custom alert label to augment audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/settings/defender_get.md b/openapi-specs/compute/33-02/desc/settings/defender_get.md index ecb8b6989..cf43bb304 100644 --- a/openapi-specs/compute/33-02/desc/settings/defender_get.md +++ b/openapi-specs/compute/33-02/desc/settings/defender_get.md @@ -5,7 +5,7 @@ Returns the advanced settings for Defenders. Refer to the following example cURL command that gets all advanced settings for Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/settings/forensic_get.md b/openapi-specs/compute/33-02/desc/settings/forensic_get.md index 9c16b70b9..3486b2bf9 100644 --- a/openapi-specs/compute/33-02/desc/settings/forensic_get.md +++ b/openapi-specs/compute/33-02/desc/settings/forensic_get.md @@ -1,7 +1,7 @@ Retrieves the settings for the forensics system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/settings/forensic_post.md b/openapi-specs/compute/33-02/desc/settings/forensic_post.md index 31f809d39..8943842fb 100644 --- a/openapi-specs/compute/33-02/desc/settings/forensic_post.md +++ b/openapi-specs/compute/33-02/desc/settings/forensic_post.md @@ -3,7 +3,7 @@ Configures the forensics system. The following example curl command allocates 100 MB of local disk space for container forensic data and 10 MB for host forensics data. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/settings/initialized_get.md b/openapi-specs/compute/33-02/desc/settings/initialized_get.md index 3134912d1..2af8462f1 100644 --- a/openapi-specs/compute/33-02/desc/settings/initialized_get.md +++ b/openapi-specs/compute/33-02/desc/settings/initialized_get.md @@ -4,7 +4,7 @@ After first installing Console, the first thing you must do is create an admin a Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/settings/intelligence-windows_post.md b/openapi-specs/compute/33-02/desc/settings/intelligence-windows_post.md index c39e256d2..0721dab3b 100644 --- a/openapi-specs/compute/33-02/desc/settings/intelligence-windows_post.md +++ b/openapi-specs/compute/33-02/desc/settings/intelligence-windows_post.md @@ -3,7 +3,7 @@ This endpoint will enable or disable the Windows Intelligence Service from **Man The following example curl command uses basic auth to enable online updates of Windows vulnerabilities from the intelligence stream: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/settings/intelligence_get.md b/openapi-specs/compute/33-02/desc/settings/intelligence_get.md index 26c694246..15e9f24ae 100644 --- a/openapi-specs/compute/33-02/desc/settings/intelligence_get.md +++ b/openapi-specs/compute/33-02/desc/settings/intelligence_get.md @@ -5,7 +5,7 @@ Returns the details about the Intelligence Stream configuration. Refer to the following example cURL command that uses basic auth to retrieve your Intelligence Stream configuration settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/settings/intelligence_post.md b/openapi-specs/compute/33-02/desc/settings/intelligence_post.md index 74b06a3a0..2dbbd0168 100644 --- a/openapi-specs/compute/33-02/desc/settings/intelligence_post.md +++ b/openapi-specs/compute/33-02/desc/settings/intelligence_post.md @@ -7,7 +7,7 @@ For more information, see [Intelligence Stream](https://docs.paloaltonetworks.co Refer to the following example cURL command that uses basic auth to configure settings of your Intelligence Stream. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/settings/latest-version_get.md b/openapi-specs/compute/33-02/desc/settings/latest-version_get.md index c443fa7b5..16601fb5b 100644 --- a/openapi-specs/compute/33-02/desc/settings/latest-version_get.md +++ b/openapi-specs/compute/33-02/desc/settings/latest-version_get.md @@ -3,7 +3,7 @@ Retrieves the version number of the latest available Prisma Cloud Compute releas Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/settings/latest_version_get.md b/openapi-specs/compute/33-02/desc/settings/latest_version_get.md index 18e436668..5c64edff1 100644 --- a/openapi-specs/compute/33-02/desc/settings/latest_version_get.md +++ b/openapi-specs/compute/33-02/desc/settings/latest_version_get.md @@ -1,7 +1,7 @@ This endpoint will return the latest version of the product. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/settings/ldap_get.md b/openapi-specs/compute/33-02/desc/settings/ldap_get.md index 4ad0ad0c9..7d803ba1c 100644 --- a/openapi-specs/compute/33-02/desc/settings/ldap_get.md +++ b/openapi-specs/compute/33-02/desc/settings/ldap_get.md @@ -5,7 +5,7 @@ Returns the LDAP integration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/settings/ldap_post.md b/openapi-specs/compute/33-02/desc/settings/ldap_post.md index c152c7dc5..34bc06ef4 100644 --- a/openapi-specs/compute/33-02/desc/settings/ldap_post.md +++ b/openapi-specs/compute/33-02/desc/settings/ldap_post.md @@ -7,7 +7,7 @@ For more information, see [Active Directory](https://docs.paloaltonetworks.com/p Refer to the following example cURL command that enables the LDAP integration and specifies the parameters required to integrate with an Active Directory service. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/settings/license_get.md b/openapi-specs/compute/33-02/desc/settings/license_get.md index 5c792cae8..2b4b548e3 100644 --- a/openapi-specs/compute/33-02/desc/settings/license_get.md +++ b/openapi-specs/compute/33-02/desc/settings/license_get.md @@ -5,7 +5,7 @@ Returns the details about the installed license. Refer to the following example cURL request that retrieves the license details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/settings/license_post.md b/openapi-specs/compute/33-02/desc/settings/license_post.md index b77800a5f..ce74b0d0f 100644 --- a/openapi-specs/compute/33-02/desc/settings/license_post.md +++ b/openapi-specs/compute/33-02/desc/settings/license_post.md @@ -8,7 +8,7 @@ For more information, see [Licensing](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to set your license: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/settings/logging_get.md b/openapi-specs/compute/33-02/desc/settings/logging_get.md index 6eda3e484..012be5def 100644 --- a/openapi-specs/compute/33-02/desc/settings/logging_get.md +++ b/openapi-specs/compute/33-02/desc/settings/logging_get.md @@ -5,7 +5,7 @@ Returns the logging settings. Refer to the following example cURL request that uses basic auth to retrieve your logging details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/settings/logging_post.md b/openapi-specs/compute/33-02/desc/settings/logging_post.md index 3619d9c0f..8d27ee1b3 100644 --- a/openapi-specs/compute/33-02/desc/settings/logging_post.md +++ b/openapi-specs/compute/33-02/desc/settings/logging_post.md @@ -8,7 +8,7 @@ For more information, see [Logging](https://docs.paloaltonetworks.com/prisma/pri Refer to the following example cURL request that enables verbose scan output for syslog and stdout: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/settings/logon_get.md b/openapi-specs/compute/33-02/desc/settings/logon_get.md index 1559f2405..b1e9164f2 100644 --- a/openapi-specs/compute/33-02/desc/settings/logon_get.md +++ b/openapi-specs/compute/33-02/desc/settings/logon_get.md @@ -5,7 +5,7 @@ Configures the logon settings. Refer to the following example cURL request that uses basic auth to retrieve all current logon settings. ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/settings/logon_post.md b/openapi-specs/compute/33-02/desc/settings/logon_post.md index 5c2b60c9f..691e082fe 100644 --- a/openapi-specs/compute/33-02/desc/settings/logon_post.md +++ b/openapi-specs/compute/33-02/desc/settings/logon_post.md @@ -7,7 +7,7 @@ For more information, see [Logon Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that uses basic auth to set the timeout to 900 seconds (15 minutes): ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/33-02/desc/settings/oauth_get.md b/openapi-specs/compute/33-02/desc/settings/oauth_get.md index 6dcf70fb5..5d997f016 100644 --- a/openapi-specs/compute/33-02/desc/settings/oauth_get.md +++ b/openapi-specs/compute/33-02/desc/settings/oauth_get.md @@ -5,7 +5,7 @@ Returns the OAuth configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/settings/oauth_post.md b/openapi-specs/compute/33-02/desc/settings/oauth_post.md index c593b9237..da3c83d2f 100644 --- a/openapi-specs/compute/33-02/desc/settings/oauth_post.md +++ b/openapi-specs/compute/33-02/desc/settings/oauth_post.md @@ -7,7 +7,7 @@ For more information, see [GitHub OAuth](https://docs.paloaltonetworks.com/prism Refer to the following example cURL response: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/settings/oidc_get.md b/openapi-specs/compute/33-02/desc/settings/oidc_get.md index ee439622b..1f27f93ba 100644 --- a/openapi-specs/compute/33-02/desc/settings/oidc_get.md +++ b/openapi-specs/compute/33-02/desc/settings/oidc_get.md @@ -5,7 +5,7 @@ Returns the OpenID Connect configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/settings/oidc_post.md b/openapi-specs/compute/33-02/desc/settings/oidc_post.md index e0270247e..5bd3a9192 100644 --- a/openapi-specs/compute/33-02/desc/settings/oidc_post.md +++ b/openapi-specs/compute/33-02/desc/settings/oidc_post.md @@ -7,7 +7,7 @@ For more information, see [OIDC](https://docs.paloaltonetworks.com/prisma/prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/settings/pcf_get.md b/openapi-specs/compute/33-02/desc/settings/pcf_get.md index 5dc21eb17..c5e42a823 100644 --- a/openapi-specs/compute/33-02/desc/settings/pcf_get.md +++ b/openapi-specs/compute/33-02/desc/settings/pcf_get.md @@ -3,7 +3,7 @@ This endpoint will return settings for PCF (Pivotal Cloud Foundry)Blobstore scan The following example curl command uses basic auth to retrieve the current PCF Blobstore scanning settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/settings/pcf_post.md b/openapi-specs/compute/33-02/desc/settings/pcf_post.md index 139e947cb..657e14f27 100644 --- a/openapi-specs/compute/33-02/desc/settings/pcf_post.md +++ b/openapi-specs/compute/33-02/desc/settings/pcf_post.md @@ -3,7 +3,7 @@ This endpoint will allow for updating settings for PCF (Pivotal Cloud Foundry) B The following example curl command uses basic auth to set up a PCF Blobstore scanner that scans the last `5` droplets for every droplet in the PCF Blobstore: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/settings/projects_get.md b/openapi-specs/compute/33-02/desc/settings/projects_get.md index f5dd20395..bc95414a1 100644 --- a/openapi-specs/compute/33-02/desc/settings/projects_get.md +++ b/openapi-specs/compute/33-02/desc/settings/projects_get.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command retrieves the state of the Projects feature from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ All API calls must be proxied through Central Console, where the request is auto To retrieve the Projects settings from a supervisor Console, append the `project` query parameter to your request. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/settings/projects_post.md b/openapi-specs/compute/33-02/desc/settings/projects_post.md index d29f8e9d5..b3472e6b9 100644 --- a/openapi-specs/compute/33-02/desc/settings/projects_post.md +++ b/openapi-specs/compute/33-02/desc/settings/projects_post.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command designates `` as master. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/settings/proxy_get.md b/openapi-specs/compute/33-02/desc/settings/proxy_get.md index 9a4922d59..477563069 100644 --- a/openapi-specs/compute/33-02/desc/settings/proxy_get.md +++ b/openapi-specs/compute/33-02/desc/settings/proxy_get.md @@ -5,7 +5,7 @@ Returns the proxy settings for Prisma Cloud Compute containers to access the Int Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/settings/proxy_post.md b/openapi-specs/compute/33-02/desc/settings/proxy_post.md index a1bdc07ed..df926524e 100644 --- a/openapi-specs/compute/33-02/desc/settings/proxy_post.md +++ b/openapi-specs/compute/33-02/desc/settings/proxy_post.md @@ -7,7 +7,7 @@ For more information, see [Proxy Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that specifies the proxy to use to access the Internet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/settings/registry_get.md b/openapi-specs/compute/33-02/desc/settings/registry_get.md index 12745005d..64e70b698 100644 --- a/openapi-specs/compute/33-02/desc/settings/registry_get.md +++ b/openapi-specs/compute/33-02/desc/settings/registry_get.md @@ -17,7 +17,7 @@ Construct the full webhook using the publicly accessible DNS name or IP address, The following cURL command retrieves all the registries to scan and the URL suffix for the registry's webhook URL suffix. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/settings/registry_post.md b/openapi-specs/compute/33-02/desc/settings/registry_post.md index efabf4e67..decf80a65 100644 --- a/openapi-specs/compute/33-02/desc/settings/registry_post.md +++ b/openapi-specs/compute/33-02/desc/settings/registry_post.md @@ -30,7 +30,7 @@ The API response returns an HTTP 400 error if the number of registry specificati Refer to the following example cURL command that configures Prisma Cloud Compute to scan the Ubuntu 16.04 repository on Docker Hub: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -64,7 +64,7 @@ To add settings for a GitLab Container Registry, you must specify the following Refer to the following example cURL command: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/settings/registry_put.md b/openapi-specs/compute/33-02/desc/settings/registry_put.md index 3768914f6..75d6c79a2 100644 --- a/openapi-specs/compute/33-02/desc/settings/registry_put.md +++ b/openapi-specs/compute/33-02/desc/settings/registry_put.md @@ -127,7 +127,7 @@ To remove a registry from the list: To delete all entries, submit an empty `specifications` array. For example: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-02/desc/settings/saml_get.md b/openapi-specs/compute/33-02/desc/settings/saml_get.md index f2228a440..4fb940e80 100644 --- a/openapi-specs/compute/33-02/desc/settings/saml_get.md +++ b/openapi-specs/compute/33-02/desc/settings/saml_get.md @@ -5,7 +5,7 @@ Returns the configured SAML settings that is used to authenticate to the Prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/settings/saml_post.md b/openapi-specs/compute/33-02/desc/settings/saml_post.md index 0bd9c4a25..dfe8d380f 100644 --- a/openapi-specs/compute/33-02/desc/settings/saml_post.md +++ b/openapi-specs/compute/33-02/desc/settings/saml_post.md @@ -7,7 +7,7 @@ For more information, see [Okta via SAML 2.0](https://docs.paloaltonetworks.com/ Refer to the following example cURL request that uses the basic auth to set up and enable the SAML integration with Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/settings/scan_get.md b/openapi-specs/compute/33-02/desc/settings/scan_get.md index 5c1df30a2..543ea7662 100644 --- a/openapi-specs/compute/33-02/desc/settings/scan_get.md +++ b/openapi-specs/compute/33-02/desc/settings/scan_get.md @@ -5,7 +5,7 @@ Returns the global settings for image, host, container, and registry scanning. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/settings/scan_post.md b/openapi-specs/compute/33-02/desc/settings/scan_post.md index f043d1c9f..9ddb521a2 100644 --- a/openapi-specs/compute/33-02/desc/settings/scan_post.md +++ b/openapi-specs/compute/33-02/desc/settings/scan_post.md @@ -9,7 +9,7 @@ Refer to the following example cURL request that configures the following scan i * Scan images, containers, and hosts once per day. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/settings/secrets_get.md b/openapi-specs/compute/33-02/desc/settings/secrets_get.md index 75e2b32c7..339009641 100644 --- a/openapi-specs/compute/33-02/desc/settings/secrets_get.md +++ b/openapi-specs/compute/33-02/desc/settings/secrets_get.md @@ -3,7 +3,7 @@ This endpoint will return configured secret store already configured in the cons The following example curl command retrieves any configured secret stores, as well as the refresh period in hours: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/settings/secrets_post.md b/openapi-specs/compute/33-02/desc/settings/secrets_post.md index d302ecdf8..730d031bf 100644 --- a/openapi-specs/compute/33-02/desc/settings/secrets_post.md +++ b/openapi-specs/compute/33-02/desc/settings/secrets_post.md @@ -5,7 +5,7 @@ Please note the data structure returned from endpoint /settings/secrets GET to s Refer to the following example curl command that adds a CyberArk secret store to the console with the appID set to `Prisma_Cloud_Compute_Console` and set the URL to `https://services-myca.twistlock.com:10882`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/settings/serverless-scan_get.md b/openapi-specs/compute/33-02/desc/settings/serverless-scan_get.md index bb8ce06ba..eb42e4a12 100644 --- a/openapi-specs/compute/33-02/desc/settings/serverless-scan_get.md +++ b/openapi-specs/compute/33-02/desc/settings/serverless-scan_get.md @@ -8,7 +8,7 @@ This endpoint maps to the **Function scope** table data in the **Defend > Vulner Refer to the following example cURL command that retrieves a list of serverless scan scopes: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/settings/serverless_get.md b/openapi-specs/compute/33-02/desc/settings/serverless_get.md index b6122c460..8c654807c 100644 --- a/openapi-specs/compute/33-02/desc/settings/serverless_get.md +++ b/openapi-specs/compute/33-02/desc/settings/serverless_get.md @@ -3,7 +3,7 @@ This endpoint will return any configured serverless function scanners found in * The following example curl command uses basic auth to retrieve serverless settings in an array, sorted by Cloud Provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/settings/serverless_post.md b/openapi-specs/compute/33-02/desc/settings/serverless_post.md index 6e26ea1d3..c0e0f3225 100644 --- a/openapi-specs/compute/33-02/desc/settings/serverless_post.md +++ b/openapi-specs/compute/33-02/desc/settings/serverless_post.md @@ -3,7 +3,7 @@ This endpoint will add serverless function providers to scan for vulnerabilities The following example curl command uses basic auth to add a serverless account to scan for serverless functions. This is assuming that you already have the [credential](https://docs.twistlock.com/docs/latest/configure/credentials_store.html) added to the console that is needed to scan that provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/settings/system_get.md b/openapi-specs/compute/33-02/desc/settings/system_get.md index 6f893abf0..0e8a3cba3 100644 --- a/openapi-specs/compute/33-02/desc/settings/system_get.md +++ b/openapi-specs/compute/33-02/desc/settings/system_get.md @@ -3,7 +3,7 @@ This endpoint will return all system settings in JSON format. The following example curl command does exactly that: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/settings/tas_get.md b/openapi-specs/compute/33-02/desc/settings/tas_get.md index 52f392433..d2d0017f0 100644 --- a/openapi-specs/compute/33-02/desc/settings/tas_get.md +++ b/openapi-specs/compute/33-02/desc/settings/tas_get.md @@ -5,7 +5,7 @@ Retrieves Tanzu Application Service (TAS) settings. Refer to the following example cURL command that retrieves all TAS settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/settings/telemetry_get.md b/openapi-specs/compute/33-02/desc/settings/telemetry_get.md index 6460c3fc3..46a807e77 100644 --- a/openapi-specs/compute/33-02/desc/settings/telemetry_get.md +++ b/openapi-specs/compute/33-02/desc/settings/telemetry_get.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that retrieves the settings if telemetry is enabled or not: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/settings/telemetry_post.md b/openapi-specs/compute/33-02/desc/settings/telemetry_post.md index bc97a6d0f..662846f33 100644 --- a/openapi-specs/compute/33-02/desc/settings/telemetry_post.md +++ b/openapi-specs/compute/33-02/desc/settings/telemetry_post.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to turn off telemetry: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/settings/trusted_certificate_post.md b/openapi-specs/compute/33-02/desc/settings/trusted_certificate_post.md index 5a2a30bda..c54b96fa5 100644 --- a/openapi-specs/compute/33-02/desc/settings/trusted_certificate_post.md +++ b/openapi-specs/compute/33-02/desc/settings/trusted_certificate_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/trusted-certificates` endpoint. Refer to the following example cURL request that uses basic auth to add a certificate to the list: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/33-02/desc/settings/trusted_certificates_post.md b/openapi-specs/compute/33-02/desc/settings/trusted_certificates_post.md index 78c07982b..e9bdc72a1 100644 --- a/openapi-specs/compute/33-02/desc/settings/trusted_certificates_post.md +++ b/openapi-specs/compute/33-02/desc/settings/trusted_certificates_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/certificates` endpoint. Refer to the following example cURL request that uses basic auth to enable this feature: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/33-02/desc/settings/vm_get.md b/openapi-specs/compute/33-02/desc/settings/vm_get.md index 8043742f5..b98b94240 100644 --- a/openapi-specs/compute/33-02/desc/settings/vm_get.md +++ b/openapi-specs/compute/33-02/desc/settings/vm_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **VM images scope** table data in the **Defend > Vulne Refer to the following example cURL command that retrieves all the scopes used for pattern matching on VM functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/signup/post.md b/openapi-specs/compute/33-02/desc/signup/post.md index 1db21df29..67344a0b1 100644 --- a/openapi-specs/compute/33-02/desc/signup/post.md +++ b/openapi-specs/compute/33-02/desc/signup/post.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i The following cURL command creates the initial admin user with the username `admin` and password `password`. ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -X POST \ -d '{"username": "admin", "password": "password"}' \ diff --git a/openapi-specs/compute/33-02/desc/static/capabilities_get.md b/openapi-specs/compute/33-02/desc/static/capabilities_get.md index ea119d2a9..f9b60278c 100644 --- a/openapi-specs/compute/33-02/desc/static/capabilities_get.md +++ b/openapi-specs/compute/33-02/desc/static/capabilities_get.md @@ -1,7 +1,7 @@ Returns a list of capabilities used in host models. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/static/regions_get.md b/openapi-specs/compute/33-02/desc/static/regions_get.md index 4a07097ee..3b1adb5f1 100644 --- a/openapi-specs/compute/33-02/desc/static/regions_get.md +++ b/openapi-specs/compute/33-02/desc/static/regions_get.md @@ -1,7 +1,7 @@ Returns a list of regions used in cloud radar. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/static/syscalls_get.md b/openapi-specs/compute/33-02/desc/static/syscalls_get.md index 9e2ddcde7..09505ba39 100644 --- a/openapi-specs/compute/33-02/desc/static/syscalls_get.md +++ b/openapi-specs/compute/33-02/desc/static/syscalls_get.md @@ -2,7 +2,7 @@ Returns a list of the Linux kernel system calls. Runtime rules for containers can allow-list and deny-list specific system calls. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/static/vulnerabilities_get.md b/openapi-specs/compute/33-02/desc/static/vulnerabilities_get.md index cb6acab28..19809472b 100644 --- a/openapi-specs/compute/33-02/desc/static/vulnerabilities_get.md +++ b/openapi-specs/compute/33-02/desc/static/vulnerabilities_get.md @@ -3,7 +3,7 @@ This data can be used for building out reports with the API. This data can be correlated with the `/api/v1/images` endpoint, specifically the the `complianceVulnerabilities` and `cveVulnerabilities` objects, to generate more thorough reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/stats/compliance.md b/openapi-specs/compute/33-02/desc/stats/compliance.md index 5c5be3991..4f4c90071 100644 --- a/openapi-specs/compute/33-02/desc/stats/compliance.md +++ b/openapi-specs/compute/33-02/desc/stats/compliance.md @@ -5,7 +5,7 @@ For the current day, the response will also include detailed compliance stats fo The following example command that uses curl and basic auth to retrieve compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/stats/compliance_get.md b/openapi-specs/compute/33-02/desc/stats/compliance_get.md index 314f6a179..2ef2f9f75 100644 --- a/openapi-specs/compute/33-02/desc/stats/compliance_get.md +++ b/openapi-specs/compute/33-02/desc/stats/compliance_get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Compliance > Compliance explorer* Refer to the following example cURL command that retrieves compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/stats/compliance_refresh.md b/openapi-specs/compute/33-02/desc/stats/compliance_refresh.md index b75491a69..d8ce211a8 100644 --- a/openapi-specs/compute/33-02/desc/stats/compliance_refresh.md +++ b/openapi-specs/compute/33-02/desc/stats/compliance_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/compliance endpoint return The following example command that uses curl and basic auth to refresh compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/stats/compliance_refresh_post.md b/openapi-specs/compute/33-02/desc/stats/compliance_refresh_post.md index 541a54d16..0f329d1db 100644 --- a/openapi-specs/compute/33-02/desc/stats/compliance_refresh_post.md +++ b/openapi-specs/compute/33-02/desc/stats/compliance_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/compliance`, b Refer to the following example cURL command that refreshes compliance statistics for the current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/stats/daily.md b/openapi-specs/compute/33-02/desc/stats/daily.md index 082f58a27..9fd4c6138 100644 --- a/openapi-specs/compute/33-02/desc/stats/daily.md +++ b/openapi-specs/compute/33-02/desc/stats/daily.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/stats/daily_get.md b/openapi-specs/compute/33-02/desc/stats/daily_get.md index 0db89bdc3..fe852126c 100644 --- a/openapi-specs/compute/33-02/desc/stats/daily_get.md +++ b/openapi-specs/compute/33-02/desc/stats/daily_get.md @@ -3,7 +3,7 @@ Returns a historical list of per-day statistics for the resources protected by P The following example command uses curl and basic auth to retrieve the daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/stats/dashboard.md b/openapi-specs/compute/33-02/desc/stats/dashboard.md index be90a2d32..1e5fabf08 100644 --- a/openapi-specs/compute/33-02/desc/stats/dashboard.md +++ b/openapi-specs/compute/33-02/desc/stats/dashboard.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/stats/dashboard_get.md b/openapi-specs/compute/33-02/desc/stats/dashboard_get.md index 601769645..8f0bc827c 100644 --- a/openapi-specs/compute/33-02/desc/stats/dashboard_get.md +++ b/openapi-specs/compute/33-02/desc/stats/dashboard_get.md @@ -5,7 +5,7 @@ Returns statistics about the resources protected by Prisma Cloud Compute, includ Refer to the following example cURL command that retrieves dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/stats/events_get.md b/openapi-specs/compute/33-02/desc/stats/events_get.md index 3be5eb4e7..e64f98e57 100644 --- a/openapi-specs/compute/33-02/desc/stats/events_get.md +++ b/openapi-specs/compute/33-02/desc/stats/events_get.md @@ -5,7 +5,7 @@ Returns events statistics for your environment. Refer to the following example cURL command retrieves event stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/stats/vulnerabilities.md b/openapi-specs/compute/33-02/desc/stats/vulnerabilities.md index 40c4dd1f1..199cfab62 100644 --- a/openapi-specs/compute/33-02/desc/stats/vulnerabilities.md +++ b/openapi-specs/compute/33-02/desc/stats/vulnerabilities.md @@ -5,7 +5,7 @@ For the current day, the response will also include descriptions of the CVEs cur The following example command that uses curl and basic auth to retrieve vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/stats/vulnerabilities_download_get.md b/openapi-specs/compute/33-02/desc/stats/vulnerabilities_download_get.md index 753af8c7f..9930a636b 100644 --- a/openapi-specs/compute/33-02/desc/stats/vulnerabilities_download_get.md +++ b/openapi-specs/compute/33-02/desc/stats/vulnerabilities_download_get.md @@ -17,7 +17,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a summary count of the CVEs and detailed descriptions for each CVE in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/stats/vulnerabilities_get.md b/openapi-specs/compute/33-02/desc/stats/vulnerabilities_get.md index 2fe5d4e18..978e96cfe 100644 --- a/openapi-specs/compute/33-02/desc/stats/vulnerabilities_get.md +++ b/openapi-specs/compute/33-02/desc/stats/vulnerabilities_get.md @@ -20,7 +20,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a summary count of the CVEs and detailed descriptions for each CVE: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/stats/vulnerabilities_impacted_resources_download_get.md b/openapi-specs/compute/33-02/desc/stats/vulnerabilities_impacted_resources_download_get.md index 0821d6a9f..502c09a6c 100644 --- a/openapi-specs/compute/33-02/desc/stats/vulnerabilities_impacted_resources_download_get.md +++ b/openapi-specs/compute/33-02/desc/stats/vulnerabilities_impacted_resources_download_get.md @@ -15,7 +15,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a list of impacted resources for `CVE-2015-0313` in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/stats/vulnerabilities_impacted_resources_get.md b/openapi-specs/compute/33-02/desc/stats/vulnerabilities_impacted_resources_get.md index c1e6d0ba2..014a5f4a2 100644 --- a/openapi-specs/compute/33-02/desc/stats/vulnerabilities_impacted_resources_get.md +++ b/openapi-specs/compute/33-02/desc/stats/vulnerabilities_impacted_resources_get.md @@ -18,7 +18,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a list of impacted resources for `CVE-2022-28391`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -95,7 +95,7 @@ Refer to the following example JSON response that shows the risk tree for the im Refer to the following example cURL command that retrieves a the impacted registry images `CVE-2015-0313` by using an optional query parameter `resourceType`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -108,7 +108,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a paginated list of impacted resources for `CVE-2015-0313` by using optional query parameters `limit` and `offset`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/stats/vulnerabilities_refresh.md b/openapi-specs/compute/33-02/desc/stats/vulnerabilities_refresh.md index 505a99d98..2aa7da8a1 100644 --- a/openapi-specs/compute/33-02/desc/stats/vulnerabilities_refresh.md +++ b/openapi-specs/compute/33-02/desc/stats/vulnerabilities_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/vulnerabilities endpoint r The following example command that uses curl and basic auth to refresh vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/stats/vulnerabilities_refresh_post.md b/openapi-specs/compute/33-02/desc/stats/vulnerabilities_refresh_post.md index 1e3210e18..85e3ddd7a 100644 --- a/openapi-specs/compute/33-02/desc/stats/vulnerabilities_refresh_post.md +++ b/openapi-specs/compute/33-02/desc/stats/vulnerabilities_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/vulnerabilitie Refer to the following example cURL command that refreshes the vulnerability statistics for current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/stats/workload_get.md b/openapi-specs/compute/33-02/desc/stats/workload_get.md index a25deed5c..940a835ee 100644 --- a/openapi-specs/compute/33-02/desc/stats/workload_get.md +++ b/openapi-specs/compute/33-02/desc/stats/workload_get.md @@ -1,7 +1,7 @@ Returns the workload statistics from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/statuses/intelligence.md b/openapi-specs/compute/33-02/desc/statuses/intelligence.md index 74da8c7ff..ac102e81f 100644 --- a/openapi-specs/compute/33-02/desc/statuses/intelligence.md +++ b/openapi-specs/compute/33-02/desc/statuses/intelligence.md @@ -3,7 +3,7 @@ Returns the connection status of the intelligence stream and the last intelligen The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/statuses/intelligence_get.md b/openapi-specs/compute/33-02/desc/statuses/intelligence_get.md index c18dd9611..b5f620ad9 100644 --- a/openapi-specs/compute/33-02/desc/statuses/intelligence_get.md +++ b/openapi-specs/compute/33-02/desc/statuses/intelligence_get.md @@ -3,7 +3,7 @@ Returns the connection status for the Intelligence Stream, along with the time o The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/statuses/registry_get.md b/openapi-specs/compute/33-02/desc/statuses/registry_get.md index 427c4915c..e4fd09fe9 100644 --- a/openapi-specs/compute/33-02/desc/statuses/registry_get.md +++ b/openapi-specs/compute/33-02/desc/statuses/registry_get.md @@ -13,7 +13,7 @@ To view the more details about the progress of a regular or on-demand registry s Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/statuses/secrets_get.md b/openapi-specs/compute/33-02/desc/statuses/secrets_get.md index 510f15161..e77c5ed70 100644 --- a/openapi-specs/compute/33-02/desc/statuses/secrets_get.md +++ b/openapi-specs/compute/33-02/desc/statuses/secrets_get.md @@ -3,7 +3,7 @@ Returns the connection status of any secret stores you have configured, as well The following is an example curl using basic auth to find the secret store status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/statuses/serverless-radar_get.md b/openapi-specs/compute/33-02/desc/statuses/serverless-radar_get.md index 3bfdbb5bf..4ab5d0c1d 100644 --- a/openapi-specs/compute/33-02/desc/statuses/serverless-radar_get.md +++ b/openapi-specs/compute/33-02/desc/statuses/serverless-radar_get.md @@ -1,7 +1,7 @@ Returns the status of the serverless scans. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/tags/get.md b/openapi-specs/compute/33-02/desc/tags/get.md index 6da7ad135..604eee98e 100644 --- a/openapi-specs/compute/33-02/desc/tags/get.md +++ b/openapi-specs/compute/33-02/desc/tags/get.md @@ -5,7 +5,7 @@ Retrieves a list of tags. Refer to the following example cURL command that retrieves a list of tags: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/tags/name_delete.md b/openapi-specs/compute/33-02/desc/tags/name_delete.md index 2ed010e57..6dedfce8f 100644 --- a/openapi-specs/compute/33-02/desc/tags/name_delete.md +++ b/openapi-specs/compute/33-02/desc/tags/name_delete.md @@ -5,7 +5,7 @@ Deletes a tag from the system. Refer to the following example cURL command that deletes a tag named *my tag*: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-02/desc/tags/name_put.md b/openapi-specs/compute/33-02/desc/tags/name_put.md index cbaea40d3..a5923b8ef 100644 --- a/openapi-specs/compute/33-02/desc/tags/name_put.md +++ b/openapi-specs/compute/33-02/desc/tags/name_put.md @@ -9,7 +9,7 @@ You must define all parameters in your PUT request. Refer to the following example cURL command that updates the parameters in a tag named `my_tag`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-02/desc/tags/post.md b/openapi-specs/compute/33-02/desc/tags/post.md index d55ae8b96..8e1a493d6 100644 --- a/openapi-specs/compute/33-02/desc/tags/post.md +++ b/openapi-specs/compute/33-02/desc/tags/post.md @@ -8,7 +8,7 @@ You can use tags as policy exceptions or assign them to vulnerabilities for acti Refer to the following example cURL command that creates a tag named "my-tag": ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/tags/tag_cve_delete.md b/openapi-specs/compute/33-02/desc/tags/tag_cve_delete.md index 8caed79cf..3031029b9 100644 --- a/openapi-specs/compute/33-02/desc/tags/tag_cve_delete.md +++ b/openapi-specs/compute/33-02/desc/tags/tag_cve_delete.md @@ -6,7 +6,7 @@ When you delete a tag, the tag is deleted from a wider scope. All the packages a Refer to the following example cURL command that removes the tag named `ignored` from the CVE `CVE-2017-15088`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-02/desc/tags/tag_cve_post.md b/openapi-specs/compute/33-02/desc/tags/tag_cve_post.md index 966a80bd8..1b4ead89b 100644 --- a/openapi-specs/compute/33-02/desc/tags/tag_cve_post.md +++ b/openapi-specs/compute/33-02/desc/tags/tag_cve_post.md @@ -45,7 +45,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the source package `perl`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -72,7 +72,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2021-20305` on the binary package `gnutls`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -98,7 +98,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -120,7 +120,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `image` and to all the packages and resources. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -140,7 +140,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `host`, resource `servo-vmware71`, and to all the packages. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/tas-droplets/download_get.md b/openapi-specs/compute/33-02/desc/tas-droplets/download_get.md index db92ec66a..7fdd6e259 100644 --- a/openapi-specs/compute/33-02/desc/tas-droplets/download_get.md +++ b/openapi-specs/compute/33-02/desc/tas-droplets/download_get.md @@ -9,7 +9,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo The following cURL command downloads all TAS droplets to a CSV file called `tas_droplets.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/tas-droplets/get.md b/openapi-specs/compute/33-02/desc/tas-droplets/get.md index d820517c2..ce07f8527 100644 --- a/openapi-specs/compute/33-02/desc/tas-droplets/get.md +++ b/openapi-specs/compute/33-02/desc/tas-droplets/get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > VMware Tanzu bl The following cURL command retrieves all TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/tas-droplets/get_tas_addresses.md b/openapi-specs/compute/33-02/desc/tas-droplets/get_tas_addresses.md index 528281613..8333cd24f 100644 --- a/openapi-specs/compute/33-02/desc/tas-droplets/get_tas_addresses.md +++ b/openapi-specs/compute/33-02/desc/tas-droplets/get_tas_addresses.md @@ -9,7 +9,7 @@ Gets the Cloud Controller Addresses of scanned Tanzu Application Service (TAS) d The following cURL command retrieves the Cloud Controller Addresses of scanned TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/tas-droplets/progress_get.md b/openapi-specs/compute/33-02/desc/tas-droplets/progress_get.md index 504a21e84..507d001bf 100644 --- a/openapi-specs/compute/33-02/desc/tas-droplets/progress_get.md +++ b/openapi-specs/compute/33-02/desc/tas-droplets/progress_get.md @@ -5,7 +5,7 @@ Returns the details of the TAS Droplets ongoing scan. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/tas-droplets/scan_post.md b/openapi-specs/compute/33-02/desc/tas-droplets/scan_post.md index aad2174af..13c4eeeb9 100644 --- a/openapi-specs/compute/33-02/desc/tas-droplets/scan_post.md +++ b/openapi-specs/compute/33-02/desc/tas-droplets/scan_post.md @@ -5,7 +5,7 @@ Scans the TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/tas-droplets/stop_post.md b/openapi-specs/compute/33-02/desc/tas-droplets/stop_post.md index 5f5a019b1..53d709ec7 100644 --- a/openapi-specs/compute/33-02/desc/tas-droplets/stop_post.md +++ b/openapi-specs/compute/33-02/desc/tas-droplets/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing scan of TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/trust/data_get.md b/openapi-specs/compute/33-02/desc/trust/data_get.md index dd55d47a3..88983f139 100644 --- a/openapi-specs/compute/33-02/desc/trust/data_get.md +++ b/openapi-specs/compute/33-02/desc/trust/data_get.md @@ -5,7 +5,7 @@ Returns the trusted registries, repositories, and images. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/trust/data_put.md b/openapi-specs/compute/33-02/desc/trust/data_put.md index 0e6a0ba49..733514505 100644 --- a/openapi-specs/compute/33-02/desc/trust/data_put.md +++ b/openapi-specs/compute/33-02/desc/trust/data_put.md @@ -6,7 +6,7 @@ Specify trusted images using either the image name or layers properties. Refer to the following example cURL command that uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -19,7 +19,7 @@ To edit a trust group based on image base layers, use PUT to specify a list of S Refer to the following example that specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-02/desc/trust/get.md b/openapi-specs/compute/33-02/desc/trust/get.md index 1226cd0a3..57ff5bdb5 100644 --- a/openapi-specs/compute/33-02/desc/trust/get.md +++ b/openapi-specs/compute/33-02/desc/trust/get.md @@ -3,7 +3,7 @@ Retrieves a list of all trusted images. The following example curl command uses basic auth to retrieve all trusted images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/trust/id_delete.md b/openapi-specs/compute/33-02/desc/trust/id_delete.md index b3114775f..d63cdf71a 100644 --- a/openapi-specs/compute/33-02/desc/trust/id_delete.md +++ b/openapi-specs/compute/33-02/desc/trust/id_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to specify a image trust grou ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-02/desc/trust/id_put.md b/openapi-specs/compute/33-02/desc/trust/id_put.md index 44d2c8b8b..c98617bcd 100644 --- a/openapi-specs/compute/33-02/desc/trust/id_put.md +++ b/openapi-specs/compute/33-02/desc/trust/id_put.md @@ -9,7 +9,7 @@ For more information about handles, see the `_id` in the response body for the G The following example curl command uses basic auth to modify the image property for an existing trusted image entry, where the handle for the entry is `docker-ubuntu-group`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-02/desc/trust/learn_get.md b/openapi-specs/compute/33-02/desc/trust/learn_get.md index d8a3414d0..004b16b02 100644 --- a/openapi-specs/compute/33-02/desc/trust/learn_get.md +++ b/openapi-specs/compute/33-02/desc/trust/learn_get.md @@ -1,7 +1,7 @@ Returns the state of the trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/trust/learn_post.md b/openapi-specs/compute/33-02/desc/trust/learn_post.md index 094817738..008657fa2 100644 --- a/openapi-specs/compute/33-02/desc/trust/learn_post.md +++ b/openapi-specs/compute/33-02/desc/trust/learn_post.md @@ -1,7 +1,7 @@ Sets the state of trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/trust/post.md b/openapi-specs/compute/33-02/desc/trust/post.md index 1072275a1..23a324c6c 100644 --- a/openapi-specs/compute/33-02/desc/trust/post.md +++ b/openapi-specs/compute/33-02/desc/trust/post.md @@ -7,7 +7,7 @@ For more information about handles, see the `_id` key in the response body for t The following example curl command uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ To create a trust group based on image base layers, POST a list of SHA256 hashes The following example specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/users/get.md b/openapi-specs/compute/33-02/desc/users/get.md index e4e6966ec..cd5a661ba 100644 --- a/openapi-specs/compute/33-02/desc/users/get.md +++ b/openapi-specs/compute/33-02/desc/users/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Manage > Authentication > Users** in the Console UI. The following cURL command retrieves all users. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/users/id_delete.md b/openapi-specs/compute/33-02/desc/users/id_delete.md index 1cfa5642d..66a1102f9 100644 --- a/openapi-specs/compute/33-02/desc/users/id_delete.md +++ b/openapi-specs/compute/33-02/desc/users/id_delete.md @@ -17,7 +17,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes user `ID` from the system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-02/desc/util/osx_twistcli_arm64_get.md b/openapi-specs/compute/33-02/desc/util/osx_twistcli_arm64_get.md index b385d0d3b..a30686374 100644 --- a/openapi-specs/compute/33-02/desc/util/osx_twistcli_arm64_get.md +++ b/openapi-specs/compute/33-02/desc/util/osx_twistcli_arm64_get.md @@ -7,7 +7,7 @@ Downloads the twistcli binary executable for MacOS platforms based on ARM64 arch Refer to the following example cURL command that downloads and saves the “twistcli” binary executable for ARM64 bit MacOS platforms to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/compute/33-02/desc/util/osx_twistcli_get.md b/openapi-specs/compute/33-02/desc/util/osx_twistcli_get.md index c49f96c41..2353ea338 100644 --- a/openapi-specs/compute/33-02/desc/util/osx_twistcli_get.md +++ b/openapi-specs/compute/33-02/desc/util/osx_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **MacOS platform** hyperlink in **Manage > System > Ut The following cURL command downloads the twistcli binary executable for MacOS platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli \ diff --git a/openapi-specs/compute/33-02/desc/util/twistcli_arm64_get.md b/openapi-specs/compute/33-02/desc/util/twistcli_arm64_get.md index 7ec36d3f5..a3d7318ab 100644 --- a/openapi-specs/compute/33-02/desc/util/twistcli_arm64_get.md +++ b/openapi-specs/compute/33-02/desc/util/twistcli_arm64_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/compute/33-02/desc/util/twistcli_get.md b/openapi-specs/compute/33-02/desc/util/twistcli_get.md index f9d2d295c..08a3ae8aa 100644 --- a/openapi-specs/compute/33-02/desc/util/twistcli_get.md +++ b/openapi-specs/compute/33-02/desc/util/twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -X GET -o \ 'https:///api/v/util/twistcli' diff --git a/openapi-specs/compute/33-02/desc/util/twistlock_jenkins_plugin_get.md b/openapi-specs/compute/33-02/desc/util/twistlock_jenkins_plugin_get.md index 9fb8d4a02..c9f180e5e 100644 --- a/openapi-specs/compute/33-02/desc/util/twistlock_jenkins_plugin_get.md +++ b/openapi-specs/compute/33-02/desc/util/twistlock_jenkins_plugin_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-jenkins-plugin.hpi \ diff --git a/openapi-specs/compute/33-02/desc/util/twistlock_tas_tile_get.md b/openapi-specs/compute/33-02/desc/util/twistlock_tas_tile_get.md index fea28aaad..3fd114e2d 100644 --- a/openapi-specs/compute/33-02/desc/util/twistlock_tas_tile_get.md +++ b/openapi-specs/compute/33-02/desc/util/twistlock_tas_tile_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-tile.pivotal \ diff --git a/openapi-specs/compute/33-02/desc/util/windows_twistcli_get.md b/openapi-specs/compute/33-02/desc/util/windows_twistcli_get.md index 1c545dbbb..38c609b08 100644 --- a/openapi-specs/compute/33-02/desc/util/windows_twistcli_get.md +++ b/openapi-specs/compute/33-02/desc/util/windows_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Windows platform** hyperlink in **Manage > System > The following cURL command downloads the twistcli binary executable for Windows platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli.exe \ diff --git a/openapi-specs/compute/33-02/desc/version/get.md b/openapi-specs/compute/33-02/desc/version/get.md index 28be315e0..5787e90fd 100644 --- a/openapi-specs/compute/33-02/desc/version/get.md +++ b/openapi-specs/compute/33-02/desc/version/get.md @@ -5,7 +5,7 @@ Retrieves the version number for Console. The following cURL command retrieves the version number for Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/vms/download_get.md b/openapi-specs/compute/33-02/desc/vms/download_get.md index e65e4efc9..3cc813bc5 100644 --- a/openapi-specs/compute/33-02/desc/vms/download_get.md +++ b/openapi-specs/compute/33-02/desc/vms/download_get.md @@ -7,7 +7,7 @@ Returns all VM image scan reports in CSV format. Refer to the following example cURL command that retrieves all VM image scan reports and saves the results in a CSV file called `vm_images_scan.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/vms/get.md b/openapi-specs/compute/33-02/desc/vms/get.md index e78a28c76..03ed8deb3 100644 --- a/openapi-specs/compute/33-02/desc/vms/get.md +++ b/openapi-specs/compute/33-02/desc/vms/get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > Hosts > VM imag Refer to the following example cURL command that retrieves all VM image scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/vms/labels_get.md b/openapi-specs/compute/33-02/desc/vms/labels_get.md index 0aed1a217..f509da479 100644 --- a/openapi-specs/compute/33-02/desc/vms/labels_get.md +++ b/openapi-specs/compute/33-02/desc/vms/labels_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-02/desc/vms/names_get.md b/openapi-specs/compute/33-02/desc/vms/names_get.md index 1145cfa0d..9f92e0156 100644 --- a/openapi-specs/compute/33-02/desc/vms/names_get.md +++ b/openapi-specs/compute/33-02/desc/vms/names_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/33-02/desc/vms/scan_post.md b/openapi-specs/compute/33-02/desc/vms/scan_post.md index 1caa2dcaf..4d4de3ab1 100644 --- a/openapi-specs/compute/33-02/desc/vms/scan_post.md +++ b/openapi-specs/compute/33-02/desc/vms/scan_post.md @@ -5,7 +5,7 @@ Re-scans all VM images immediately. This endpoint returns the time that the scan Refer to the following example cURL command that forces Prisma Cloud to re-scan all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-02/desc/vms/stop_post.md b/openapi-specs/compute/33-02/desc/vms/stop_post.md index 4a74743eb..49b2b26f9 100644 --- a/openapi-specs/compute/33-02/desc/vms/stop_post.md +++ b/openapi-specs/compute/33-02/desc/vms/stop_post.md @@ -7,7 +7,7 @@ Note: It might take a few minutes for the scan to stop completely. Refer to the following example cURL command that forces Prisma Cloud to stop scanning all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/SCAP/get.md b/openapi-specs/compute/33-03/desc/SCAP/get.md index a25abe94e..f5870d822 100644 --- a/openapi-specs/compute/33-03/desc/SCAP/get.md +++ b/openapi-specs/compute/33-03/desc/SCAP/get.md @@ -3,7 +3,7 @@ This endpoint will return any SCAP datastreams uploaded to the console. This end The following is an example curl command that uses basic auth to retrieve any uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/SCAP/id_delete.md b/openapi-specs/compute/33-03/desc/SCAP/id_delete.md index 39f1b0132..52923f20a 100644 --- a/openapi-specs/compute/33-03/desc/SCAP/id_delete.md +++ b/openapi-specs/compute/33-03/desc/SCAP/id_delete.md @@ -3,7 +3,7 @@ This endpoint will delete any SCAP datastreams uploaded to the console. You can The following is an example curl command that uses basic auth to delete an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-03/desc/SCAP/post.md b/openapi-specs/compute/33-03/desc/SCAP/post.md index d459a0e97..c45fd6b4e 100644 --- a/openapi-specs/compute/33-03/desc/SCAP/post.md +++ b/openapi-specs/compute/33-03/desc/SCAP/post.md @@ -3,7 +3,7 @@ This endpoint will allow you to add a SCAP datastream to the console. The following is an example curl command that uses basic auth to add an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/_ping/get.md b/openapi-specs/compute/33-03/desc/_ping/get.md index 8e143ef67..b7ffdc653 100644 --- a/openapi-specs/compute/33-03/desc/_ping/get.md +++ b/openapi-specs/compute/33-03/desc/_ping/get.md @@ -5,7 +5,7 @@ Checks if Console is reachable from your network host. Refer to the following cURL example command that pings Console and prints the HTTP response code: ```bash -$ curl -k \ +$ curl \ -s \ -o /dev/null \ -w "%{http_code}\n" \ diff --git a/openapi-specs/compute/33-03/desc/agentless/get_agentless_progress.md b/openapi-specs/compute/33-03/desc/agentless/get_agentless_progress.md index b98ed9da5..78396eec6 100644 --- a/openapi-specs/compute/33-03/desc/agentless/get_agentless_progress.md +++ b/openapi-specs/compute/33-03/desc/agentless/get_agentless_progress.md @@ -5,7 +5,7 @@ Shows the progress of an ongoing scan on hosts or containers for vulnerabilities Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/agentless/post_agentless_scan.md b/openapi-specs/compute/33-03/desc/agentless/post_agentless_scan.md index f1295cdc4..e2f8a4e11 100644 --- a/openapi-specs/compute/33-03/desc/agentless/post_agentless_scan.md +++ b/openapi-specs/compute/33-03/desc/agentless/post_agentless_scan.md @@ -9,7 +9,7 @@ Make sure that you download (use the agentless/templates API) and apply the perm Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/agentless/post_agentless_stop.md b/openapi-specs/compute/33-03/desc/agentless/post_agentless_stop.md index ab83960cc..ddee6ec7a 100644 --- a/openapi-specs/compute/33-03/desc/agentless/post_agentless_stop.md +++ b/openapi-specs/compute/33-03/desc/agentless/post_agentless_stop.md @@ -5,7 +5,7 @@ Stops an ongoing scan on hosts or containers for vulnerabilities and compliance. Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/agentless/post_agentless_templates.md b/openapi-specs/compute/33-03/desc/agentless/post_agentless_templates.md index 96be32555..5159c439a 100644 --- a/openapi-specs/compute/33-03/desc/agentless/post_agentless_templates.md +++ b/openapi-specs/compute/33-03/desc/agentless/post_agentless_templates.md @@ -31,7 +31,7 @@ Add the supported cloud accounts (AWS, Azure, GCP, and OCI) in Prisma Cloud Comp Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/alert-profiles/get.md b/openapi-specs/compute/33-03/desc/alert-profiles/get.md index 82647e248..f17191ac4 100644 --- a/openapi-specs/compute/33-03/desc/alert-profiles/get.md +++ b/openapi-specs/compute/33-03/desc/alert-profiles/get.md @@ -3,7 +3,7 @@ Retrieve a list of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/alert-profiles/id_delete.md b/openapi-specs/compute/33-03/desc/alert-profiles/id_delete.md index 1a67fe20e..2cf21b57e 100644 --- a/openapi-specs/compute/33-03/desc/alert-profiles/id_delete.md +++ b/openapi-specs/compute/33-03/desc/alert-profiles/id_delete.md @@ -5,7 +5,7 @@ This method has no response data. The following example curl command deletes an existing alert profile named `PROFILE-NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-03/desc/alert-profiles/names_get.md b/openapi-specs/compute/33-03/desc/alert-profiles/names_get.md index cac14437b..38a1f78ca 100644 --- a/openapi-specs/compute/33-03/desc/alert-profiles/names_get.md +++ b/openapi-specs/compute/33-03/desc/alert-profiles/names_get.md @@ -3,7 +3,7 @@ Retrieve a list of only the names of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles' names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/alert-profiles/post.md b/openapi-specs/compute/33-03/desc/alert-profiles/post.md index 9fa643429..19db863d5 100644 --- a/openapi-specs/compute/33-03/desc/alert-profiles/post.md +++ b/openapi-specs/compute/33-03/desc/alert-profiles/post.md @@ -3,7 +3,7 @@ Update an existing alert profile created in the system. The following example curl command uses basic auth to add a Jira Alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/alert-profiles/test_post.md b/openapi-specs/compute/33-03/desc/alert-profiles/test_post.md index 1fc745efa..2205a6e73 100644 --- a/openapi-specs/compute/33-03/desc/alert-profiles/test_post.md +++ b/openapi-specs/compute/33-03/desc/alert-profiles/test_post.md @@ -3,7 +3,7 @@ Sends a test alert to verify successful configuration of the alert profile setti The following example curl command uses basic auth to send test alert for an email alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/application-control/get.md b/openapi-specs/compute/33-03/desc/application-control/get.md index 5bd600beb..535584284 100644 --- a/openapi-specs/compute/33-03/desc/application-control/get.md +++ b/openapi-specs/compute/33-03/desc/application-control/get.md @@ -3,7 +3,7 @@ Retrieves the host application control rules. The following example curl command uses basic auth to retrieve the control rules: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/access_delete.md b/openapi-specs/compute/33-03/desc/audits/access_delete.md index 37f33ca64..0450b534c 100644 --- a/openapi-specs/compute/33-03/desc/audits/access_delete.md +++ b/openapi-specs/compute/33-03/desc/audits/access_delete.md @@ -2,7 +2,7 @@ Deletes **all** access audits. This deletion cannot be undone. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-03/desc/audits/access_download_get.md b/openapi-specs/compute/33-03/desc/audits/access_download_get.md index 1700deb8d..8d8fee259 100644 --- a/openapi-specs/compute/33-03/desc/audits/access_download_get.md +++ b/openapi-specs/compute/33-03/desc/audits/access_download_get.md @@ -3,7 +3,7 @@ Returns the docker access audit events data in CSV format that are logged and ag **Note**: You can download the access events from Console under **Monitor > Events > Docker audits > Download CSV**. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/access_filters_get.md b/openapi-specs/compute/33-03/desc/audits/access_filters_get.md index 00ac061c1..4b8e9cd9b 100644 --- a/openapi-specs/compute/33-03/desc/audits/access_filters_get.md +++ b/openapi-specs/compute/33-03/desc/audits/access_filters_get.md @@ -5,7 +5,7 @@ The following example uses basic auth to list history of commands that are run o ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ The following command gives list of sudo events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -27,7 +27,7 @@ $ curl -k \ The following command gives list of SSHD events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/access_get.md b/openapi-specs/compute/33-03/desc/audits/access_get.md index 2401391c7..56e53fe12 100644 --- a/openapi-specs/compute/33-03/desc/audits/access_get.md +++ b/openapi-specs/compute/33-03/desc/audits/access_get.md @@ -8,7 +8,7 @@ You can configure Prisma Cloud Compute to log and aggregate events such as sudo Refer to the following example cURL command that gives a list of all access audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/admission_download_get.md b/openapi-specs/compute/33-03/desc/audits/admission_download_get.md index 9571c483f..d45f47c4e 100644 --- a/openapi-specs/compute/33-03/desc/audits/admission_download_get.md +++ b/openapi-specs/compute/33-03/desc/audits/admission_download_get.md @@ -4,7 +4,7 @@ Returns the access admission events data in CSV format that were alerted or bloc Refer to the following example cURL command that downloads the admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/admission_get.md b/openapi-specs/compute/33-03/desc/audits/admission_get.md index 84414496c..3640c737c 100644 --- a/openapi-specs/compute/33-03/desc/audits/admission_get.md +++ b/openapi-specs/compute/33-03/desc/audits/admission_get.md @@ -4,7 +4,7 @@ Returns all activities that were alerted or blocked by Defender functioning as O Refer to the following example cURL command that gives a list of all admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/firewall_network_container_download_get.md b/openapi-specs/compute/33-03/desc/audits/firewall_network_container_download_get.md index 29029ac6d..434e09acd 100644 --- a/openapi-specs/compute/33-03/desc/audits/firewall_network_container_download_get.md +++ b/openapi-specs/compute/33-03/desc/audits/firewall_network_container_download_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/firewall_network_container_get.md b/openapi-specs/compute/33-03/desc/audits/firewall_network_container_get.md index 454558a44..be03b2c45 100644 --- a/openapi-specs/compute/33-03/desc/audits/firewall_network_container_get.md +++ b/openapi-specs/compute/33-03/desc/audits/firewall_network_container_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/firewall_network_host_download_get.md b/openapi-specs/compute/33-03/desc/audits/firewall_network_host_download_get.md index 768dd00d7..e83e8e1c3 100644 --- a/openapi-specs/compute/33-03/desc/audits/firewall_network_host_download_get.md +++ b/openapi-specs/compute/33-03/desc/audits/firewall_network_host_download_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/firewall_network_host_get.md b/openapi-specs/compute/33-03/desc/audits/firewall_network_host_get.md index e5dc4c399..6cbda0d4b 100644 --- a/openapi-specs/compute/33-03/desc/audits/firewall_network_host_get.md +++ b/openapi-specs/compute/33-03/desc/audits/firewall_network_host_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/incidents_archive_patch.md b/openapi-specs/compute/33-03/desc/audits/incidents_archive_patch.md index a1127a001..d1f42eedd 100644 --- a/openapi-specs/compute/33-03/desc/audits/incidents_archive_patch.md +++ b/openapi-specs/compute/33-03/desc/audits/incidents_archive_patch.md @@ -7,7 +7,7 @@ You can get an incident ID from the list of incidents using the endpoint GET /ap Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/compute/33-03/desc/audits/incidents_download_get.md b/openapi-specs/compute/33-03/desc/audits/incidents_download_get.md index 2266c3471..5958756bf 100644 --- a/openapi-specs/compute/33-03/desc/audits/incidents_download_get.md +++ b/openapi-specs/compute/33-03/desc/audits/incidents_download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the **CSV** hyperlink in **Monitor > Runtime > Incident ex The following cURL command downloads all incidents and saves the result in a CSV file called `incidents.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/incidents_filters_get.md b/openapi-specs/compute/33-03/desc/audits/incidents_filters_get.md index 7d1c6f303..856881c90 100644 --- a/openapi-specs/compute/33-03/desc/audits/incidents_filters_get.md +++ b/openapi-specs/compute/33-03/desc/audits/incidents_filters_get.md @@ -3,7 +3,7 @@ This endpoint lists the incident categories found in your environment. The following example lists incident filters. ```bash -$ curl -k \ +$ curl \ -u \ https://console:8083/api/v1/audits/incidents/filters ``` diff --git a/openapi-specs/compute/33-03/desc/audits/incidents_get.md b/openapi-specs/compute/33-03/desc/audits/incidents_get.md index 7724a08c1..9b9451821 100644 --- a/openapi-specs/compute/33-03/desc/audits/incidents_get.md +++ b/openapi-specs/compute/33-03/desc/audits/incidents_get.md @@ -9,7 +9,7 @@ This endpoint maps to the table in **Monitor > Runtime > Incident explorer** in Refer to the following example cURL command that retrieves a list of unacknowledged incidents (not in the archived state): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/kubernetes_download_get.md b/openapi-specs/compute/33-03/desc/audits/kubernetes_download_get.md index 6008bd92a..62992095c 100644 --- a/openapi-specs/compute/33-03/desc/audits/kubernetes_download_get.md +++ b/openapi-specs/compute/33-03/desc/audits/kubernetes_download_get.md @@ -7,7 +7,7 @@ Returns the audit events data that occur in an integrated Kubernetes cluster tha Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/kubernetes_get.md b/openapi-specs/compute/33-03/desc/audits/kubernetes_get.md index e1ecb8a88..2e3f51b71 100644 --- a/openapi-specs/compute/33-03/desc/audits/kubernetes_get.md +++ b/openapi-specs/compute/33-03/desc/audits/kubernetes_get.md @@ -7,7 +7,7 @@ Retrieves events that occur in an integrated Kubernetes cluster that you configu Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/mgmt_download_get.md b/openapi-specs/compute/33-03/desc/audits/mgmt_download_get.md index ae3ef45b6..bcee17342 100644 --- a/openapi-specs/compute/33-03/desc/audits/mgmt_download_get.md +++ b/openapi-specs/compute/33-03/desc/audits/mgmt_download_get.md @@ -10,7 +10,7 @@ Management audits are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/mgmt_filters_get.md b/openapi-specs/compute/33-03/desc/audits/mgmt_filters_get.md index 854977b99..f910a4c2a 100644 --- a/openapi-specs/compute/33-03/desc/audits/mgmt_filters_get.md +++ b/openapi-specs/compute/33-03/desc/audits/mgmt_filters_get.md @@ -6,7 +6,7 @@ Use these filters to query management audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/mgmt_get.md b/openapi-specs/compute/33-03/desc/audits/mgmt_get.md index 5b586cb5e..abe802348 100644 --- a/openapi-specs/compute/33-03/desc/audits/mgmt_get.md +++ b/openapi-specs/compute/33-03/desc/audits/mgmt_get.md @@ -10,7 +10,7 @@ Management audit events are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/runtime_app_embedded_download_get.md b/openapi-specs/compute/33-03/desc/audits/runtime_app_embedded_download_get.md index f3d844ead..ec5ae0f2a 100644 --- a/openapi-specs/compute/33-03/desc/audits/runtime_app_embedded_download_get.md +++ b/openapi-specs/compute/33-03/desc/audits/runtime_app_embedded_download_get.md @@ -5,7 +5,7 @@ Returns the app-embedded runtime audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/runtime_app_embedded_get.md b/openapi-specs/compute/33-03/desc/audits/runtime_app_embedded_get.md index c1d72acfa..51a43b7f5 100644 --- a/openapi-specs/compute/33-03/desc/audits/runtime_app_embedded_get.md +++ b/openapi-specs/compute/33-03/desc/audits/runtime_app_embedded_get.md @@ -5,7 +5,7 @@ Retrieves all app-embedded runtime audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/runtime_container_delete.md b/openapi-specs/compute/33-03/desc/audits/runtime_container_delete.md index ddc8e82d6..62050c71f 100644 --- a/openapi-specs/compute/33-03/desc/audits/runtime_container_delete.md +++ b/openapi-specs/compute/33-03/desc/audits/runtime_container_delete.md @@ -3,7 +3,7 @@ Deletes all container runtime audits. The following example curl command uses basic auth to delete all the audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-03/desc/audits/runtime_container_download_get.md b/openapi-specs/compute/33-03/desc/audits/runtime_container_download_get.md index 20e673b5e..81286d929 100644 --- a/openapi-specs/compute/33-03/desc/audits/runtime_container_download_get.md +++ b/openapi-specs/compute/33-03/desc/audits/runtime_container_download_get.md @@ -6,7 +6,7 @@ Returns the container audit events data in CSV format when a runtime sensor such Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o \ diff --git a/openapi-specs/compute/33-03/desc/audits/runtime_container_get.md b/openapi-specs/compute/33-03/desc/audits/runtime_container_get.md index 11beffb24..a6b6ba484 100644 --- a/openapi-specs/compute/33-03/desc/audits/runtime_container_get.md +++ b/openapi-specs/compute/33-03/desc/audits/runtime_container_get.md @@ -7,7 +7,7 @@ Retrieves all container audit events when a runtime sensor such as process, netw Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/runtime_container_timeslice_get.md b/openapi-specs/compute/33-03/desc/audits/runtime_container_timeslice_get.md index f65d477af..01df48f28 100644 --- a/openapi-specs/compute/33-03/desc/audits/runtime_container_timeslice_get.md +++ b/openapi-specs/compute/33-03/desc/audits/runtime_container_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/runtime_file-integrity_download_get.md b/openapi-specs/compute/33-03/desc/audits/runtime_file-integrity_download_get.md index 99ec70c52..234c3ce32 100644 --- a/openapi-specs/compute/33-03/desc/audits/runtime_file-integrity_download_get.md +++ b/openapi-specs/compute/33-03/desc/audits/runtime_file-integrity_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for file-integrity checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/runtime_file-integrity_get.md b/openapi-specs/compute/33-03/desc/audits/runtime_file-integrity_get.md index 53fec9f9f..c31904422 100644 --- a/openapi-specs/compute/33-03/desc/audits/runtime_file-integrity_get.md +++ b/openapi-specs/compute/33-03/desc/audits/runtime_file-integrity_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for file-integrity checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/runtime_host_delete.md b/openapi-specs/compute/33-03/desc/audits/runtime_host_delete.md index 0ab1c877e..2ada9b15a 100644 --- a/openapi-specs/compute/33-03/desc/audits/runtime_host_delete.md +++ b/openapi-specs/compute/33-03/desc/audits/runtime_host_delete.md @@ -3,7 +3,7 @@ Deletes all host audits from the database. The following example curl command uses basic auth to delete all host audits: ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/audits/runtime/host diff --git a/openapi-specs/compute/33-03/desc/audits/runtime_host_download_get.md b/openapi-specs/compute/33-03/desc/audits/runtime_host_download_get.md index 4d0454f56..d85cc39d0 100644 --- a/openapi-specs/compute/33-03/desc/audits/runtime_host_download_get.md +++ b/openapi-specs/compute/33-03/desc/audits/runtime_host_download_get.md @@ -5,7 +5,7 @@ Returns the runtime host audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/runtime_host_get.md b/openapi-specs/compute/33-03/desc/audits/runtime_host_get.md index 044b8b42d..e063550d6 100644 --- a/openapi-specs/compute/33-03/desc/audits/runtime_host_get.md +++ b/openapi-specs/compute/33-03/desc/audits/runtime_host_get.md @@ -5,7 +5,7 @@ Retrieves the runtime host audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/runtime_host_timeslice_get.md b/openapi-specs/compute/33-03/desc/audits/runtime_host_timeslice_get.md index 8933efa74..aafd869b8 100644 --- a/openapi-specs/compute/33-03/desc/audits/runtime_host_timeslice_get.md +++ b/openapi-specs/compute/33-03/desc/audits/runtime_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/runtime_log-inspection_download_get.md b/openapi-specs/compute/33-03/desc/audits/runtime_log-inspection_download_get.md index f047ed96f..0aa1a5710 100644 --- a/openapi-specs/compute/33-03/desc/audits/runtime_log-inspection_download_get.md +++ b/openapi-specs/compute/33-03/desc/audits/runtime_log-inspection_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for log inspection checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/runtime_log-inspection_get.md b/openapi-specs/compute/33-03/desc/audits/runtime_log-inspection_get.md index 49f0d7be4..8292b623e 100644 --- a/openapi-specs/compute/33-03/desc/audits/runtime_log-inspection_get.md +++ b/openapi-specs/compute/33-03/desc/audits/runtime_log-inspection_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for log inspection checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/runtime_rasp_delete.md b/openapi-specs/compute/33-03/desc/audits/runtime_rasp_delete.md index 688e04038..14315c55b 100644 --- a/openapi-specs/compute/33-03/desc/audits/runtime_rasp_delete.md +++ b/openapi-specs/compute/33-03/desc/audits/runtime_rasp_delete.md @@ -1,7 +1,7 @@ Deletes all RASP Defender runtime audits. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-03/desc/audits/runtime_rasp_download_get.md b/openapi-specs/compute/33-03/desc/audits/runtime_rasp_download_get.md index 303c75858..11a85100d 100644 --- a/openapi-specs/compute/33-03/desc/audits/runtime_rasp_download_get.md +++ b/openapi-specs/compute/33-03/desc/audits/runtime_rasp_download_get.md @@ -1,7 +1,7 @@ Returns CSV data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/runtime_rasp_get.md b/openapi-specs/compute/33-03/desc/audits/runtime_rasp_get.md index 229d908b1..0475cb149 100644 --- a/openapi-specs/compute/33-03/desc/audits/runtime_rasp_get.md +++ b/openapi-specs/compute/33-03/desc/audits/runtime_rasp_get.md @@ -1,7 +1,7 @@ Returns JSON data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/runtime_serverless_delete.md b/openapi-specs/compute/33-03/desc/audits/runtime_serverless_delete.md index 99ada0515..e27ebe858 100644 --- a/openapi-specs/compute/33-03/desc/audits/runtime_serverless_delete.md +++ b/openapi-specs/compute/33-03/desc/audits/runtime_serverless_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to delete the current audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-03/desc/audits/runtime_serverless_download_get.md b/openapi-specs/compute/33-03/desc/audits/runtime_serverless_download_get.md index f829d2342..91693c145 100644 --- a/openapi-specs/compute/33-03/desc/audits/runtime_serverless_download_get.md +++ b/openapi-specs/compute/33-03/desc/audits/runtime_serverless_download_get.md @@ -5,7 +5,7 @@ Returns the scan audit events data in CSV format for any configured serverless f Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/runtime_serverless_filters_get.md b/openapi-specs/compute/33-03/desc/audits/runtime_serverless_filters_get.md index b9bf38610..babda78dd 100644 --- a/openapi-specs/compute/33-03/desc/audits/runtime_serverless_filters_get.md +++ b/openapi-specs/compute/33-03/desc/audits/runtime_serverless_filters_get.md @@ -2,7 +2,7 @@ Returns all serverless filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/runtime_serverless_get.md b/openapi-specs/compute/33-03/desc/audits/runtime_serverless_get.md index 045946886..f6aeb748e 100644 --- a/openapi-specs/compute/33-03/desc/audits/runtime_serverless_get.md +++ b/openapi-specs/compute/33-03/desc/audits/runtime_serverless_get.md @@ -5,7 +5,7 @@ Retrieves all scan events for any configured serverless functions in Prisma Clou Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/runtime_serverless_timeslice_get.md b/openapi-specs/compute/33-03/desc/audits/runtime_serverless_timeslice_get.md index 863890174..a2456cec0 100644 --- a/openapi-specs/compute/33-03/desc/audits/runtime_serverless_timeslice_get.md +++ b/openapi-specs/compute/33-03/desc/audits/runtime_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/trust_delete.md b/openapi-specs/compute/33-03/desc/audits/trust_delete.md index 0bfb2bd81..4aaeef3fe 100644 --- a/openapi-specs/compute/33-03/desc/audits/trust_delete.md +++ b/openapi-specs/compute/33-03/desc/audits/trust_delete.md @@ -1,7 +1,7 @@ Deletes all the trust audits from the events page in Console. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-03/desc/audits/trust_download_get.md b/openapi-specs/compute/33-03/desc/audits/trust_download_get.md index 21c0e55a2..234089449 100644 --- a/openapi-specs/compute/33-03/desc/audits/trust_download_get.md +++ b/openapi-specs/compute/33-03/desc/audits/trust_download_get.md @@ -5,7 +5,7 @@ Returns the trust audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/trust_get.md b/openapi-specs/compute/33-03/desc/audits/trust_get.md index 8fb3a341d..de7d47e96 100644 --- a/openapi-specs/compute/33-03/desc/audits/trust_get.md +++ b/openapi-specs/compute/33-03/desc/audits/trust_get.md @@ -4,7 +4,7 @@ Retrieves all the trust audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/waas_agentless_download_get.md b/openapi-specs/compute/33-03/desc/audits/waas_agentless_download_get.md index bbfcd12f5..f930ef6b3 100644 --- a/openapi-specs/compute/33-03/desc/audits/waas_agentless_download_get.md +++ b/openapi-specs/compute/33-03/desc/audits/waas_agentless_download_get.md @@ -7,7 +7,7 @@ Returns the agentless Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/waas_agentless_get.md b/openapi-specs/compute/33-03/desc/audits/waas_agentless_get.md index ad40ae497..b257b0385 100644 --- a/openapi-specs/compute/33-03/desc/audits/waas_agentless_get.md +++ b/openapi-specs/compute/33-03/desc/audits/waas_agentless_get.md @@ -7,7 +7,7 @@ Retrieves all agentless Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/waas_agentless_timeslice_get.md b/openapi-specs/compute/33-03/desc/audits/waas_agentless_timeslice_get.md index 007c6dba3..3eaf34b25 100644 --- a/openapi-specs/compute/33-03/desc/audits/waas_agentless_timeslice_get.md +++ b/openapi-specs/compute/33-03/desc/audits/waas_agentless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/waas_app_embedded_download_get.md b/openapi-specs/compute/33-03/desc/audits/waas_app_embedded_download_get.md index 149c10376..c94aa87b0 100644 --- a/openapi-specs/compute/33-03/desc/audits/waas_app_embedded_download_get.md +++ b/openapi-specs/compute/33-03/desc/audits/waas_app_embedded_download_get.md @@ -6,7 +6,7 @@ Returns the app-embedded WAAS audit events data in CSV format for the specified Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/waas_app_embedded_get.md b/openapi-specs/compute/33-03/desc/audits/waas_app_embedded_get.md index 400fa447d..6318fb299 100644 --- a/openapi-specs/compute/33-03/desc/audits/waas_app_embedded_get.md +++ b/openapi-specs/compute/33-03/desc/audits/waas_app_embedded_get.md @@ -6,7 +6,7 @@ Returns all app-embedded WAAS audit events for the specified query parameters. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/waas_app_embedded_timeslice_get.md b/openapi-specs/compute/33-03/desc/audits/waas_app_embedded_timeslice_get.md index 79a60038e..42a76d08c 100644 --- a/openapi-specs/compute/33-03/desc/audits/waas_app_embedded_timeslice_get.md +++ b/openapi-specs/compute/33-03/desc/audits/waas_app_embedded_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the app-embedded WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/waas_container_download_get.md b/openapi-specs/compute/33-03/desc/audits/waas_container_download_get.md index 9a5e04fad..7d26c34f4 100644 --- a/openapi-specs/compute/33-03/desc/audits/waas_container_download_get.md +++ b/openapi-specs/compute/33-03/desc/audits/waas_container_download_get.md @@ -6,7 +6,7 @@ Returns the container Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that downloads the WAAS container audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/waas_container_get.md b/openapi-specs/compute/33-03/desc/audits/waas_container_get.md index ac0df80fd..c1ad08f3c 100644 --- a/openapi-specs/compute/33-03/desc/audits/waas_container_get.md +++ b/openapi-specs/compute/33-03/desc/audits/waas_container_get.md @@ -6,7 +6,7 @@ Retrieves all container Web-Application and API Security (WAAS) audits. Refer to the following example cURL command that retrieves all container WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/waas_container_timeslice_get.md b/openapi-specs/compute/33-03/desc/audits/waas_container_timeslice_get.md index a56b4c48f..be56260d6 100644 --- a/openapi-specs/compute/33-03/desc/audits/waas_container_timeslice_get.md +++ b/openapi-specs/compute/33-03/desc/audits/waas_container_timeslice_get.md @@ -11,7 +11,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the container WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s):: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/waas_host_download_get.md b/openapi-specs/compute/33-03/desc/audits/waas_host_download_get.md index 4bc66202b..71692e682 100644 --- a/openapi-specs/compute/33-03/desc/audits/waas_host_download_get.md +++ b/openapi-specs/compute/33-03/desc/audits/waas_host_download_get.md @@ -7,7 +7,7 @@ Returns the host Web-Application and API Security (WAAS) audit events data in CS Refer to the following example cURL command that downloads the host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/waas_host_get.md b/openapi-specs/compute/33-03/desc/audits/waas_host_get.md index 14c967594..f6e3df050 100644 --- a/openapi-specs/compute/33-03/desc/audits/waas_host_get.md +++ b/openapi-specs/compute/33-03/desc/audits/waas_host_get.md @@ -7,7 +7,7 @@ Retrieves all host Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/waas_host_timeslice_get.md b/openapi-specs/compute/33-03/desc/audits/waas_host_timeslice_get.md index e28ed7b7a..67b3a54c3 100644 --- a/openapi-specs/compute/33-03/desc/audits/waas_host_timeslice_get.md +++ b/openapi-specs/compute/33-03/desc/audits/waas_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves host WAAS audit events for a specific time frame: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/waas_serverless_download_get.md b/openapi-specs/compute/33-03/desc/audits/waas_serverless_download_get.md index da05504df..0c0dbe698 100644 --- a/openapi-specs/compute/33-03/desc/audits/waas_serverless_download_get.md +++ b/openapi-specs/compute/33-03/desc/audits/waas_serverless_download_get.md @@ -7,7 +7,7 @@ Returns the serverless function Web-Application and API Security (WAAS) audit ev Refer to the following example cURL command that downloads the serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/waas_serverless_get.md b/openapi-specs/compute/33-03/desc/audits/waas_serverless_get.md index fe482a3f3..82488f7ee 100644 --- a/openapi-specs/compute/33-03/desc/audits/waas_serverless_get.md +++ b/openapi-specs/compute/33-03/desc/audits/waas_serverless_get.md @@ -7,7 +7,7 @@ Retrieves all serverless function Web-Application and API Security (WAAS) audit Refer to the following example cURL command that retrieves all serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/audits/waas_serverless_timeslice_get.md b/openapi-specs/compute/33-03/desc/audits/waas_serverless_timeslice_get.md index ec9ff3df1..a0a9a1368 100644 --- a/openapi-specs/compute/33-03/desc/audits/waas_serverless_timeslice_get.md +++ b/openapi-specs/compute/33-03/desc/audits/waas_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the serverless WAAS audit events for a : ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/authenticate-client/post.md b/openapi-specs/compute/33-03/desc/authenticate-client/post.md index bc493d04e..ce6f00afe 100644 --- a/openapi-specs/compute/33-03/desc/authenticate-client/post.md +++ b/openapi-specs/compute/33-03/desc/authenticate-client/post.md @@ -8,7 +8,7 @@ This endpoint checks the supplied client certificate and authorizes the user bas Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X POST \ --cert \ https:///api/v/authenticate-client diff --git a/openapi-specs/compute/33-03/desc/authenticate/post.md b/openapi-specs/compute/33-03/desc/authenticate/post.md index cb018de64..4f85c5d34 100644 --- a/openapi-specs/compute/33-03/desc/authenticate/post.md +++ b/openapi-specs/compute/33-03/desc/authenticate/post.md @@ -9,7 +9,7 @@ You can set the validity period in Console under **Manage > Authentication > Log Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H "Content-Type: application/json" \ -X POST \ -d \ diff --git a/openapi-specs/compute/33-03/desc/authenticate/renew_get.md b/openapi-specs/compute/33-03/desc/authenticate/renew_get.md index 6040d58e1..3458b500a 100644 --- a/openapi-specs/compute/33-03/desc/authenticate/renew_get.md +++ b/openapi-specs/compute/33-03/desc/authenticate/renew_get.md @@ -5,7 +5,7 @@ Renews an old (unexpired) access token and returns a new token. The following cURL command retrieves a new access token using an old access token. ```bash -$ curl -k \ +$ curl \ -H "Authorization: Bearer " \ https:///api/v1/authenticate/renew ``` diff --git a/openapi-specs/compute/33-03/desc/certs/capem_get.md b/openapi-specs/compute/33-03/desc/certs/capem_get.md index f0f0f1bf3..945476c9b 100644 --- a/openapi-specs/compute/33-03/desc/certs/capem_get.md +++ b/openapi-specs/compute/33-03/desc/certs/capem_get.md @@ -5,7 +5,7 @@ Retrieves the Base64-encoded SSL root certificate self-signed by primary certifi Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/certs/client-certs_get.md b/openapi-specs/compute/33-03/desc/certs/client-certs_get.md index d099b3e3d..279d196b1 100644 --- a/openapi-specs/compute/33-03/desc/certs/client-certs_get.md +++ b/openapi-specs/compute/33-03/desc/certs/client-certs_get.md @@ -3,7 +3,7 @@ Downloads a script that installs a client certificate, client private key, and c The following example curl command uses basic auth to download and run the install script for your client certs: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/certs/client-certs.sh | sh diff --git a/openapi-specs/compute/33-03/desc/certs/server-certs_get.md b/openapi-specs/compute/33-03/desc/certs/server-certs_get.md index 0bb13f51d..118a4d9b0 100644 --- a/openapi-specs/compute/33-03/desc/certs/server-certs_get.md +++ b/openapi-specs/compute/33-03/desc/certs/server-certs_get.md @@ -12,7 +12,7 @@ Retrieves the server certificate bundle from Prisma Cloud Compute that contains Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -u \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/cloud/compliance_download_get.md b/openapi-specs/compute/33-03/desc/cloud/compliance_download_get.md index 7b1ec9fea..14f2725b1 100644 --- a/openapi-specs/compute/33-03/desc/cloud/compliance_download_get.md +++ b/openapi-specs/compute/33-03/desc/cloud/compliance_download_get.md @@ -2,7 +2,7 @@ Download all cloud scan data in CSV format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/cloud/compliance_get.md b/openapi-specs/compute/33-03/desc/cloud/compliance_get.md index 48c2fe5bb..ad47e0998 100644 --- a/openapi-specs/compute/33-03/desc/cloud/compliance_get.md +++ b/openapi-specs/compute/33-03/desc/cloud/compliance_get.md @@ -2,7 +2,7 @@ Returns a list of all cloud compliance scan results. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/cloud/compliance_scan_post.md b/openapi-specs/compute/33-03/desc/cloud/compliance_scan_post.md index 7f87bf1f4..7321c3b9d 100644 --- a/openapi-specs/compute/33-03/desc/cloud/compliance_scan_post.md +++ b/openapi-specs/compute/33-03/desc/cloud/compliance_scan_post.md @@ -2,7 +2,7 @@ Initiates a new cloud compliance scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/cloud/compliance_stop_post.md b/openapi-specs/compute/33-03/desc/cloud/compliance_stop_post.md index df0febb56..60c31dc51 100644 --- a/openapi-specs/compute/33-03/desc/cloud/compliance_stop_post.md +++ b/openapi-specs/compute/33-03/desc/cloud/compliance_stop_post.md @@ -2,7 +2,7 @@ Terminates a cloud compliance scan that's in progress.. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/cloud/discovery_download_get.md b/openapi-specs/compute/33-03/desc/cloud/discovery_download_get.md index 44d60a113..a667c8471 100644 --- a/openapi-specs/compute/33-03/desc/cloud/discovery_download_get.md +++ b/openapi-specs/compute/33-03/desc/cloud/discovery_download_get.md @@ -5,7 +5,7 @@ Downloads all cloud scan data in a CSV file. Refer to the following cURL example command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/cloud/discovery_entities_get.md b/openapi-specs/compute/33-03/desc/cloud/discovery_entities_get.md index a7abbdfb6..85f1be971 100644 --- a/openapi-specs/compute/33-03/desc/cloud/discovery_entities_get.md +++ b/openapi-specs/compute/33-03/desc/cloud/discovery_entities_get.md @@ -7,7 +7,7 @@ Use this API endpoint along with the `GET, api/vVERSION/cloud/discovery` to get Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/cloud/discovery_get.md b/openapi-specs/compute/33-03/desc/cloud/discovery_get.md index 28025f140..c2b4c6e3c 100644 --- a/openapi-specs/compute/33-03/desc/cloud/discovery_get.md +++ b/openapi-specs/compute/33-03/desc/cloud/discovery_get.md @@ -8,7 +8,7 @@ Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/cloud/discovery_scan_post.md b/openapi-specs/compute/33-03/desc/cloud/discovery_scan_post.md index 51799ebdb..0717096f8 100644 --- a/openapi-specs/compute/33-03/desc/cloud/discovery_scan_post.md +++ b/openapi-specs/compute/33-03/desc/cloud/discovery_scan_post.md @@ -5,7 +5,7 @@ Initiates a new cloud discovery scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/cloud/discovery_stop_post.md b/openapi-specs/compute/33-03/desc/cloud/discovery_stop_post.md index 6a6c7a5a5..73dbf46e7 100644 --- a/openapi-specs/compute/33-03/desc/cloud/discovery_stop_post.md +++ b/openapi-specs/compute/33-03/desc/cloud/discovery_stop_post.md @@ -5,7 +5,7 @@ Terminates a cloud discovery scan that's in progress. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/cloud/discovery_vms_get.md b/openapi-specs/compute/33-03/desc/cloud/discovery_vms_get.md index 6766f4e5a..2264a27fe 100644 --- a/openapi-specs/compute/33-03/desc/cloud/discovery_vms_get.md +++ b/openapi-specs/compute/33-03/desc/cloud/discovery_vms_get.md @@ -5,7 +5,7 @@ Returns the discovered cloud VM instances. Refer to the following example cURL command that retrieves all the discovered cloud VM instances: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/coderepos/download_get.md b/openapi-specs/compute/33-03/desc/coderepos/download_get.md index 4ec0197bb..b06dd9f17 100644 --- a/openapi-specs/compute/33-03/desc/coderepos/download_get.md +++ b/openapi-specs/compute/33-03/desc/coderepos/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Code re The following cURL command generates a CSV file containing the reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/coderepos/get.md b/openapi-specs/compute/33-03/desc/coderepos/get.md index 54c4e99bf..42dc16fb6 100644 --- a/openapi-specs/compute/33-03/desc/coderepos/get.md +++ b/openapi-specs/compute/33-03/desc/coderepos/get.md @@ -10,7 +10,7 @@ This endpoint maps to the **Code repositories** table in **Monitor > Vulnerabili The following cURL command retrieves all code repository scan reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/collections/get.md b/openapi-specs/compute/33-03/desc/collections/get.md index 99120d17d..5a9e8a50c 100755 --- a/openapi-specs/compute/33-03/desc/collections/get.md +++ b/openapi-specs/compute/33-03/desc/collections/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table in **Manage > Collections and Tags > Collections Refer to the following example cURL command that returns a list of collections: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/collections/name_delete.md b/openapi-specs/compute/33-03/desc/collections/name_delete.md index 3e2debd01..033358000 100755 --- a/openapi-specs/compute/33-03/desc/collections/name_delete.md +++ b/openapi-specs/compute/33-03/desc/collections/name_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that deletes a collection with the name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-03/desc/collections/name_usages_get.md b/openapi-specs/compute/33-03/desc/collections/name_usages_get.md index 5c9c40424..89e383cce 100755 --- a/openapi-specs/compute/33-03/desc/collections/name_usages_get.md +++ b/openapi-specs/compute/33-03/desc/collections/name_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that retrieves all policies with name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/containers/count_get.md b/openapi-specs/compute/33-03/desc/containers/count_get.md index 4c6ecdcb4..aca59a913 100644 --- a/openapi-specs/compute/33-03/desc/containers/count_get.md +++ b/openapi-specs/compute/33-03/desc/containers/count_get.md @@ -5,7 +5,7 @@ Returns an integer representing the number of containers in your environment. Refer to the following example cURL command that returns the number of containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/containers/download_get.md b/openapi-specs/compute/33-03/desc/containers/download_get.md index 5c0811d7c..5ed3fec35 100644 --- a/openapi-specs/compute/33-03/desc/containers/download_get.md +++ b/openapi-specs/compute/33-03/desc/containers/download_get.md @@ -9,7 +9,7 @@ You can download the container scan reports in CSV format in Console under **Mon Refer to the following example cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/containers/filters_get.md b/openapi-specs/compute/33-03/desc/containers/filters_get.md index c8a1dfca4..6c2777819 100644 --- a/openapi-specs/compute/33-03/desc/containers/filters_get.md +++ b/openapi-specs/compute/33-03/desc/containers/filters_get.md @@ -1,7 +1,7 @@ Returns all container filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/containers/get.md b/openapi-specs/compute/33-03/desc/containers/get.md index 4cacdde60..3de9dd4af 100644 --- a/openapi-specs/compute/33-03/desc/containers/get.md +++ b/openapi-specs/compute/33-03/desc/containers/get.md @@ -16,7 +16,7 @@ Refer to the following available options for the `fields` query parameters: Refer to the following example cURL command that retrieves a scan report for all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -26,7 +26,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a scan report for a container with the collection ``: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/containers/labels_get.md b/openapi-specs/compute/33-03/desc/containers/labels_get.md index eb40a748d..7a63ab6fb 100644 --- a/openapi-specs/compute/33-03/desc/containers/labels_get.md +++ b/openapi-specs/compute/33-03/desc/containers/labels_get.md @@ -1,7 +1,7 @@ Returns an array of strings containing all of the labels. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/containers/names_get.md b/openapi-specs/compute/33-03/desc/containers/names_get.md index 8b32465d5..9025e2e10 100644 --- a/openapi-specs/compute/33-03/desc/containers/names_get.md +++ b/openapi-specs/compute/33-03/desc/containers/names_get.md @@ -5,7 +5,7 @@ Returns an array of strings containing all container names. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/containers/scan_post.md b/openapi-specs/compute/33-03/desc/containers/scan_post.md index 6b2bdaaba..56137cf64 100644 --- a/openapi-specs/compute/33-03/desc/containers/scan_post.md +++ b/openapi-specs/compute/33-03/desc/containers/scan_post.md @@ -4,7 +4,7 @@ This endpoint returns the time that the scans were initiated. The following example command uses curl and basic auth to force Prisma Cloud Compute to re-scan all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/credentials/get.md b/openapi-specs/compute/33-03/desc/credentials/get.md index ee4309dee..b807ce8f3 100644 --- a/openapi-specs/compute/33-03/desc/credentials/get.md +++ b/openapi-specs/compute/33-03/desc/credentials/get.md @@ -6,7 +6,7 @@ This endpoint maps to **Manage > Authentication > Credentials store** in the Con Refer to the following example cURL command that retrieves all credentials: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/credentials/id_delete.md b/openapi-specs/compute/33-03/desc/credentials/id_delete.md index e5c70259e..27f090158 100644 --- a/openapi-specs/compute/33-03/desc/credentials/id_delete.md +++ b/openapi-specs/compute/33-03/desc/credentials/id_delete.md @@ -14,7 +14,7 @@ To invoke this endpoint in the Prisma Cloud Compute user interface: Refer to the following example cURL command that deletes an existing credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-03/desc/credentials/id_usages_get.md b/openapi-specs/compute/33-03/desc/credentials/id_usages_get.md index 76c1099aa..ca2ce6216 100644 --- a/openapi-specs/compute/33-03/desc/credentials/id_usages_get.md +++ b/openapi-specs/compute/33-03/desc/credentials/id_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following cURL command that retrieves all usages for a credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/curl_examples.md b/openapi-specs/compute/33-03/desc/curl_examples.md index 3d4fcd468..745d21db3 100644 --- a/openapi-specs/compute/33-03/desc/curl_examples.md +++ b/openapi-specs/compute/33-03/desc/curl_examples.md @@ -6,7 +6,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -17,7 +17,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -29,7 +29,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/compute/33-03/desc/custom-compliance/get.md b/openapi-specs/compute/33-03/desc/custom-compliance/get.md index 9022a87b7..9dddcff4e 100644 --- a/openapi-specs/compute/33-03/desc/custom-compliance/get.md +++ b/openapi-specs/compute/33-03/desc/custom-compliance/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example curl command that gets the list of custom compliance checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/custom-compliance/id_delete.md b/openapi-specs/compute/33-03/desc/custom-compliance/id_delete.md index 72c7183ee..f6536e51d 100644 --- a/openapi-specs/compute/33-03/desc/custom-compliance/id_delete.md +++ b/openapi-specs/compute/33-03/desc/custom-compliance/id_delete.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example cURL command that uses basic auth to delete the compliance check with id 9000: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-03/desc/custom-compliance/put.md b/openapi-specs/compute/33-03/desc/custom-compliance/put.md index 480e41b54..b8760a11f 100644 --- a/openapi-specs/compute/33-03/desc/custom-compliance/put.md +++ b/openapi-specs/compute/33-03/desc/custom-compliance/put.md @@ -21,7 +21,7 @@ Create `custom_check.json` file (example): Refer to the following example curl command that uses basic auth to update the checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-03/desc/custom-rules/get.md b/openapi-specs/compute/33-03/desc/custom-rules/get.md index f0385f81a..f77924be8 100644 --- a/openapi-specs/compute/33-03/desc/custom-rules/get.md +++ b/openapi-specs/compute/33-03/desc/custom-rules/get.md @@ -7,7 +7,7 @@ This endpoint maps to the policy table in **Defend > Custom rules** in the Conso Refer to the following example cURL command that retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/custom-rules/id_delete.md b/openapi-specs/compute/33-03/desc/custom-rules/id_delete.md index c0d6dc8b0..01412abf3 100644 --- a/openapi-specs/compute/33-03/desc/custom-rules/id_delete.md +++ b/openapi-specs/compute/33-03/desc/custom-rules/id_delete.md @@ -5,7 +5,7 @@ Deletes a custom rule. Refer to the following example cURL command that deletes a custom rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-03/desc/cves/distribution_get.md b/openapi-specs/compute/33-03/desc/cves/distribution_get.md index aecddce23..7365e1a5e 100644 --- a/openapi-specs/compute/33-03/desc/cves/distribution_get.md +++ b/openapi-specs/compute/33-03/desc/cves/distribution_get.md @@ -3,7 +3,7 @@ Retrieves CVEs from the vulnerability database grouped into distribution where y The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/cves/get.md b/openapi-specs/compute/33-03/desc/cves/get.md index 469ea4b28..f81223298 100644 --- a/openapi-specs/compute/33-03/desc/cves/get.md +++ b/openapi-specs/compute/33-03/desc/cves/get.md @@ -6,7 +6,7 @@ A null response indicates that the CVE is not in our database. The following example curl command queries the Prisma Cloud Compute database for `CVE-2018-1102`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/defenders/app_embedded_post.md b/openapi-specs/compute/33-03/desc/defenders/app_embedded_post.md index 9167469d0..7999cbadb 100644 --- a/openapi-specs/compute/33-03/desc/defenders/app_embedded_post.md +++ b/openapi-specs/compute/33-03/desc/defenders/app_embedded_post.md @@ -5,7 +5,7 @@ Creates an augmented Dockerfile with Defender and dependencies included as a ZIP Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/defenders/daemonset_yaml_get.md b/openapi-specs/compute/33-03/desc/defenders/daemonset_yaml_get.md index 678901a8a..b68869081 100644 --- a/openapi-specs/compute/33-03/desc/defenders/daemonset_yaml_get.md +++ b/openapi-specs/compute/33-03/desc/defenders/daemonset_yaml_get.md @@ -10,7 +10,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https://:8083/api/v1/defenders/daemonset.yaml?consoleaddr=&listener=none&namespace=twistlock&orchestration=kubernetes' diff --git a/openapi-specs/compute/33-03/desc/defenders/daemonset_yaml_post.md b/openapi-specs/compute/33-03/desc/defenders/daemonset_yaml_post.md index 268e3ba81..af006122b 100644 --- a/openapi-specs/compute/33-03/desc/defenders/daemonset_yaml_post.md +++ b/openapi-specs/compute/33-03/desc/defenders/daemonset_yaml_post.md @@ -5,7 +5,7 @@ Creates a DaemonSet deployment file in YAML format that you can use to deploy De Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/defenders/download_get.md b/openapi-specs/compute/33-03/desc/defenders/download_get.md index 2d9435506..67f08c0e5 100644 --- a/openapi-specs/compute/33-03/desc/defenders/download_get.md +++ b/openapi-specs/compute/33-03/desc/defenders/download_get.md @@ -8,7 +8,7 @@ Use the query parameters to filter what data is returned. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o \ diff --git a/openapi-specs/compute/33-03/desc/defenders/fargate_json_post.md b/openapi-specs/compute/33-03/desc/defenders/fargate_json_post.md index 5128e90a1..e2e4e85ab 100644 --- a/openapi-specs/compute/33-03/desc/defenders/fargate_json_post.md +++ b/openapi-specs/compute/33-03/desc/defenders/fargate_json_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command: Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -23,7 +23,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/defenders/fargate_yaml_post.md b/openapi-specs/compute/33-03/desc/defenders/fargate_yaml_post.md index 9a8306a1b..95560526a 100644 --- a/openapi-specs/compute/33-03/desc/defenders/fargate_yaml_post.md +++ b/openapi-specs/compute/33-03/desc/defenders/fargate_yaml_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.yaml` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/yaml' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/defenders/get.md b/openapi-specs/compute/33-03/desc/defenders/get.md index 471e7ef9d..8d2f5cd4c 100644 --- a/openapi-specs/compute/33-03/desc/defenders/get.md +++ b/openapi-specs/compute/33-03/desc/defenders/get.md @@ -7,7 +7,7 @@ This endpoint maps to the UI Console page in **Manage > Defenders > Defenders**. Refer to the following example cURL command that retrieves all deployed Defenders. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/defenders/helm_get.md b/openapi-specs/compute/33-03/desc/defenders/helm_get.md index b11f9c4b9..487c8b7e8 100644 --- a/openapi-specs/compute/33-03/desc/defenders/helm_get.md +++ b/openapi-specs/compute/33-03/desc/defenders/helm_get.md @@ -13,7 +13,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o twistlock-defender-helm.tar.gz \ diff --git a/openapi-specs/compute/33-03/desc/defenders/helm_post.md b/openapi-specs/compute/33-03/desc/defenders/helm_post.md index 2046e63eb..fb76807ae 100644 --- a/openapi-specs/compute/33-03/desc/defenders/helm_post.md +++ b/openapi-specs/compute/33-03/desc/defenders/helm_post.md @@ -5,7 +5,7 @@ Creates a Helm deployment file that you can use to deploy Defenders to your clus Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/defenders/id_delete.md b/openapi-specs/compute/33-03/desc/defenders/id_delete.md index f637ef850..e3ac52daf 100644 --- a/openapi-specs/compute/33-03/desc/defenders/id_delete.md +++ b/openapi-specs/compute/33-03/desc/defenders/id_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes an existing Defender on a host. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-03/desc/defenders/id_features_post.md b/openapi-specs/compute/33-03/desc/defenders/id_features_post.md index ec8e4c5f3..9b42f5fa0 100644 --- a/openapi-specs/compute/33-03/desc/defenders/id_features_post.md +++ b/openapi-specs/compute/33-03/desc/defenders/id_features_post.md @@ -3,7 +3,7 @@ Updates a deployed Defender's configuration. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/defenders/id_restart_post.md b/openapi-specs/compute/33-03/desc/defenders/id_restart_post.md index da0cc7811..7296a186b 100644 --- a/openapi-specs/compute/33-03/desc/defenders/id_restart_post.md +++ b/openapi-specs/compute/33-03/desc/defenders/id_restart_post.md @@ -3,7 +3,7 @@ Restarts Defender on a given host. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/defenders/id_upgrade_post.md b/openapi-specs/compute/33-03/desc/defenders/id_upgrade_post.md index f0d30d1e9..3e63c6414 100644 --- a/openapi-specs/compute/33-03/desc/defenders/id_upgrade_post.md +++ b/openapi-specs/compute/33-03/desc/defenders/id_upgrade_post.md @@ -7,7 +7,7 @@ Upgrades Defender on ``. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/defenders/image-name_get.md b/openapi-specs/compute/33-03/desc/defenders/image-name_get.md index e81ba3e19..19f360c07 100644 --- a/openapi-specs/compute/33-03/desc/defenders/image-name_get.md +++ b/openapi-specs/compute/33-03/desc/defenders/image-name_get.md @@ -5,7 +5,7 @@ Returns the full Docker image name for Defender. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/defenders/install-bundle_get.md b/openapi-specs/compute/33-03/desc/defenders/install-bundle_get.md index 882d0cd53..9b09e733f 100644 --- a/openapi-specs/compute/33-03/desc/defenders/install-bundle_get.md +++ b/openapi-specs/compute/33-03/desc/defenders/install-bundle_get.md @@ -5,7 +5,7 @@ Returns the certificate bundle that Defender needs to securely connect to Consol Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/defenders/names_get.md b/openapi-specs/compute/33-03/desc/defenders/names_get.md index 728eb6364..6339c1483 100644 --- a/openapi-specs/compute/33-03/desc/defenders/names_get.md +++ b/openapi-specs/compute/33-03/desc/defenders/names_get.md @@ -5,7 +5,7 @@ Retrieves a list of Defender hostnames that can be used as the `{id}` query para Refer to the following example cURL command that retrieves a list of all Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -15,7 +15,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of connected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -25,7 +25,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of disconnected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -37,7 +37,7 @@ The endpoint enlists all the connected and disconnected Defenders if do not spec Refer to the following example cURL command that retrieves a list of Defenders by type: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/defenders/rasp_post.md b/openapi-specs/compute/33-03/desc/defenders/rasp_post.md index 526a9e112..e110044dd 100644 --- a/openapi-specs/compute/33-03/desc/defenders/rasp_post.md +++ b/openapi-specs/compute/33-03/desc/defenders/rasp_post.md @@ -7,7 +7,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o rasp-defender.zip diff --git a/openapi-specs/compute/33-03/desc/defenders/serverless-bundle_post.md b/openapi-specs/compute/33-03/desc/defenders/serverless-bundle_post.md index df4f13e6a..7533e436b 100644 --- a/openapi-specs/compute/33-03/desc/defenders/serverless-bundle_post.md +++ b/openapi-specs/compute/33-03/desc/defenders/serverless-bundle_post.md @@ -5,7 +5,7 @@ Downloads a ZIP file with serverless Defender bundle. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/octet-stream' \ -o serverless_bundle.zip \ diff --git a/openapi-specs/compute/33-03/desc/defenders/summary_get.md b/openapi-specs/compute/33-03/desc/defenders/summary_get.md index 08be4ebc4..e308ef64b 100644 --- a/openapi-specs/compute/33-03/desc/defenders/summary_get.md +++ b/openapi-specs/compute/33-03/desc/defenders/summary_get.md @@ -6,7 +6,7 @@ Lists the number of Defenders in each defender category. Refer to the following example cURL command that retrieves a summary of Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/defenders/upgrade_post.md b/openapi-specs/compute/33-03/desc/defenders/upgrade_post.md index 2f0b4d39e..eacd6b779 100644 --- a/openapi-specs/compute/33-03/desc/defenders/upgrade_post.md +++ b/openapi-specs/compute/33-03/desc/defenders/upgrade_post.md @@ -9,7 +9,7 @@ To upgrade Serverless and Fargate Defenders, re-embed them. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/deployment/daemonsets_deploy_post.md b/openapi-specs/compute/33-03/desc/deployment/daemonsets_deploy_post.md index 94ec9386b..b60f28346 100644 --- a/openapi-specs/compute/33-03/desc/deployment/daemonsets_deploy_post.md +++ b/openapi-specs/compute/33-03/desc/deployment/daemonsets_deploy_post.md @@ -5,7 +5,7 @@ It identifies the cluster's API server, user, and credentials. Use the various request parameters to control the properties of the deployed DaemonSet. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/deployment/daemonsets_get.md b/openapi-specs/compute/33-03/desc/deployment/daemonsets_get.md index a0b7f3798..0385acf75 100644 --- a/openapi-specs/compute/33-03/desc/deployment/daemonsets_get.md +++ b/openapi-specs/compute/33-03/desc/deployment/daemonsets_get.md @@ -3,7 +3,7 @@ You must specify a `credentialID`, of type `kubeconfig`, which identifies your c Credentials are managed in Console's credentials store (`/api/v1/credentials`). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/feeds/custom-vulnerabilities_get.md b/openapi-specs/compute/33-03/desc/feeds/custom-vulnerabilities_get.md index 71834f19d..d661acf55 100644 --- a/openapi-specs/compute/33-03/desc/feeds/custom-vulnerabilities_get.md +++ b/openapi-specs/compute/33-03/desc/feeds/custom-vulnerabilities_get.md @@ -11,7 +11,7 @@ Vulnerability rules can be created using the Prisma Cloud Compute. Refer to the following cURL command that retrieves a list of all the custom vulnerabilities and associated rules. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/feeds/custom-vulnerabilities_put.md b/openapi-specs/compute/33-03/desc/feeds/custom-vulnerabilities_put.md index 4fe1c1898..149ada978 100644 --- a/openapi-specs/compute/33-03/desc/feeds/custom-vulnerabilities_put.md +++ b/openapi-specs/compute/33-03/desc/feeds/custom-vulnerabilities_put.md @@ -5,7 +5,7 @@ Updates all the custom vulnerabilities and associated rules simultaneously for h Refer to the following cURL command that updates a vulnerability for a library named `internal-lib`, and specifies that its versions `1.1` to `1.8` are known to be vulnerable. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -37,7 +37,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: **Note:** You will need `jq` to execute this command. ``` - $ curl -k \ + $ curl \ -u \ https:///api/v/feeds/custom/custom-vulnerabilities \ | jq '.' > custom_vulnerability_rules.json @@ -66,7 +66,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 3. Update the rules by pushing the new JSON payload. **Note:** Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -77,7 +77,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 4. Run the cURL command for the `GET /api/vVERSION/feeds/custom/custom-vulnerabilities` endpoint and you can see that the previously installed rules are now overwritten with your new rules. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/feeds/custom_vulnerabilities_digest_get.md b/openapi-specs/compute/33-03/desc/feeds/custom_vulnerabilities_digest_get.md index 0eb501d9b..02af9a3ab 100644 --- a/openapi-specs/compute/33-03/desc/feeds/custom_vulnerabilities_digest_get.md +++ b/openapi-specs/compute/33-03/desc/feeds/custom_vulnerabilities_digest_get.md @@ -5,7 +5,7 @@ Returns the unique digest for the custom vulnerabilities and associated rules fo The following cURL command retrieves the digest for the configured custom vulnerabilities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/feeds/cve_allow_list_digest_get.md b/openapi-specs/compute/33-03/desc/feeds/cve_allow_list_digest_get.md index e27f21251..911a07fd9 100644 --- a/openapi-specs/compute/33-03/desc/feeds/cve_allow_list_digest_get.md +++ b/openapi-specs/compute/33-03/desc/feeds/cve_allow_list_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the Common Vulnerabilities and Exposures (CVE) a The following cURL command retrieves the digest for the configured CVE allow list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/feeds/cve_allow_list_get.md b/openapi-specs/compute/33-03/desc/feeds/cve_allow_list_get.md index 34fb2c7f8..d73ce17c2 100644 --- a/openapi-specs/compute/33-03/desc/feeds/cve_allow_list_get.md +++ b/openapi-specs/compute/33-03/desc/feeds/cve_allow_list_get.md @@ -5,7 +5,7 @@ Retrieves the globally allow-listed Common Vulnerabilities and Exposures (CVE). The following cURL command retrieves the globally allow-listed CVEs. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/feeds/cve_allow_list_put.md b/openapi-specs/compute/33-03/desc/feeds/cve_allow_list_put.md index 850016965..c4e2ce0af 100644 --- a/openapi-specs/compute/33-03/desc/feeds/cve_allow_list_put.md +++ b/openapi-specs/compute/33-03/desc/feeds/cve_allow_list_put.md @@ -7,7 +7,7 @@ Globally allow-lists a set of Common Vulnerabilities and Exposures (CVE). The following cURL command installs a global CVE allow-list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-03/desc/feeds/ips_digest_get.md b/openapi-specs/compute/33-03/desc/feeds/ips_digest_get.md index d059271ea..ae2a09915 100644 --- a/openapi-specs/compute/33-03/desc/feeds/ips_digest_get.md +++ b/openapi-specs/compute/33-03/desc/feeds/ips_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the list of suspicious or high risk IP endpoints The following cURL command retrieves the digest for the banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/feeds/ips_get.md b/openapi-specs/compute/33-03/desc/feeds/ips_get.md index 381257d47..f51c577a7 100644 --- a/openapi-specs/compute/33-03/desc/feeds/ips_get.md +++ b/openapi-specs/compute/33-03/desc/feeds/ips_get.md @@ -5,7 +5,7 @@ Retrieves the customized list of block-listed suspicious or high-risk IP address The following cURL command retrieves the list of globally block-listed suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/feeds/ips_put.md b/openapi-specs/compute/33-03/desc/feeds/ips_put.md index 6f8fc2419..5bf791044 100644 --- a/openapi-specs/compute/33-03/desc/feeds/ips_put.md +++ b/openapi-specs/compute/33-03/desc/feeds/ips_put.md @@ -7,7 +7,7 @@ Bans a custom list of suspicious or high-risk IP addresses. The following cURL command installs a custom list of banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-03/desc/feeds/malware_digest_get.md b/openapi-specs/compute/33-03/desc/feeds/malware_digest_get.md index 005c476a2..522a59aef 100644 --- a/openapi-specs/compute/33-03/desc/feeds/malware_digest_get.md +++ b/openapi-specs/compute/33-03/desc/feeds/malware_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for all the MD5 signatures of malicious executables The following cURL command retrieves the digest for the configured list for the MD5 signatures of malicious executables. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/feeds/malware_get.md b/openapi-specs/compute/33-03/desc/feeds/malware_get.md index 2a7aa128b..72bee6594 100644 --- a/openapi-specs/compute/33-03/desc/feeds/malware_get.md +++ b/openapi-specs/compute/33-03/desc/feeds/malware_get.md @@ -5,7 +5,7 @@ Returns the customized list of MD5 signatures of malicious executables. Refer to the following cURL command that retrieves the list of MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/feeds/malware_put.md b/openapi-specs/compute/33-03/desc/feeds/malware_put.md index 7e6ec5da0..176304cb9 100644 --- a/openapi-specs/compute/33-03/desc/feeds/malware_put.md +++ b/openapi-specs/compute/33-03/desc/feeds/malware_put.md @@ -7,7 +7,7 @@ Creates a custom list of malware MD5 signatures of malicious executables. Refer to the following cURL command that installs a custom list of malware MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-03/desc/feeds/refresh_post.md b/openapi-specs/compute/33-03/desc/feeds/refresh_post.md index a83c40d10..1c756edae 100644 --- a/openapi-specs/compute/33-03/desc/feeds/refresh_post.md +++ b/openapi-specs/compute/33-03/desc/feeds/refresh_post.md @@ -1,7 +1,7 @@ Triggers Console to refresh its data from the **Intelligence Stream** ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/forensic/activities_download_get.md b/openapi-specs/compute/33-03/desc/forensic/activities_download_get.md index 8a2dbd926..1918e3790 100644 --- a/openapi-specs/compute/33-03/desc/forensic/activities_download_get.md +++ b/openapi-specs/compute/33-03/desc/forensic/activities_download_get.md @@ -3,7 +3,7 @@ Downloads all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/forensic/activities_get.md b/openapi-specs/compute/33-03/desc/forensic/activities_get.md index c8fb1d0cd..c0761aa60 100644 --- a/openapi-specs/compute/33-03/desc/forensic/activities_get.md +++ b/openapi-specs/compute/33-03/desc/forensic/activities_get.md @@ -3,7 +3,7 @@ Retrieves all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/groups/get.md b/openapi-specs/compute/33-03/desc/groups/get.md index 6a0daa2eb..34a2711e0 100644 --- a/openapi-specs/compute/33-03/desc/groups/get.md +++ b/openapi-specs/compute/33-03/desc/groups/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups. ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/33-03/desc/groups/id_delete.md b/openapi-specs/compute/33-03/desc/groups/id_delete.md index 5962a1135..0c3cfa1cd 100644 --- a/openapi-specs/compute/33-03/desc/groups/id_delete.md +++ b/openapi-specs/compute/33-03/desc/groups/id_delete.md @@ -13,7 +13,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes a collection with the name `{id}`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-03/desc/groups/names.md b/openapi-specs/compute/33-03/desc/groups/names.md index 80f34f536..9c2dd1089 100644 --- a/openapi-specs/compute/33-03/desc/groups/names.md +++ b/openapi-specs/compute/33-03/desc/groups/names.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/33-03/desc/groups/post.md b/openapi-specs/compute/33-03/desc/groups/post.md index d0fc23a6d..ebad011f4 100644 --- a/openapi-specs/compute/33-03/desc/groups/post.md +++ b/openapi-specs/compute/33-03/desc/groups/post.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that creates a new group named `my-group`: ```bash -$ curl -k \ +$ curl \ -X POST \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/33-03/desc/high-availability/get.md b/openapi-specs/compute/33-03/desc/high-availability/get.md index a988d47ef..83d5d9b46 100644 --- a/openapi-specs/compute/33-03/desc/high-availability/get.md +++ b/openapi-specs/compute/33-03/desc/high-availability/get.md @@ -3,7 +3,7 @@ Returns the status of high high availability. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/33-03/desc/hosts/download_get.md b/openapi-specs/compute/33-03/desc/hosts/download_get.md index ab691fb49..34e546573 100644 --- a/openapi-specs/compute/33-03/desc/hosts/download_get.md +++ b/openapi-specs/compute/33-03/desc/hosts/download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Hosts > Refer to the following example cURL command that downloads all host scan reports to a CSV file called `hosts_report.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o hosts_report.csv \ diff --git a/openapi-specs/compute/33-03/desc/hosts/filters_get.md b/openapi-specs/compute/33-03/desc/hosts/filters_get.md index 4bf6df5e6..a39ec8a97 100644 --- a/openapi-specs/compute/33-03/desc/hosts/filters_get.md +++ b/openapi-specs/compute/33-03/desc/hosts/filters_get.md @@ -3,7 +3,7 @@ Returns host filters such as distribution and host name. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/hosts/get.md b/openapi-specs/compute/33-03/desc/hosts/get.md index 43020558a..9bdf69c6c 100644 --- a/openapi-specs/compute/33-03/desc/hosts/get.md +++ b/openapi-specs/compute/33-03/desc/hosts/get.md @@ -37,7 +37,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following cURL command that retrieves all host scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/hosts/info_get.md b/openapi-specs/compute/33-03/desc/hosts/info_get.md index 5b3903b7e..523024735 100644 --- a/openapi-specs/compute/33-03/desc/hosts/info_get.md +++ b/openapi-specs/compute/33-03/desc/hosts/info_get.md @@ -5,7 +5,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/hosts/scan_post.md b/openapi-specs/compute/33-03/desc/hosts/scan_post.md index 6b72cbfa3..0e0e7b074 100644 --- a/openapi-specs/compute/33-03/desc/hosts/scan_post.md +++ b/openapi-specs/compute/33-03/desc/hosts/scan_post.md @@ -3,7 +3,7 @@ Re-scan all hosts immediately. Refer to the following example command that forces Prisma Cloud Compute to re-scan all hosts: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/hosts/scan diff --git a/openapi-specs/compute/33-03/desc/images/defender_layer_get.md b/openapi-specs/compute/33-03/desc/images/defender_layer_get.md index 1dfe3633d..4bb88d62c 100644 --- a/openapi-specs/compute/33-03/desc/images/defender_layer_get.md +++ b/openapi-specs/compute/33-03/desc/images/defender_layer_get.md @@ -5,7 +5,7 @@ Returns the the Prisma Cloud Compute Defender in as a layer that can be used in Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/compute/33-03/desc/images/defender_rasp_get.md b/openapi-specs/compute/33-03/desc/images/defender_rasp_get.md index a8e145ff7..260e271a1 100644 --- a/openapi-specs/compute/33-03/desc/images/defender_rasp_get.md +++ b/openapi-specs/compute/33-03/desc/images/defender_rasp_get.md @@ -3,7 +3,7 @@ Returns the the Prisma Cloud Compute Defender as the RASP Defender A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/compute/33-03/desc/images/download_get.md b/openapi-specs/compute/33-03/desc/images/download_get.md index 9e16d86c6..0f262ffce 100644 --- a/openapi-specs/compute/33-03/desc/images/download_get.md +++ b/openapi-specs/compute/33-03/desc/images/download_get.md @@ -16,7 +16,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -27,7 +27,7 @@ $ curl -k \ Refer to the following example cURL command that might be useful for developers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/images/get.md b/openapi-specs/compute/33-03/desc/images/get.md index 3f594c6c8..dcef1b0a4 100644 --- a/openapi-specs/compute/33-03/desc/images/get.md +++ b/openapi-specs/compute/33-03/desc/images/get.md @@ -26,7 +26,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following cURL command that retrieves a compact scan report for all images: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -36,7 +36,7 @@ $ curl -k \ Refer to the following cURL command that retrieves a compact scan report for an Ubuntu image: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -47,7 +47,7 @@ The name query is synonymous with the filter images text field in the Console UI Refer to the following cURL command that retrieves the scan report for an image with the matching SHA-256 hash: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/images/names_get.md b/openapi-specs/compute/33-03/desc/images/names_get.md index 3a234df98..311b33574 100644 --- a/openapi-specs/compute/33-03/desc/images/names_get.md +++ b/openapi-specs/compute/33-03/desc/images/names_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/33-03/desc/images/scan_post.md b/openapi-specs/compute/33-03/desc/images/scan_post.md index 8d802727a..36278249b 100644 --- a/openapi-specs/compute/33-03/desc/images/scan_post.md +++ b/openapi-specs/compute/33-03/desc/images/scan_post.md @@ -5,7 +5,7 @@ Re-scan all images immediately. This endpoint returns the time that the scans we Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all images: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/images/scan diff --git a/openapi-specs/compute/33-03/desc/images/twistlock_defender_tar_gz_get.md b/openapi-specs/compute/33-03/desc/images/twistlock_defender_tar_gz_get.md index 7852e12ba..36fb66ae8 100644 --- a/openapi-specs/compute/33-03/desc/images/twistlock_defender_tar_gz_get.md +++ b/openapi-specs/compute/33-03/desc/images/twistlock_defender_tar_gz_get.md @@ -1,7 +1,7 @@ Download the Container Defender image for Linux platforms. ```bash -$ curl -k \ +$ curl \ -u \ -H "Content-Type: application/octet-stream" \ -o twistlock_defender.tar.gz \ diff --git a/openapi-specs/compute/33-03/desc/intro.md b/openapi-specs/compute/33-03/desc/intro.md index 9038a3734..5b4ed5864 100644 --- a/openapi-specs/compute/33-03/desc/intro.md +++ b/openapi-specs/compute/33-03/desc/intro.md @@ -47,7 +47,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -58,7 +58,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -70,7 +70,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/compute/33-03/desc/kubernetes/scan_post.md b/openapi-specs/compute/33-03/desc/kubernetes/scan_post.md index 15d614c1a..ab74d5d96 100644 --- a/openapi-specs/compute/33-03/desc/kubernetes/scan_post.md +++ b/openapi-specs/compute/33-03/desc/kubernetes/scan_post.md @@ -3,7 +3,7 @@ This endpoint will trigger a Kubernetes scan. The following example curl command uses basic auth to initiate this scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/logs/console_get.md b/openapi-specs/compute/33-03/desc/logs/console_get.md index 80ece6611..113543540 100644 --- a/openapi-specs/compute/33-03/desc/logs/console_get.md +++ b/openapi-specs/compute/33-03/desc/logs/console_get.md @@ -3,7 +3,7 @@ Retrieves the latest Console log messages. The following example curl command retrieves the 10 latest Console log messages: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/logs/defender_download_get.md b/openapi-specs/compute/33-03/desc/logs/defender_download_get.md index 5d6718db0..05bbc6a75 100644 --- a/openapi-specs/compute/33-03/desc/logs/defender_download_get.md +++ b/openapi-specs/compute/33-03/desc/logs/defender_download_get.md @@ -5,7 +5,7 @@ The hostname can be returned from the endpoint `/defenders/names` The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/logs/defender_get.md b/openapi-specs/compute/33-03/desc/logs/defender_get.md index 1e733a746..f2e3b25df 100644 --- a/openapi-specs/compute/33-03/desc/logs/defender_get.md +++ b/openapi-specs/compute/33-03/desc/logs/defender_get.md @@ -7,7 +7,7 @@ Note that you must quote the URL when running the following command. Otherwise the shell misinterprets the ampersand (`&`) as the end of the command, and puts the curl command in the background. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/logs/system_download_get.md b/openapi-specs/compute/33-03/desc/logs/system_download_get.md index 1e5b5b873..43bb0abce 100644 --- a/openapi-specs/compute/33-03/desc/logs/system_download_get.md +++ b/openapi-specs/compute/33-03/desc/logs/system_download_get.md @@ -4,7 +4,7 @@ This endpoint will return the system debug logs with `tar.gz` file extension. The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/pcf-droplets/addresses_get.md b/openapi-specs/compute/33-03/desc/pcf-droplets/addresses_get.md index 257a47455..bb3365015 100644 --- a/openapi-specs/compute/33-03/desc/pcf-droplets/addresses_get.md +++ b/openapi-specs/compute/33-03/desc/pcf-droplets/addresses_get.md @@ -5,7 +5,7 @@ You can also add optional query parameters to this API call, in this example `cl The following example curl command retrieves the list of addresses: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/pcf-droplets/download_get.md b/openapi-specs/compute/33-03/desc/pcf-droplets/download_get.md index ad761e744..ac8546a25 100644 --- a/openapi-specs/compute/33-03/desc/pcf-droplets/download_get.md +++ b/openapi-specs/compute/33-03/desc/pcf-droplets/download_get.md @@ -3,7 +3,7 @@ This endpoint will download the list of configured cloud controller addresses co The following example curl command retrieves the list of addresses and outputs it to a file call `PCF_blobstores.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/pcf-droplets/get.md b/openapi-specs/compute/33-03/desc/pcf-droplets/get.md index 930d16948..aad607cba 100644 --- a/openapi-specs/compute/33-03/desc/pcf-droplets/get.md +++ b/openapi-specs/compute/33-03/desc/pcf-droplets/get.md @@ -3,7 +3,7 @@ This endpoint will return the full metadata of PCF blobstore from page **Monitor The following example curl command will retrieve this: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/pcf-droplets/scan_post.md b/openapi-specs/compute/33-03/desc/pcf-droplets/scan_post.md index 34e75b26c..d9c9df4dd 100644 --- a/openapi-specs/compute/33-03/desc/pcf-droplets/scan_post.md +++ b/openapi-specs/compute/33-03/desc/pcf-droplets/scan_post.md @@ -3,7 +3,7 @@ This endpoint will kick off a scan of the any PCF Blobstores you have configured Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/pcf-droplets/stop_post.md b/openapi-specs/compute/33-03/desc/pcf-droplets/stop_post.md index 94c376972..2c4d5264a 100644 --- a/openapi-specs/compute/33-03/desc/pcf-droplets/stop_post.md +++ b/openapi-specs/compute/33-03/desc/pcf-droplets/stop_post.md @@ -3,7 +3,7 @@ This endpoint will instruct the PFC Defenders to stop scanning. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/policies/compliance_ci_images_get.md b/openapi-specs/compute/33-03/desc/policies/compliance_ci_images_get.md index f97130a97..9a2b2abf5 100644 --- a/openapi-specs/compute/33-03/desc/policies/compliance_ci_images_get.md +++ b/openapi-specs/compute/33-03/desc/policies/compliance_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > CI** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/policies/compliance_ci_serverless_get.md b/openapi-specs/compute/33-03/desc/policies/compliance_ci_serverless_get.md index 59195f070..2f30e2d74 100644 --- a/openapi-specs/compute/33-03/desc/policies/compliance_ci_serverless_get.md +++ b/openapi-specs/compute/33-03/desc/policies/compliance_ci_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Functions > CI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/policies/compliance_container_get.md b/openapi-specs/compute/33-03/desc/policies/compliance_container_get.md index 7f10245ea..657d4f2dd 100644 --- a/openapi-specs/compute/33-03/desc/policies/compliance_container_get.md +++ b/openapi-specs/compute/33-03/desc/policies/compliance_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > Deployed** Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/policies/compliance_container_impacted_get.md b/openapi-specs/compute/33-03/desc/policies/compliance_container_impacted_get.md index 607bfa3c8..de9e0ee77 100644 --- a/openapi-specs/compute/33-03/desc/policies/compliance_container_impacted_get.md +++ b/openapi-specs/compute/33-03/desc/policies/compliance_container_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of containers captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/compliance/container/impacted?ruleName=' diff --git a/openapi-specs/compute/33-03/desc/policies/compliance_host_get.md b/openapi-specs/compute/33-03/desc/policies/compliance_host_get.md index c029ecf7f..a5e429af5 100755 --- a/openapi-specs/compute/33-03/desc/policies/compliance_host_get.md +++ b/openapi-specs/compute/33-03/desc/policies/compliance_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Hosts > Running hosts** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/policies/compliance_serverless_get.md b/openapi-specs/compute/33-03/desc/policies/compliance_serverless_get.md index c7de886c1..f559179f6 100755 --- a/openapi-specs/compute/33-03/desc/policies/compliance_serverless_get.md +++ b/openapi-specs/compute/33-03/desc/policies/compliance_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Functions > Functions** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/policies/compliance_vms_get.md b/openapi-specs/compute/33-03/desc/policies/compliance_vms_get.md index f7d7e1a49..b61d20d9d 100755 --- a/openapi-specs/compute/33-03/desc/policies/compliance_vms_get.md +++ b/openapi-specs/compute/33-03/desc/policies/compliance_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Hosts > VM ima The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/policies/compliance_vms_impacted_get.md b/openapi-specs/compute/33-03/desc/policies/compliance_vms_impacted_get.md index 9cf5b9d03..4ac3f2832 100644 --- a/openapi-specs/compute/33-03/desc/policies/compliance_vms_impacted_get.md +++ b/openapi-specs/compute/33-03/desc/policies/compliance_vms_impacted_get.md @@ -8,7 +8,7 @@ Use query parameters to retrieve the list of impacted resources by *account ID*, Refer to the following example cURL command, which retrieves a list of impacted resources: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/policies/docker_get.md b/openapi-specs/compute/33-03/desc/policies/docker_get.md index f56872c67..e8ab3d5bb 100644 --- a/openapi-specs/compute/33-03/desc/policies/docker_get.md +++ b/openapi-specs/compute/33-03/desc/policies/docker_get.md @@ -3,7 +3,7 @@ Retrieves a list of all access control rules for Docker Engine commands. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/policies/docker_put.md b/openapi-specs/compute/33-03/desc/policies/docker_put.md index 860e2bb1e..a5d0c0230 100644 --- a/openapi-specs/compute/33-03/desc/policies/docker_put.md +++ b/openapi-specs/compute/33-03/desc/policies/docker_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove Docker access control rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/docker \ | jq '.' > docker_access_control_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove Docker access control rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/33-03/desc/policies/firewall_app-embedded_get.md b/openapi-specs/compute/33-03/desc/policies/firewall_app-embedded_get.md index 3da2a7cd6..4e59c4c21 100644 --- a/openapi-specs/compute/33-03/desc/policies/firewall_app-embedded_get.md +++ b/openapi-specs/compute/33-03/desc/policies/firewall_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > App-Embedded** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/policies/firewall_app_container_get.md b/openapi-specs/compute/33-03/desc/policies/firewall_app_container_get.md index 3b8c157fa..f0486aa4c 100644 --- a/openapi-specs/compute/33-03/desc/policies/firewall_app_container_get.md +++ b/openapi-specs/compute/33-03/desc/policies/firewall_app_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Container** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/container' diff --git a/openapi-specs/compute/33-03/desc/policies/firewall_app_host_get.md b/openapi-specs/compute/33-03/desc/policies/firewall_app_host_get.md index adb90128a..75c22add4 100644 --- a/openapi-specs/compute/33-03/desc/policies/firewall_app_host_get.md +++ b/openapi-specs/compute/33-03/desc/policies/firewall_app_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Host** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/policies/firewall_app_network_list_get.md b/openapi-specs/compute/33-03/desc/policies/firewall_app_network_list_get.md index 13f7fb450..5a1f87d85 100644 --- a/openapi-specs/compute/33-03/desc/policies/firewall_app_network_list_get.md +++ b/openapi-specs/compute/33-03/desc/policies/firewall_app_network_list_get.md @@ -11,7 +11,7 @@ This endpoint maps to **Defend > WAAS > Network lists** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/network-list' diff --git a/openapi-specs/compute/33-03/desc/policies/firewall_app_out-of-band_get.md b/openapi-specs/compute/33-03/desc/policies/firewall_app_out-of-band_get.md index d4f72d041..9ae662687 100644 --- a/openapi-specs/compute/33-03/desc/policies/firewall_app_out-of-band_get.md +++ b/openapi-specs/compute/33-03/desc/policies/firewall_app_out-of-band_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/policies/firewall_app_out-of-band_impacted_get.md b/openapi-specs/compute/33-03/desc/policies/firewall_app_out-of-band_impacted_get.md index 25d2c6691..96a427f94 100644 --- a/openapi-specs/compute/33-03/desc/policies/firewall_app_out-of-band_impacted_get.md +++ b/openapi-specs/compute/33-03/desc/policies/firewall_app_out-of-band_impacted_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/policies/firewall_app_rasp_get.md b/openapi-specs/compute/33-03/desc/policies/firewall_app_rasp_get.md index 15d481cf3..a201d3beb 100644 --- a/openapi-specs/compute/33-03/desc/policies/firewall_app_rasp_get.md +++ b/openapi-specs/compute/33-03/desc/policies/firewall_app_rasp_get.md @@ -1,7 +1,7 @@ Retrieves a list of all application firewall (CNAF) rules for RASP. ``` -$ curl -k \ +$ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp ``` diff --git a/openapi-specs/compute/33-03/desc/policies/firewall_app_rasp_put.md b/openapi-specs/compute/33-03/desc/policies/firewall_app_rasp_put.md index 04ba86483..1101c7690 100644 --- a/openapi-specs/compute/33-03/desc/policies/firewall_app_rasp_put.md +++ b/openapi-specs/compute/33-03/desc/policies/firewall_app_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp \ | jq '.' > app_firewall_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/33-03/desc/policies/firewall_app_serverless_get.md b/openapi-specs/compute/33-03/desc/policies/firewall_app_serverless_get.md index d19e909f3..90cac0015 100644 --- a/openapi-specs/compute/33-03/desc/policies/firewall_app_serverless_get.md +++ b/openapi-specs/compute/33-03/desc/policies/firewall_app_serverless_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Serverless** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/serverless' diff --git a/openapi-specs/compute/33-03/desc/policies/firewall_network_container_get.md b/openapi-specs/compute/33-03/desc/policies/firewall_network_container_get.md index 3f1343b53..82e656818 100644 --- a/openapi-specs/compute/33-03/desc/policies/firewall_network_container_get.md +++ b/openapi-specs/compute/33-03/desc/policies/firewall_network_container_get.md @@ -4,7 +4,7 @@ Retrieves a list of all CNNS container and host rules. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/policies/firewall_network_container_put.md b/openapi-specs/compute/33-03/desc/policies/firewall_network_container_put.md index fd9263430..cffb3f1c4 100644 --- a/openapi-specs/compute/33-03/desc/policies/firewall_network_container_put.md +++ b/openapi-specs/compute/33-03/desc/policies/firewall_network_container_put.md @@ -9,7 +9,7 @@ The procedure to add, edit, or remove rules is: Refer to the following example cURL command that retrieves a list of all rules, pretty-print the JSON response, and save the results to a file: ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -26,7 +26,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/33-03/desc/policies/firewall_network_entities_get.md b/openapi-specs/compute/33-03/desc/policies/firewall_network_entities_get.md index 757121f70..28ed8dbcb 100644 --- a/openapi-specs/compute/33-03/desc/policies/firewall_network_entities_get.md +++ b/openapi-specs/compute/33-03/desc/policies/firewall_network_entities_get.md @@ -1,7 +1,7 @@ Retrieves a list of all CNNF network objects. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/policies/firewall_network_entities_put.md b/openapi-specs/compute/33-03/desc/policies/firewall_network_entities_put.md index 83c023286..39044ee10 100644 --- a/openapi-specs/compute/33-03/desc/policies/firewall_network_entities_put.md +++ b/openapi-specs/compute/33-03/desc/policies/firewall_network_entities_put.md @@ -3,7 +3,7 @@ Updates the list of CNNF network objects. The following example curl command updates the network objects. There is an example of all three types (images,subnets, and applications ): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-03/desc/policies/policies.md b/openapi-specs/compute/33-03/desc/policies/policies.md index 69768c03d..97be7b616 100644 --- a/openapi-specs/compute/33-03/desc/policies/policies.md +++ b/openapi-specs/compute/33-03/desc/policies/policies.md @@ -21,7 +21,7 @@ To add, edit, or remove vulnerability rules from a policy: For example, the following cURL command uses basic auth to retrieve a list of all image vulnerability rules, pretty-prints the JSON response, and saves the results to a `vulnerability_rules.json` file. ```bash - $ curl -k \ + $ curl \ -u \ https:///api/v1/policies/runtime/host \ | jq '.' > vulnerability_rules.json @@ -36,7 +36,7 @@ To add, edit, or remove vulnerability rules from a policy: **Note:** Remember to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -107,7 +107,7 @@ Use the `PUT` method to delete all rules by submitting an empty JSON object. For example, to delete all host runtime rules: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-03/desc/policies/runtime_app-embedded_get.md b/openapi-specs/compute/33-03/desc/policies/runtime_app-embedded_get.md index fcf0ba8b9..517b741bb 100755 --- a/openapi-specs/compute/33-03/desc/policies/runtime_app-embedded_get.md +++ b/openapi-specs/compute/33-03/desc/policies/runtime_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > App-Embedded policy** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/policies/runtime_container_get.md b/openapi-specs/compute/33-03/desc/policies/runtime_container_get.md index f1b50b727..65cd10660 100644 --- a/openapi-specs/compute/33-03/desc/policies/runtime_container_get.md +++ b/openapi-specs/compute/33-03/desc/policies/runtime_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Container policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/policies/runtime_container_impacted_get.md b/openapi-specs/compute/33-03/desc/policies/runtime_container_impacted_get.md index 195f75547..e026d33b9 100644 --- a/openapi-specs/compute/33-03/desc/policies/runtime_container_impacted_get.md +++ b/openapi-specs/compute/33-03/desc/policies/runtime_container_impacted_get.md @@ -6,7 +6,7 @@ In the Console UI, you can see how it works by going to the **Defend > Runtime > Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ $ curl -k \ For additional help with your `ruleName`: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/policies/runtime_host_get.md b/openapi-specs/compute/33-03/desc/policies/runtime_host_get.md index 38800596c..559ef690a 100644 --- a/openapi-specs/compute/33-03/desc/policies/runtime_host_get.md +++ b/openapi-specs/compute/33-03/desc/policies/runtime_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Host policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/policies/runtime_rasp_get.md b/openapi-specs/compute/33-03/desc/policies/runtime_rasp_get.md index 5b7a76457..55a6ff05b 100644 --- a/openapi-specs/compute/33-03/desc/policies/runtime_rasp_get.md +++ b/openapi-specs/compute/33-03/desc/policies/runtime_rasp_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your RASP runtime policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/policies/runtime_rasp_put.md b/openapi-specs/compute/33-03/desc/policies/runtime_rasp_put.md index bba60ba81..f71fb4b93 100644 --- a/openapi-specs/compute/33-03/desc/policies/runtime_rasp_put.md +++ b/openapi-specs/compute/33-03/desc/policies/runtime_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve the rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET @@ -24,7 +24,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -H "Content-Type:application/json" \ -X PUT \ diff --git a/openapi-specs/compute/33-03/desc/policies/runtime_serverless_get.md b/openapi-specs/compute/33-03/desc/policies/runtime_serverless_get.md index 44326bbf6..c98489e16 100644 --- a/openapi-specs/compute/33-03/desc/policies/runtime_serverless_get.md +++ b/openapi-specs/compute/33-03/desc/policies/runtime_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Serverless policy** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/policies/secrets_get.md b/openapi-specs/compute/33-03/desc/policies/secrets_get.md index 89e6b9c0e..cb4ecb37c 100644 --- a/openapi-specs/compute/33-03/desc/policies/secrets_get.md +++ b/openapi-specs/compute/33-03/desc/policies/secrets_get.md @@ -3,7 +3,7 @@ Retrieves a list of all secrets rules. The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/policies/secrets diff --git a/openapi-specs/compute/33-03/desc/policies/secrets_put.md b/openapi-specs/compute/33-03/desc/policies/secrets_put.md index 1e8877ca1..04fd41f24 100644 --- a/openapi-specs/compute/33-03/desc/policies/secrets_put.md +++ b/openapi-specs/compute/33-03/desc/policies/secrets_put.md @@ -10,7 +10,7 @@ The procedure to add, edit, or remove secrets rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/secrets \ | jq '.' > secrets_rules.json @@ -24,7 +24,7 @@ The procedure to add, edit, or remove secrets rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/33-03/desc/policies/trust_get.md b/openapi-specs/compute/33-03/desc/policies/trust_get.md index 8de1ba409..0805d6777 100644 --- a/openapi-specs/compute/33-03/desc/policies/trust_get.md +++ b/openapi-specs/compute/33-03/desc/policies/trust_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/policies/trust_put.md b/openapi-specs/compute/33-03/desc/policies/trust_put.md index fccd4b91e..7fec72031 100644 --- a/openapi-specs/compute/33-03/desc/policies/trust_put.md +++ b/openapi-specs/compute/33-03/desc/policies/trust_put.md @@ -1,7 +1,7 @@ Updates the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-03/desc/policies/vulnerability_ci_images_get.md b/openapi-specs/compute/33-03/desc/policies/vulnerability_ci_images_get.md index abc3da8fa..ce0d50a29 100644 --- a/openapi-specs/compute/33-03/desc/policies/vulnerability_ci_images_get.md +++ b/openapi-specs/compute/33-03/desc/policies/vulnerability_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/policies/vulnerability_ci_serverless_get.md b/openapi-specs/compute/33-03/desc/policies/vulnerability_ci_serverless_get.md index 958c86495..6fb5f93ce 100644 --- a/openapi-specs/compute/33-03/desc/policies/vulnerability_ci_serverless_get.md +++ b/openapi-specs/compute/33-03/desc/policies/vulnerability_ci_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/policies/vulnerability_coderepos_get.md b/openapi-specs/compute/33-03/desc/policies/vulnerability_coderepos_get.md index 08dfed8e1..a4ac62f33 100644 --- a/openapi-specs/compute/33-03/desc/policies/vulnerability_coderepos_get.md +++ b/openapi-specs/compute/33-03/desc/policies/vulnerability_coderepos_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Code repositories** in the Co Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/vulnerability/coderepos' diff --git a/openapi-specs/compute/33-03/desc/policies/vulnerability_coderepos_impacted_get.md b/openapi-specs/compute/33-03/desc/policies/vulnerability_coderepos_impacted_get.md index a401a12c4..e64ef768e 100644 --- a/openapi-specs/compute/33-03/desc/policies/vulnerability_coderepos_impacted_get.md +++ b/openapi-specs/compute/33-03/desc/policies/vulnerability_coderepos_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/coderepos/impacted?project=&ruleName=' ``` diff --git a/openapi-specs/compute/33-03/desc/policies/vulnerability_coderepos_put.md b/openapi-specs/compute/33-03/desc/policies/vulnerability_coderepos_put.md index 514eec136..a002415b9 100644 --- a/openapi-specs/compute/33-03/desc/policies/vulnerability_coderepos_put.md +++ b/openapi-specs/compute/33-03/desc/policies/vulnerability_coderepos_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Code repo Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT 'https:///api/v/policies/vulnerability/coderepos' \ diff --git a/openapi-specs/compute/33-03/desc/policies/vulnerability_host_get.md b/openapi-specs/compute/33-03/desc/policies/vulnerability_host_get.md index 3b9b14b9c..260da7675 100644 --- a/openapi-specs/compute/33-03/desc/policies/vulnerability_host_get.md +++ b/openapi-specs/compute/33-03/desc/policies/vulnerability_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Hosts > Running hosts** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/policies/vulnerability_host_impacted_get.md b/openapi-specs/compute/33-03/desc/policies/vulnerability_host_impacted_get.md index 346368518..f44592830 100644 --- a/openapi-specs/compute/33-03/desc/policies/vulnerability_host_impacted_get.md +++ b/openapi-specs/compute/33-03/desc/policies/vulnerability_host_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by `RULE_NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/host/impacted?project={PROJECT_NAME}&ruleName={RULE_NAME}' ``` diff --git a/openapi-specs/compute/33-03/desc/policies/vulnerability_images_get.md b/openapi-specs/compute/33-03/desc/policies/vulnerability_images_get.md index 33581be37..57359bb8f 100644 --- a/openapi-specs/compute/33-03/desc/policies/vulnerability_images_get.md +++ b/openapi-specs/compute/33-03/desc/policies/vulnerability_images_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images?project=" diff --git a/openapi-specs/compute/33-03/desc/policies/vulnerability_images_impacted_get.md b/openapi-specs/compute/33-03/desc/policies/vulnerability_images_impacted_get.md index ae1d5e396..e2a4efa23 100644 --- a/openapi-specs/compute/33-03/desc/policies/vulnerability_images_impacted_get.md +++ b/openapi-specs/compute/33-03/desc/policies/vulnerability_images_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of images caught by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images/impacted?project=&ruleName=" diff --git a/openapi-specs/compute/33-03/desc/policies/vulnerability_images_put.md b/openapi-specs/compute/33-03/desc/policies/vulnerability_images_put.md index b3330dab7..8c3cc8af2 100644 --- a/openapi-specs/compute/33-03/desc/policies/vulnerability_images_put.md +++ b/openapi-specs/compute/33-03/desc/policies/vulnerability_images_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -X PUT 'https:///api/v/policies/vulnerability/images' \ --data '{ diff --git a/openapi-specs/compute/33-03/desc/policies/vulnerability_serverless_get.md b/openapi-specs/compute/33-03/desc/policies/vulnerability_serverless_get.md index c7a8e2ef5..41c7e75d8 100644 --- a/openapi-specs/compute/33-03/desc/policies/vulnerability_serverless_get.md +++ b/openapi-specs/compute/33-03/desc/policies/vulnerability_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Functions** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/policies/vulnerability_serverless_put.md b/openapi-specs/compute/33-03/desc/policies/vulnerability_serverless_put.md index 2b567b5b1..5199f0997 100644 --- a/openapi-specs/compute/33-03/desc/policies/vulnerability_serverless_put.md +++ b/openapi-specs/compute/33-03/desc/policies/vulnerability_serverless_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k 'https:///api/v/policies/vulnerability/serverless' \ +$ curl 'https:///api/v/policies/vulnerability/serverless' \ -X PUT \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/33-03/desc/policies/vulnerability_vms_get.md b/openapi-specs/compute/33-03/desc/policies/vulnerability_vms_get.md index 117d2cc4a..e37c1520f 100644 --- a/openapi-specs/compute/33-03/desc/policies/vulnerability_vms_get.md +++ b/openapi-specs/compute/33-03/desc/policies/vulnerability_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Hosts > V The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/policies/vulnerability_vms_impacted_get.md b/openapi-specs/compute/33-03/desc/policies/vulnerability_vms_impacted_get.md index 29d9621ea..f1a7f7ef5 100644 --- a/openapi-specs/compute/33-03/desc/policies/vulnerability_vms_impacted_get.md +++ b/openapi-specs/compute/33-03/desc/policies/vulnerability_vms_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/vms?project=&ruleName=' ``` diff --git a/openapi-specs/compute/33-03/desc/profiles/app-embedded_download_get.md b/openapi-specs/compute/33-03/desc/profiles/app-embedded_download_get.md index 4b3f7ff8a..2e8cac56d 100644 --- a/openapi-specs/compute/33-03/desc/profiles/app-embedded_download_get.md +++ b/openapi-specs/compute/33-03/desc/profiles/app-embedded_download_get.md @@ -5,7 +5,7 @@ Downloads the app-embedded observations in a CSV format. Refer to the following example cURL command that downloads all the app-embedded runtime profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/profiles/app-embedded_get.md b/openapi-specs/compute/33-03/desc/profiles/app-embedded_get.md index f3ddb3125..c332061e5 100644 --- a/openapi-specs/compute/33-03/desc/profiles/app-embedded_get.md +++ b/openapi-specs/compute/33-03/desc/profiles/app-embedded_get.md @@ -5,7 +5,7 @@ Retrieves the app-embedded observations. Refer to the following example cURL command that lists all the app-embedded runtime: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/profiles/container_download_get.md b/openapi-specs/compute/33-03/desc/profiles/container_download_get.md index ad7a86101..ee9d5e9e4 100644 --- a/openapi-specs/compute/33-03/desc/profiles/container_download_get.md +++ b/openapi-specs/compute/33-03/desc/profiles/container_download_get.md @@ -6,7 +6,7 @@ Retrieves the details and state of all runtime models in CSV format. Refer to the following example cURL command that downloads a complete list in CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/profiles/container_filters_get.md b/openapi-specs/compute/33-03/desc/profiles/container_filters_get.md index 8b6122b80..13535b520 100644 --- a/openapi-specs/compute/33-03/desc/profiles/container_filters_get.md +++ b/openapi-specs/compute/33-03/desc/profiles/container_filters_get.md @@ -4,7 +4,7 @@ Returns a list of os and images from page monitor/runtime/container-models in Co Example curl command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/profiles/container_get.md b/openapi-specs/compute/33-03/desc/profiles/container_get.md index cdbc24c3e..59a3764fb 100644 --- a/openapi-specs/compute/33-03/desc/profiles/container_get.md +++ b/openapi-specs/compute/33-03/desc/profiles/container_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of all runtime models. Refer to the following example cURL command that lists all runtime models in a system: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/profiles/container_learn_post.md b/openapi-specs/compute/33-03/desc/profiles/container_learn_post.md index 5fef2e31e..2c1d08af1 100644 --- a/openapi-specs/compute/33-03/desc/profiles/container_learn_post.md +++ b/openapi-specs/compute/33-03/desc/profiles/container_learn_post.md @@ -7,7 +7,7 @@ For more information, refer to [Learning mode](https://docs.prismacloud.io/en/cl Refer to the following example cURL command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/profiles/host_download_get.md b/openapi-specs/compute/33-03/desc/profiles/host_download_get.md index ace270a32..2dfb51ec0 100644 --- a/openapi-specs/compute/33-03/desc/profiles/host_download_get.md +++ b/openapi-specs/compute/33-03/desc/profiles/host_download_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of each host service runtime model in CSV format Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/profiles/host_get.md b/openapi-specs/compute/33-03/desc/profiles/host_get.md index 208a24de3..55d8bf8ff 100644 --- a/openapi-specs/compute/33-03/desc/profiles/host_get.md +++ b/openapi-specs/compute/33-03/desc/profiles/host_get.md @@ -15,7 +15,7 @@ The returned JSON object has the following structure: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/profiles/host_id_rule_get.md b/openapi-specs/compute/33-03/desc/profiles/host_id_rule_get.md index 672cb4c62..8be668fca 100644 --- a/openapi-specs/compute/33-03/desc/profiles/host_id_rule_get.md +++ b/openapi-specs/compute/33-03/desc/profiles/host_id_rule_get.md @@ -10,7 +10,7 @@ This is the `PROFILE_ID`. The following example command uses curl and basic auth to specify the learning mode for a profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/profiles/service_download_get.md b/openapi-specs/compute/33-03/desc/profiles/service_download_get.md index 63dff3354..4c1c431c1 100644 --- a/openapi-specs/compute/33-03/desc/profiles/service_download_get.md +++ b/openapi-specs/compute/33-03/desc/profiles/service_download_get.md @@ -1,7 +1,7 @@ Retrieves the details and state of all host service runtime models in CSV format ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/profiles/service_get.md b/openapi-specs/compute/33-03/desc/profiles/service_get.md index a4f8c348d..5d786d919 100644 --- a/openapi-specs/compute/33-03/desc/profiles/service_get.md +++ b/openapi-specs/compute/33-03/desc/profiles/service_get.md @@ -10,7 +10,7 @@ The returned JSON object has the following structure: Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/profiles/service_id_learn_post.md b/openapi-specs/compute/33-03/desc/profiles/service_id_learn_post.md index fb338b80d..fa85fc3a2 100644 --- a/openapi-specs/compute/33-03/desc/profiles/service_id_learn_post.md +++ b/openapi-specs/compute/33-03/desc/profiles/service_id_learn_post.md @@ -11,7 +11,7 @@ The `PROFILE_ID` is typically the service's name, such as `sshd` or `ntpd`. The following example command uses curl and basic auth to specify the learning mode for a host service profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/profiles/service_learn_post.md b/openapi-specs/compute/33-03/desc/profiles/service_learn_post.md index 02a1f299e..ceff8e5a5 100644 --- a/openapi-specs/compute/33-03/desc/profiles/service_learn_post.md +++ b/openapi-specs/compute/33-03/desc/profiles/service_learn_post.md @@ -3,7 +3,7 @@ Specify the learning mode for all host service profiles. The following example command uses curl and basic auth to specify the learning mode for all host service profiles. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/profiles/service_names_get.md b/openapi-specs/compute/33-03/desc/profiles/service_names_get.md index 7da863545..afae56f0d 100644 --- a/openapi-specs/compute/33-03/desc/profiles/service_names_get.md +++ b/openapi-specs/compute/33-03/desc/profiles/service_names_get.md @@ -3,7 +3,7 @@ Retrieves the name of all host service runtime models from within the app at **M The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/projects/get.md b/openapi-specs/compute/33-03/desc/projects/get.md index 05485c24c..1ac04d2c0 100644 --- a/openapi-specs/compute/33-03/desc/projects/get.md +++ b/openapi-specs/compute/33-03/desc/projects/get.md @@ -3,7 +3,7 @@ Lists all projects visible to the given user. Assuming the given user is an admin, the following example curl command would list all projects: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/projects/name_delete.md b/openapi-specs/compute/33-03/desc/projects/name_delete.md index fba889f7e..0a34e72a2 100644 --- a/openapi-specs/compute/33-03/desc/projects/name_delete.md +++ b/openapi-specs/compute/33-03/desc/projects/name_delete.md @@ -6,7 +6,7 @@ The value for `` can be retrieved from the `_id` field in the resp The DELETE method returns the decommissioned supervisor's admin username and password. ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/compute/33-03/desc/projects/name_put.md b/openapi-specs/compute/33-03/desc/projects/name_put.md index b5a83a67d..1bde9b0c7 100644 --- a/openapi-specs/compute/33-03/desc/projects/name_put.md +++ b/openapi-specs/compute/33-03/desc/projects/name_put.md @@ -4,7 +4,7 @@ The following example curl command updates a project named ``. The value for `` can be retrieved from the `_id` field in the response object from `GET /api/v1/projects`. ```bash -$ curl -k \ +$ curl \ -u \ -X PUT \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/compute/33-03/desc/projects/post.md b/openapi-specs/compute/33-03/desc/projects/post.md index 8862c0fd4..38c574173 100644 --- a/openapi-specs/compute/33-03/desc/projects/post.md +++ b/openapi-specs/compute/33-03/desc/projects/post.md @@ -3,7 +3,7 @@ Provisions a new project. The following example curl command provisions a new project named `my-project`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ $ curl -k \ If you have installed a new instance of Console, and you have already created an initial admin user for it, then you can specify the admin username name and password when you provision the project. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/projects/projects.md b/openapi-specs/compute/33-03/desc/projects/projects.md index 7e7dcff66..19c904e9e 100644 --- a/openapi-specs/compute/33-03/desc/projects/projects.md +++ b/openapi-specs/compute/33-03/desc/projects/projects.md @@ -20,7 +20,7 @@ If `project` is not specified, it is set to `Central+Console`. For example, to retrieve the compliance policies for a tenant project named `mobile_payments_division`, use the following curl command: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/radar/container_clean_post.md b/openapi-specs/compute/33-03/desc/radar/container_clean_post.md index 662b6d53f..d4f87e91e 100644 --- a/openapi-specs/compute/33-03/desc/radar/container_clean_post.md +++ b/openapi-specs/compute/33-03/desc/radar/container_clean_post.md @@ -1,7 +1,7 @@ Cleans the container runtime profiles and Radar entities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/radar/container_delete.md b/openapi-specs/compute/33-03/desc/radar/container_delete.md index 4eabe337f..b6cc69cf2 100644 --- a/openapi-specs/compute/33-03/desc/radar/container_delete.md +++ b/openapi-specs/compute/33-03/desc/radar/container_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-03/desc/radar/container_export_get.md b/openapi-specs/compute/33-03/desc/radar/container_export_get.md index 7f577568f..f776c7e6c 100644 --- a/openapi-specs/compute/33-03/desc/radar/container_export_get.md +++ b/openapi-specs/compute/33-03/desc/radar/container_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for containers) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/radar/container_filters_get.md b/openapi-specs/compute/33-03/desc/radar/container_filters_get.md index f66463da1..8d7cd6df3 100644 --- a/openapi-specs/compute/33-03/desc/radar/container_filters_get.md +++ b/openapi-specs/compute/33-03/desc/radar/container_filters_get.md @@ -1,7 +1,7 @@ Returns the namespaces from the container view on the Radar page. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/radar/container_get.md b/openapi-specs/compute/33-03/desc/radar/container_get.md index 280d683d9..404629a25 100644 --- a/openapi-specs/compute/33-03/desc/radar/container_get.md +++ b/openapi-specs/compute/33-03/desc/radar/container_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (container view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/radar/host_delete.md b/openapi-specs/compute/33-03/desc/radar/host_delete.md index 738fa7a7c..b4910a8b7 100644 --- a/openapi-specs/compute/33-03/desc/radar/host_delete.md +++ b/openapi-specs/compute/33-03/desc/radar/host_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two apps in CNNF for hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-03/desc/radar/host_export_get.md b/openapi-specs/compute/33-03/desc/radar/host_export_get.md index dd91b5335..851d6f40f 100644 --- a/openapi-specs/compute/33-03/desc/radar/host_export_get.md +++ b/openapi-specs/compute/33-03/desc/radar/host_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for hosts) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/radar/host_get.md b/openapi-specs/compute/33-03/desc/radar/host_get.md index a12025856..222d075aa 100644 --- a/openapi-specs/compute/33-03/desc/radar/host_get.md +++ b/openapi-specs/compute/33-03/desc/radar/host_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (host view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/radar/serverless_get.md b/openapi-specs/compute/33-03/desc/radar/serverless_get.md index b2f329149..170cfb48d 100644 --- a/openapi-specs/compute/33-03/desc/radar/serverless_get.md +++ b/openapi-specs/compute/33-03/desc/radar/serverless_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/radar/serverless_progress_get.md b/openapi-specs/compute/33-03/desc/radar/serverless_progress_get.md index a11c1ae20..0808dfbf4 100644 --- a/openapi-specs/compute/33-03/desc/radar/serverless_progress_get.md +++ b/openapi-specs/compute/33-03/desc/radar/serverless_progress_get.md @@ -1,7 +1,7 @@ Returns the scan progress from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/radar/serverless_scan_post.md b/openapi-specs/compute/33-03/desc/radar/serverless_scan_post.md index 0d519ba88..2d444ac88 100644 --- a/openapi-specs/compute/33-03/desc/radar/serverless_scan_post.md +++ b/openapi-specs/compute/33-03/desc/radar/serverless_scan_post.md @@ -1,7 +1,7 @@ Initiates a serverless scan of your environments. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/radar/serverless_stop_post.md b/openapi-specs/compute/33-03/desc/radar/serverless_stop_post.md index 5c0bdf186..f15bef34d 100644 --- a/openapi-specs/compute/33-03/desc/radar/serverless_stop_post.md +++ b/openapi-specs/compute/33-03/desc/radar/serverless_stop_post.md @@ -1,7 +1,7 @@ Stops an in-progress serverless scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/rbac/role_delete.md b/openapi-specs/compute/33-03/desc/rbac/role_delete.md index 87015b6e8..46efcf9c9 100644 --- a/openapi-specs/compute/33-03/desc/rbac/role_delete.md +++ b/openapi-specs/compute/33-03/desc/rbac/role_delete.md @@ -4,7 +4,7 @@ System roles and roles assigned to users/groups cannot be deleted. The following example curl command uses basic auth to delete role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-03/desc/rbac/roles_get.md b/openapi-specs/compute/33-03/desc/rbac/roles_get.md index 4cd1d9bc7..112026937 100644 --- a/openapi-specs/compute/33-03/desc/rbac/roles_get.md +++ b/openapi-specs/compute/33-03/desc/rbac/roles_get.md @@ -3,7 +3,7 @@ This endpoint will return a list in JSON format of the roles can be found under The following example curl command uses basic auth to return: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/rbac/roles_post.md b/openapi-specs/compute/33-03/desc/rbac/roles_post.md index 1f20772ce..6988766e8 100644 --- a/openapi-specs/compute/33-03/desc/rbac/roles_post.md +++ b/openapi-specs/compute/33-03/desc/rbac/roles_post.md @@ -37,7 +37,7 @@ The added role must contain the "user" permission with read-write access. This p The following example curl command uses basic auth to create the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/rbac/roles_put.md b/openapi-specs/compute/33-03/desc/rbac/roles_put.md index 34d7b41a7..f62e34ccb 100644 --- a/openapi-specs/compute/33-03/desc/rbac/roles_put.md +++ b/openapi-specs/compute/33-03/desc/rbac/roles_put.md @@ -38,7 +38,7 @@ The updated role must contain the "user" permission with read-write access. This The following example curl command uses basic auth to update the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-03/desc/recovery/backup_get.md b/openapi-specs/compute/33-03/desc/recovery/backup_get.md index 4da46f356..bf735905a 100644 --- a/openapi-specs/compute/33-03/desc/recovery/backup_get.md +++ b/openapi-specs/compute/33-03/desc/recovery/backup_get.md @@ -3,7 +3,7 @@ Returns a list of available backups. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/recovery/backup_id_delete.md b/openapi-specs/compute/33-03/desc/recovery/backup_id_delete.md index ae9c33e90..80cd4c3f6 100644 --- a/openapi-specs/compute/33-03/desc/recovery/backup_id_delete.md +++ b/openapi-specs/compute/33-03/desc/recovery/backup_id_delete.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-03/desc/recovery/backup_id_patch.md b/openapi-specs/compute/33-03/desc/recovery/backup_id_patch.md index 4a78cd67d..b3699972f 100644 --- a/openapi-specs/compute/33-03/desc/recovery/backup_id_patch.md +++ b/openapi-specs/compute/33-03/desc/recovery/backup_id_patch.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/compute/33-03/desc/recovery/backup_post.md b/openapi-specs/compute/33-03/desc/recovery/backup_post.md index f45161712..41436fe5f 100644 --- a/openapi-specs/compute/33-03/desc/recovery/backup_post.md +++ b/openapi-specs/compute/33-03/desc/recovery/backup_post.md @@ -3,7 +3,7 @@ Creates a backup named `backup_name` by invoking the MongoDB dump process. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/recovery/restore_id_post.md b/openapi-specs/compute/33-03/desc/recovery/restore_id_post.md index 850fceeaa..e424641cc 100644 --- a/openapi-specs/compute/33-03/desc/recovery/restore_id_post.md +++ b/openapi-specs/compute/33-03/desc/recovery/restore_id_post.md @@ -5,7 +5,7 @@ Restores Prisma Cloud Compute from the given backup. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/registry/download_get.md b/openapi-specs/compute/33-03/desc/registry/download_get.md index 5a3eb0141..3eef8d50e 100644 --- a/openapi-specs/compute/33-03/desc/registry/download_get.md +++ b/openapi-specs/compute/33-03/desc/registry/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Compliance > Images > Reg Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/registry/get.md b/openapi-specs/compute/33-03/desc/registry/get.md index e8b87080e..208b2f1e3 100644 --- a/openapi-specs/compute/33-03/desc/registry/get.md +++ b/openapi-specs/compute/33-03/desc/registry/get.md @@ -21,7 +21,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that retrieves a scan report for all images in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -33,7 +33,7 @@ The compact query can be used to get a general overview of the number of Vulnera Refer to the following cURL command that retrieves a compact scan report for the Ubuntu image in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -44,7 +44,7 @@ The name query is synonymous with the filter registry text field in the Console Refer to the following cURL that retrieves the scan report for the image in the registry with the matching **sha256** hash: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -54,7 +54,7 @@ $ curl -k \ Refer to the following cURL command that retrieves the images in the first 10 registries: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/registry/get_registry_progress.md b/openapi-specs/compute/33-03/desc/registry/get_registry_progress.md index ddc319c1b..cc6feac3d 100644 --- a/openapi-specs/compute/33-03/desc/registry/get_registry_progress.md +++ b/openapi-specs/compute/33-03/desc/registry/get_registry_progress.md @@ -11,7 +11,7 @@ For a regular scan, use the API path only without any query parameters. Refer to the following example cURL request that retrieves the ongoing scan details for a regular registry scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -61,7 +61,7 @@ For an on-demand scan that is started using the `/registry/scan` endpoint with t Refer to the following example cURL request that retrieves the ongoing scan details for an on-demand registry scan that is started using the `/registry/scan` endpoint for the repository `alpine` with tag `3.16`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/registry/names_get.md b/openapi-specs/compute/33-03/desc/registry/names_get.md index 6933a570c..25afb48b8 100644 --- a/openapi-specs/compute/33-03/desc/registry/names_get.md +++ b/openapi-specs/compute/33-03/desc/registry/names_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command that retrieves a list of image names from your scanned registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/registry/scan_post.md b/openapi-specs/compute/33-03/desc/registry/scan_post.md index ce7e19533..96bfd5f16 100644 --- a/openapi-specs/compute/33-03/desc/registry/scan_post.md +++ b/openapi-specs/compute/33-03/desc/registry/scan_post.md @@ -17,7 +17,7 @@ For information on scan result, see [Get Registry Scan Report](https://prisma.pa Refer to the following example cURL command that forces Prisma Cloud Compute to rescan all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -27,7 +27,7 @@ $ curl -k \ Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan a specific image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -52,7 +52,7 @@ For information on scan result, see [Get Registry Scan Report](https://pan.dev/p Refer to the following example cURL command to trigger an on-demand scan for an image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/registry/stop_post.md b/openapi-specs/compute/33-03/desc/registry/stop_post.md index 29e103ac1..05ac2f436 100644 --- a/openapi-specs/compute/33-03/desc/registry/stop_post.md +++ b/openapi-specs/compute/33-03/desc/registry/stop_post.md @@ -5,7 +5,7 @@ Stops current registry scan immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to stop scanning all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/scans/download_get.md b/openapi-specs/compute/33-03/desc/scans/download_get.md index 61a0ccc2d..3785bf562 100644 --- a/openapi-specs/compute/33-03/desc/scans/download_get.md +++ b/openapi-specs/compute/33-03/desc/scans/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Images The following cURL command retrieves and saves your Jenkins and twistcli scan reports to a CSV file called `scans_report.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/scans/filter_get.md b/openapi-specs/compute/33-03/desc/scans/filter_get.md index 58550ad35..df3e9cdb0 100644 --- a/openapi-specs/compute/33-03/desc/scans/filter_get.md +++ b/openapi-specs/compute/33-03/desc/scans/filter_get.md @@ -3,7 +3,7 @@ Retrieves the list of Jenkins projects that have been scanned by the Jenkins plu The following example curl command uses basic auth to retrieve the list of Jenkins project names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/scans/get.md b/openapi-specs/compute/33-03/desc/scans/get.md index e28506972..107b733bd 100644 --- a/openapi-specs/compute/33-03/desc/scans/get.md +++ b/openapi-specs/compute/33-03/desc/scans/get.md @@ -11,7 +11,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command that retrieves the scan reports for all images scanned using the Jenkins CI plugin or the twistcli tool: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -23,7 +23,7 @@ To get the report of a specific scan, add query parameters to narrow the scope o The following cURL command retrieves the scan report for an image with a SHA256 ID of `sha256:f756e84300d8e53006090573dd33abe5b8cfac3e42d104fc4be37f435fe512f3`. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/scans/id_get.md b/openapi-specs/compute/33-03/desc/scans/id_get.md index 7a342ef60..1557b1905 100644 --- a/openapi-specs/compute/33-03/desc/scans/id_get.md +++ b/openapi-specs/compute/33-03/desc/scans/id_get.md @@ -3,7 +3,7 @@ Retrieves all scan reports for images scanned by the Jenkins plugin or twistcli The following example curl command uses basic auth to retrieve the scan report for just an image with a SHA256 ID of `5c3385fd2e76c5c16124c077`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/scripts/console_sh_get.md b/openapi-specs/compute/33-03/desc/scripts/console_sh_get.md index d8f02038f..1622321ca 100644 --- a/openapi-specs/compute/33-03/desc/scripts/console_sh_get.md +++ b/openapi-specs/compute/33-03/desc/scripts/console_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/scripts/defender_ps1_get.md b/openapi-specs/compute/33-03/desc/scripts/defender_ps1_get.md index a47616983..45e4a6133 100644 --- a/openapi-specs/compute/33-03/desc/scripts/defender_ps1_get.md +++ b/openapi-specs/compute/33-03/desc/scripts/defender_ps1_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/scripts/defender_sh_get.md b/openapi-specs/compute/33-03/desc/scripts/defender_sh_get.md index 98ad6cf62..a8a302426 100644 --- a/openapi-specs/compute/33-03/desc/scripts/defender_sh_get.md +++ b/openapi-specs/compute/33-03/desc/scripts/defender_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/serverless/download_get.md b/openapi-specs/compute/33-03/desc/serverless/download_get.md index a8e49ff25..4d7d3adc1 100644 --- a/openapi-specs/compute/33-03/desc/serverless/download_get.md +++ b/openapi-specs/compute/33-03/desc/serverless/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Functio The following cURL command retrieves a list of all serverless resources monitored by Prisma Cloud Compute and saves the results in a CSV file called `serverless.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/serverless/download' \ diff --git a/openapi-specs/compute/33-03/desc/serverless/embed_post.md b/openapi-specs/compute/33-03/desc/serverless/embed_post.md index 6cce784b8..353b5721c 100644 --- a/openapi-specs/compute/33-03/desc/serverless/embed_post.md +++ b/openapi-specs/compute/33-03/desc/serverless/embed_post.md @@ -1,7 +1,7 @@ The following curl command uses basic auth to retrieve a list of all Serverless resources that monitored by Prisma Cloud Compute, and save the results to a CSV file: ```bash -$ curl -k \ +$ curl \ -X POST \ -H "Content-Type: application/octet-stream" \ -u \ diff --git a/openapi-specs/compute/33-03/desc/serverless/get.md b/openapi-specs/compute/33-03/desc/serverless/get.md index aee50492f..430ee065a 100644 --- a/openapi-specs/compute/33-03/desc/serverless/get.md +++ b/openapi-specs/compute/33-03/desc/serverless/get.md @@ -11,7 +11,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Functions > Scanned function Refer to the following example cURL command that retrieves the scan reports for serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/serverless/names_get.md b/openapi-specs/compute/33-03/desc/serverless/names_get.md index 3cab17092..90285574a 100644 --- a/openapi-specs/compute/33-03/desc/serverless/names_get.md +++ b/openapi-specs/compute/33-03/desc/serverless/names_get.md @@ -5,7 +5,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo The following curl command uses basic auth to retrieve a list of names of all Serverless resources monitored by Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -X GET \ -H "Content-Type: application/json" \ -u \ diff --git a/openapi-specs/compute/33-03/desc/serverless/scan_post.md b/openapi-specs/compute/33-03/desc/serverless/scan_post.md index 159285349..70a3a3b4e 100644 --- a/openapi-specs/compute/33-03/desc/serverless/scan_post.md +++ b/openapi-specs/compute/33-03/desc/serverless/scan_post.md @@ -5,7 +5,7 @@ Re-scan all serverless functions immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/scan diff --git a/openapi-specs/compute/33-03/desc/serverless/stop_post.md b/openapi-specs/compute/33-03/desc/serverless/stop_post.md index 763710842..67c0d2239 100644 --- a/openapi-specs/compute/33-03/desc/serverless/stop_post.md +++ b/openapi-specs/compute/33-03/desc/serverless/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing serverless scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/stop diff --git a/openapi-specs/compute/33-03/desc/settings/alerts_get.md b/openapi-specs/compute/33-03/desc/settings/alerts_get.md index 060114c39..2b25dc6c9 100644 --- a/openapi-specs/compute/33-03/desc/settings/alerts_get.md +++ b/openapi-specs/compute/33-03/desc/settings/alerts_get.md @@ -1,7 +1,7 @@ Retrieves a list of your alert settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/settings/alerts_options_get.md b/openapi-specs/compute/33-03/desc/settings/alerts_options_get.md index 095c1f1b7..aa7a1d250 100644 --- a/openapi-specs/compute/33-03/desc/settings/alerts_options_get.md +++ b/openapi-specs/compute/33-03/desc/settings/alerts_options_get.md @@ -3,7 +3,7 @@ This endpoint will return the alert profile configuration options that can be fo The following example curl command uses basic auth to retrieve all alert profile configuration options: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/settings/alerts_post.md b/openapi-specs/compute/33-03/desc/settings/alerts_post.md index 3acb8d543..cd303f880 100644 --- a/openapi-specs/compute/33-03/desc/settings/alerts_post.md +++ b/openapi-specs/compute/33-03/desc/settings/alerts_post.md @@ -3,7 +3,7 @@ Configure alerts. The following example curl command sets the aggregation period for alerts to one hour. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/settings/certificates_post.md b/openapi-specs/compute/33-03/desc/settings/certificates_post.md index fbdc8a5a9..bd30ea399 100644 --- a/openapi-specs/compute/33-03/desc/settings/certificates_post.md +++ b/openapi-specs/compute/33-03/desc/settings/certificates_post.md @@ -9,7 +9,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to set the validity period for client certificates to seven days: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/33-03/desc/settings/certs_get.md b/openapi-specs/compute/33-03/desc/settings/certs_get.md index ba6674a3c..dbf1d3790 100644 --- a/openapi-specs/compute/33-03/desc/settings/certs_get.md +++ b/openapi-specs/compute/33-03/desc/settings/certs_get.md @@ -6,7 +6,7 @@ Defenders use these names to connect to Console. Refer to the following example cURL request that uses basic auth to retrieve the SANs in Console's cert: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/settings/certs_post.md b/openapi-specs/compute/33-03/desc/settings/certs_post.md index a6e429006..fb2cedee5 100644 --- a/openapi-specs/compute/33-03/desc/settings/certs_post.md +++ b/openapi-specs/compute/33-03/desc/settings/certs_post.md @@ -12,7 +12,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to add `node-01.example.com` to the `subjectAltName` field in the certificate: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/33-03/desc/settings/coderepos_get.md b/openapi-specs/compute/33-03/desc/settings/coderepos_get.md index 6cbfb78cb..286a8d905 100644 --- a/openapi-specs/compute/33-03/desc/settings/coderepos_get.md +++ b/openapi-specs/compute/33-03/desc/settings/coderepos_get.md @@ -20,7 +20,7 @@ Construct the full webhook using Console's publicly accessible DNS name or IP ad Refer to the following example cURL command that retrieves all code repositories to scan, as well as the webhook URL suffix: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/settings/console-certificates_post.md b/openapi-specs/compute/33-03/desc/settings/console-certificates_post.md index 5673af840..392061c8f 100644 --- a/openapi-specs/compute/33-03/desc/settings/console-certificates_post.md +++ b/openapi-specs/compute/33-03/desc/settings/console-certificates_post.md @@ -9,7 +9,7 @@ For the custom TLS certificate for securing browser access, this file must be in Refer to the following example cURL request that uses basic auth and configures the custom certificate to use for securing browser access to the console: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/settings/custom-labels_get.md b/openapi-specs/compute/33-03/desc/settings/custom-labels_get.md index a849dd8a8..19c1cadde 100644 --- a/openapi-specs/compute/33-03/desc/settings/custom-labels_get.md +++ b/openapi-specs/compute/33-03/desc/settings/custom-labels_get.md @@ -5,7 +5,7 @@ Returns the list of alert labels configured in Prisma Cloud Compute. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/settings/custom-labels_post.md b/openapi-specs/compute/33-03/desc/settings/custom-labels_post.md index 6bb66e706..9b0702fe8 100644 --- a/openapi-specs/compute/33-03/desc/settings/custom-labels_post.md +++ b/openapi-specs/compute/33-03/desc/settings/custom-labels_post.md @@ -5,7 +5,7 @@ Creates a custom alert label to augment audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/settings/defender_get.md b/openapi-specs/compute/33-03/desc/settings/defender_get.md index ecb8b6989..cf43bb304 100644 --- a/openapi-specs/compute/33-03/desc/settings/defender_get.md +++ b/openapi-specs/compute/33-03/desc/settings/defender_get.md @@ -5,7 +5,7 @@ Returns the advanced settings for Defenders. Refer to the following example cURL command that gets all advanced settings for Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/settings/forensic_get.md b/openapi-specs/compute/33-03/desc/settings/forensic_get.md index 9c16b70b9..3486b2bf9 100644 --- a/openapi-specs/compute/33-03/desc/settings/forensic_get.md +++ b/openapi-specs/compute/33-03/desc/settings/forensic_get.md @@ -1,7 +1,7 @@ Retrieves the settings for the forensics system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/settings/forensic_post.md b/openapi-specs/compute/33-03/desc/settings/forensic_post.md index 31f809d39..8943842fb 100644 --- a/openapi-specs/compute/33-03/desc/settings/forensic_post.md +++ b/openapi-specs/compute/33-03/desc/settings/forensic_post.md @@ -3,7 +3,7 @@ Configures the forensics system. The following example curl command allocates 100 MB of local disk space for container forensic data and 10 MB for host forensics data. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/settings/initialized_get.md b/openapi-specs/compute/33-03/desc/settings/initialized_get.md index 3134912d1..2af8462f1 100644 --- a/openapi-specs/compute/33-03/desc/settings/initialized_get.md +++ b/openapi-specs/compute/33-03/desc/settings/initialized_get.md @@ -4,7 +4,7 @@ After first installing Console, the first thing you must do is create an admin a Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/settings/intelligence-windows_post.md b/openapi-specs/compute/33-03/desc/settings/intelligence-windows_post.md index c39e256d2..0721dab3b 100644 --- a/openapi-specs/compute/33-03/desc/settings/intelligence-windows_post.md +++ b/openapi-specs/compute/33-03/desc/settings/intelligence-windows_post.md @@ -3,7 +3,7 @@ This endpoint will enable or disable the Windows Intelligence Service from **Man The following example curl command uses basic auth to enable online updates of Windows vulnerabilities from the intelligence stream: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/settings/intelligence_get.md b/openapi-specs/compute/33-03/desc/settings/intelligence_get.md index 26c694246..15e9f24ae 100644 --- a/openapi-specs/compute/33-03/desc/settings/intelligence_get.md +++ b/openapi-specs/compute/33-03/desc/settings/intelligence_get.md @@ -5,7 +5,7 @@ Returns the details about the Intelligence Stream configuration. Refer to the following example cURL command that uses basic auth to retrieve your Intelligence Stream configuration settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/settings/intelligence_post.md b/openapi-specs/compute/33-03/desc/settings/intelligence_post.md index 74b06a3a0..2dbbd0168 100644 --- a/openapi-specs/compute/33-03/desc/settings/intelligence_post.md +++ b/openapi-specs/compute/33-03/desc/settings/intelligence_post.md @@ -7,7 +7,7 @@ For more information, see [Intelligence Stream](https://docs.paloaltonetworks.co Refer to the following example cURL command that uses basic auth to configure settings of your Intelligence Stream. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/settings/latest-version_get.md b/openapi-specs/compute/33-03/desc/settings/latest-version_get.md index c443fa7b5..16601fb5b 100644 --- a/openapi-specs/compute/33-03/desc/settings/latest-version_get.md +++ b/openapi-specs/compute/33-03/desc/settings/latest-version_get.md @@ -3,7 +3,7 @@ Retrieves the version number of the latest available Prisma Cloud Compute releas Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/settings/latest_version_get.md b/openapi-specs/compute/33-03/desc/settings/latest_version_get.md index 18e436668..5c64edff1 100644 --- a/openapi-specs/compute/33-03/desc/settings/latest_version_get.md +++ b/openapi-specs/compute/33-03/desc/settings/latest_version_get.md @@ -1,7 +1,7 @@ This endpoint will return the latest version of the product. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/settings/ldap_get.md b/openapi-specs/compute/33-03/desc/settings/ldap_get.md index 4ad0ad0c9..7d803ba1c 100644 --- a/openapi-specs/compute/33-03/desc/settings/ldap_get.md +++ b/openapi-specs/compute/33-03/desc/settings/ldap_get.md @@ -5,7 +5,7 @@ Returns the LDAP integration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/settings/ldap_post.md b/openapi-specs/compute/33-03/desc/settings/ldap_post.md index c152c7dc5..34bc06ef4 100644 --- a/openapi-specs/compute/33-03/desc/settings/ldap_post.md +++ b/openapi-specs/compute/33-03/desc/settings/ldap_post.md @@ -7,7 +7,7 @@ For more information, see [Active Directory](https://docs.paloaltonetworks.com/p Refer to the following example cURL command that enables the LDAP integration and specifies the parameters required to integrate with an Active Directory service. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/settings/license_get.md b/openapi-specs/compute/33-03/desc/settings/license_get.md index 5c792cae8..2b4b548e3 100644 --- a/openapi-specs/compute/33-03/desc/settings/license_get.md +++ b/openapi-specs/compute/33-03/desc/settings/license_get.md @@ -5,7 +5,7 @@ Returns the details about the installed license. Refer to the following example cURL request that retrieves the license details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/settings/license_post.md b/openapi-specs/compute/33-03/desc/settings/license_post.md index b77800a5f..ce74b0d0f 100644 --- a/openapi-specs/compute/33-03/desc/settings/license_post.md +++ b/openapi-specs/compute/33-03/desc/settings/license_post.md @@ -8,7 +8,7 @@ For more information, see [Licensing](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to set your license: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/settings/logging_get.md b/openapi-specs/compute/33-03/desc/settings/logging_get.md index 6eda3e484..012be5def 100644 --- a/openapi-specs/compute/33-03/desc/settings/logging_get.md +++ b/openapi-specs/compute/33-03/desc/settings/logging_get.md @@ -5,7 +5,7 @@ Returns the logging settings. Refer to the following example cURL request that uses basic auth to retrieve your logging details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/settings/logging_post.md b/openapi-specs/compute/33-03/desc/settings/logging_post.md index 3619d9c0f..8d27ee1b3 100644 --- a/openapi-specs/compute/33-03/desc/settings/logging_post.md +++ b/openapi-specs/compute/33-03/desc/settings/logging_post.md @@ -8,7 +8,7 @@ For more information, see [Logging](https://docs.paloaltonetworks.com/prisma/pri Refer to the following example cURL request that enables verbose scan output for syslog and stdout: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/settings/logon_get.md b/openapi-specs/compute/33-03/desc/settings/logon_get.md index 1559f2405..b1e9164f2 100644 --- a/openapi-specs/compute/33-03/desc/settings/logon_get.md +++ b/openapi-specs/compute/33-03/desc/settings/logon_get.md @@ -5,7 +5,7 @@ Configures the logon settings. Refer to the following example cURL request that uses basic auth to retrieve all current logon settings. ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/settings/logon_post.md b/openapi-specs/compute/33-03/desc/settings/logon_post.md index 5c2b60c9f..691e082fe 100644 --- a/openapi-specs/compute/33-03/desc/settings/logon_post.md +++ b/openapi-specs/compute/33-03/desc/settings/logon_post.md @@ -7,7 +7,7 @@ For more information, see [Logon Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that uses basic auth to set the timeout to 900 seconds (15 minutes): ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/33-03/desc/settings/oauth_get.md b/openapi-specs/compute/33-03/desc/settings/oauth_get.md index 6dcf70fb5..5d997f016 100644 --- a/openapi-specs/compute/33-03/desc/settings/oauth_get.md +++ b/openapi-specs/compute/33-03/desc/settings/oauth_get.md @@ -5,7 +5,7 @@ Returns the OAuth configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/settings/oauth_post.md b/openapi-specs/compute/33-03/desc/settings/oauth_post.md index c593b9237..da3c83d2f 100644 --- a/openapi-specs/compute/33-03/desc/settings/oauth_post.md +++ b/openapi-specs/compute/33-03/desc/settings/oauth_post.md @@ -7,7 +7,7 @@ For more information, see [GitHub OAuth](https://docs.paloaltonetworks.com/prism Refer to the following example cURL response: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/settings/oidc_get.md b/openapi-specs/compute/33-03/desc/settings/oidc_get.md index ee439622b..1f27f93ba 100644 --- a/openapi-specs/compute/33-03/desc/settings/oidc_get.md +++ b/openapi-specs/compute/33-03/desc/settings/oidc_get.md @@ -5,7 +5,7 @@ Returns the OpenID Connect configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/settings/oidc_post.md b/openapi-specs/compute/33-03/desc/settings/oidc_post.md index e0270247e..5bd3a9192 100644 --- a/openapi-specs/compute/33-03/desc/settings/oidc_post.md +++ b/openapi-specs/compute/33-03/desc/settings/oidc_post.md @@ -7,7 +7,7 @@ For more information, see [OIDC](https://docs.paloaltonetworks.com/prisma/prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/settings/pcf_get.md b/openapi-specs/compute/33-03/desc/settings/pcf_get.md index 5dc21eb17..c5e42a823 100644 --- a/openapi-specs/compute/33-03/desc/settings/pcf_get.md +++ b/openapi-specs/compute/33-03/desc/settings/pcf_get.md @@ -3,7 +3,7 @@ This endpoint will return settings for PCF (Pivotal Cloud Foundry)Blobstore scan The following example curl command uses basic auth to retrieve the current PCF Blobstore scanning settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/settings/pcf_post.md b/openapi-specs/compute/33-03/desc/settings/pcf_post.md index 139e947cb..657e14f27 100644 --- a/openapi-specs/compute/33-03/desc/settings/pcf_post.md +++ b/openapi-specs/compute/33-03/desc/settings/pcf_post.md @@ -3,7 +3,7 @@ This endpoint will allow for updating settings for PCF (Pivotal Cloud Foundry) B The following example curl command uses basic auth to set up a PCF Blobstore scanner that scans the last `5` droplets for every droplet in the PCF Blobstore: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/settings/projects_get.md b/openapi-specs/compute/33-03/desc/settings/projects_get.md index f5dd20395..bc95414a1 100644 --- a/openapi-specs/compute/33-03/desc/settings/projects_get.md +++ b/openapi-specs/compute/33-03/desc/settings/projects_get.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command retrieves the state of the Projects feature from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ All API calls must be proxied through Central Console, where the request is auto To retrieve the Projects settings from a supervisor Console, append the `project` query parameter to your request. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/settings/projects_post.md b/openapi-specs/compute/33-03/desc/settings/projects_post.md index d29f8e9d5..b3472e6b9 100644 --- a/openapi-specs/compute/33-03/desc/settings/projects_post.md +++ b/openapi-specs/compute/33-03/desc/settings/projects_post.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command designates `` as master. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/settings/proxy_get.md b/openapi-specs/compute/33-03/desc/settings/proxy_get.md index 9a4922d59..477563069 100644 --- a/openapi-specs/compute/33-03/desc/settings/proxy_get.md +++ b/openapi-specs/compute/33-03/desc/settings/proxy_get.md @@ -5,7 +5,7 @@ Returns the proxy settings for Prisma Cloud Compute containers to access the Int Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/settings/proxy_post.md b/openapi-specs/compute/33-03/desc/settings/proxy_post.md index a1bdc07ed..df926524e 100644 --- a/openapi-specs/compute/33-03/desc/settings/proxy_post.md +++ b/openapi-specs/compute/33-03/desc/settings/proxy_post.md @@ -7,7 +7,7 @@ For more information, see [Proxy Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that specifies the proxy to use to access the Internet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/settings/registry_get.md b/openapi-specs/compute/33-03/desc/settings/registry_get.md index 12745005d..64e70b698 100644 --- a/openapi-specs/compute/33-03/desc/settings/registry_get.md +++ b/openapi-specs/compute/33-03/desc/settings/registry_get.md @@ -17,7 +17,7 @@ Construct the full webhook using the publicly accessible DNS name or IP address, The following cURL command retrieves all the registries to scan and the URL suffix for the registry's webhook URL suffix. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/settings/registry_post.md b/openapi-specs/compute/33-03/desc/settings/registry_post.md index efabf4e67..decf80a65 100644 --- a/openapi-specs/compute/33-03/desc/settings/registry_post.md +++ b/openapi-specs/compute/33-03/desc/settings/registry_post.md @@ -30,7 +30,7 @@ The API response returns an HTTP 400 error if the number of registry specificati Refer to the following example cURL command that configures Prisma Cloud Compute to scan the Ubuntu 16.04 repository on Docker Hub: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -64,7 +64,7 @@ To add settings for a GitLab Container Registry, you must specify the following Refer to the following example cURL command: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/settings/registry_put.md b/openapi-specs/compute/33-03/desc/settings/registry_put.md index 3768914f6..75d6c79a2 100644 --- a/openapi-specs/compute/33-03/desc/settings/registry_put.md +++ b/openapi-specs/compute/33-03/desc/settings/registry_put.md @@ -127,7 +127,7 @@ To remove a registry from the list: To delete all entries, submit an empty `specifications` array. For example: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-03/desc/settings/saml_get.md b/openapi-specs/compute/33-03/desc/settings/saml_get.md index f2228a440..4fb940e80 100644 --- a/openapi-specs/compute/33-03/desc/settings/saml_get.md +++ b/openapi-specs/compute/33-03/desc/settings/saml_get.md @@ -5,7 +5,7 @@ Returns the configured SAML settings that is used to authenticate to the Prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/settings/saml_post.md b/openapi-specs/compute/33-03/desc/settings/saml_post.md index 0bd9c4a25..dfe8d380f 100644 --- a/openapi-specs/compute/33-03/desc/settings/saml_post.md +++ b/openapi-specs/compute/33-03/desc/settings/saml_post.md @@ -7,7 +7,7 @@ For more information, see [Okta via SAML 2.0](https://docs.paloaltonetworks.com/ Refer to the following example cURL request that uses the basic auth to set up and enable the SAML integration with Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/settings/scan_get.md b/openapi-specs/compute/33-03/desc/settings/scan_get.md index 5c1df30a2..543ea7662 100644 --- a/openapi-specs/compute/33-03/desc/settings/scan_get.md +++ b/openapi-specs/compute/33-03/desc/settings/scan_get.md @@ -5,7 +5,7 @@ Returns the global settings for image, host, container, and registry scanning. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/settings/scan_post.md b/openapi-specs/compute/33-03/desc/settings/scan_post.md index f043d1c9f..9ddb521a2 100644 --- a/openapi-specs/compute/33-03/desc/settings/scan_post.md +++ b/openapi-specs/compute/33-03/desc/settings/scan_post.md @@ -9,7 +9,7 @@ Refer to the following example cURL request that configures the following scan i * Scan images, containers, and hosts once per day. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/settings/secrets_get.md b/openapi-specs/compute/33-03/desc/settings/secrets_get.md index 75e2b32c7..339009641 100644 --- a/openapi-specs/compute/33-03/desc/settings/secrets_get.md +++ b/openapi-specs/compute/33-03/desc/settings/secrets_get.md @@ -3,7 +3,7 @@ This endpoint will return configured secret store already configured in the cons The following example curl command retrieves any configured secret stores, as well as the refresh period in hours: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/settings/secrets_post.md b/openapi-specs/compute/33-03/desc/settings/secrets_post.md index d302ecdf8..730d031bf 100644 --- a/openapi-specs/compute/33-03/desc/settings/secrets_post.md +++ b/openapi-specs/compute/33-03/desc/settings/secrets_post.md @@ -5,7 +5,7 @@ Please note the data structure returned from endpoint /settings/secrets GET to s Refer to the following example curl command that adds a CyberArk secret store to the console with the appID set to `Prisma_Cloud_Compute_Console` and set the URL to `https://services-myca.twistlock.com:10882`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/settings/serverless-scan_get.md b/openapi-specs/compute/33-03/desc/settings/serverless-scan_get.md index bb8ce06ba..eb42e4a12 100644 --- a/openapi-specs/compute/33-03/desc/settings/serverless-scan_get.md +++ b/openapi-specs/compute/33-03/desc/settings/serverless-scan_get.md @@ -8,7 +8,7 @@ This endpoint maps to the **Function scope** table data in the **Defend > Vulner Refer to the following example cURL command that retrieves a list of serverless scan scopes: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/settings/serverless_get.md b/openapi-specs/compute/33-03/desc/settings/serverless_get.md index b6122c460..8c654807c 100644 --- a/openapi-specs/compute/33-03/desc/settings/serverless_get.md +++ b/openapi-specs/compute/33-03/desc/settings/serverless_get.md @@ -3,7 +3,7 @@ This endpoint will return any configured serverless function scanners found in * The following example curl command uses basic auth to retrieve serverless settings in an array, sorted by Cloud Provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/settings/serverless_post.md b/openapi-specs/compute/33-03/desc/settings/serverless_post.md index 6e26ea1d3..c0e0f3225 100644 --- a/openapi-specs/compute/33-03/desc/settings/serverless_post.md +++ b/openapi-specs/compute/33-03/desc/settings/serverless_post.md @@ -3,7 +3,7 @@ This endpoint will add serverless function providers to scan for vulnerabilities The following example curl command uses basic auth to add a serverless account to scan for serverless functions. This is assuming that you already have the [credential](https://docs.twistlock.com/docs/latest/configure/credentials_store.html) added to the console that is needed to scan that provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/settings/system_get.md b/openapi-specs/compute/33-03/desc/settings/system_get.md index 6f893abf0..0e8a3cba3 100644 --- a/openapi-specs/compute/33-03/desc/settings/system_get.md +++ b/openapi-specs/compute/33-03/desc/settings/system_get.md @@ -3,7 +3,7 @@ This endpoint will return all system settings in JSON format. The following example curl command does exactly that: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/settings/tas_get.md b/openapi-specs/compute/33-03/desc/settings/tas_get.md index 52f392433..d2d0017f0 100644 --- a/openapi-specs/compute/33-03/desc/settings/tas_get.md +++ b/openapi-specs/compute/33-03/desc/settings/tas_get.md @@ -5,7 +5,7 @@ Retrieves Tanzu Application Service (TAS) settings. Refer to the following example cURL command that retrieves all TAS settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/settings/telemetry_get.md b/openapi-specs/compute/33-03/desc/settings/telemetry_get.md index 6460c3fc3..46a807e77 100644 --- a/openapi-specs/compute/33-03/desc/settings/telemetry_get.md +++ b/openapi-specs/compute/33-03/desc/settings/telemetry_get.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that retrieves the settings if telemetry is enabled or not: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/settings/telemetry_post.md b/openapi-specs/compute/33-03/desc/settings/telemetry_post.md index bc97a6d0f..662846f33 100644 --- a/openapi-specs/compute/33-03/desc/settings/telemetry_post.md +++ b/openapi-specs/compute/33-03/desc/settings/telemetry_post.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to turn off telemetry: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/settings/trusted_certificate_post.md b/openapi-specs/compute/33-03/desc/settings/trusted_certificate_post.md index 5a2a30bda..c54b96fa5 100644 --- a/openapi-specs/compute/33-03/desc/settings/trusted_certificate_post.md +++ b/openapi-specs/compute/33-03/desc/settings/trusted_certificate_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/trusted-certificates` endpoint. Refer to the following example cURL request that uses basic auth to add a certificate to the list: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/33-03/desc/settings/trusted_certificates_post.md b/openapi-specs/compute/33-03/desc/settings/trusted_certificates_post.md index 78c07982b..e9bdc72a1 100644 --- a/openapi-specs/compute/33-03/desc/settings/trusted_certificates_post.md +++ b/openapi-specs/compute/33-03/desc/settings/trusted_certificates_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/certificates` endpoint. Refer to the following example cURL request that uses basic auth to enable this feature: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/33-03/desc/settings/vm_get.md b/openapi-specs/compute/33-03/desc/settings/vm_get.md index 8043742f5..b98b94240 100644 --- a/openapi-specs/compute/33-03/desc/settings/vm_get.md +++ b/openapi-specs/compute/33-03/desc/settings/vm_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **VM images scope** table data in the **Defend > Vulne Refer to the following example cURL command that retrieves all the scopes used for pattern matching on VM functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/signup/post.md b/openapi-specs/compute/33-03/desc/signup/post.md index 1db21df29..67344a0b1 100644 --- a/openapi-specs/compute/33-03/desc/signup/post.md +++ b/openapi-specs/compute/33-03/desc/signup/post.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i The following cURL command creates the initial admin user with the username `admin` and password `password`. ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -X POST \ -d '{"username": "admin", "password": "password"}' \ diff --git a/openapi-specs/compute/33-03/desc/static/capabilities_get.md b/openapi-specs/compute/33-03/desc/static/capabilities_get.md index ea119d2a9..f9b60278c 100644 --- a/openapi-specs/compute/33-03/desc/static/capabilities_get.md +++ b/openapi-specs/compute/33-03/desc/static/capabilities_get.md @@ -1,7 +1,7 @@ Returns a list of capabilities used in host models. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/static/regions_get.md b/openapi-specs/compute/33-03/desc/static/regions_get.md index 4a07097ee..3b1adb5f1 100644 --- a/openapi-specs/compute/33-03/desc/static/regions_get.md +++ b/openapi-specs/compute/33-03/desc/static/regions_get.md @@ -1,7 +1,7 @@ Returns a list of regions used in cloud radar. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/static/syscalls_get.md b/openapi-specs/compute/33-03/desc/static/syscalls_get.md index 9e2ddcde7..09505ba39 100644 --- a/openapi-specs/compute/33-03/desc/static/syscalls_get.md +++ b/openapi-specs/compute/33-03/desc/static/syscalls_get.md @@ -2,7 +2,7 @@ Returns a list of the Linux kernel system calls. Runtime rules for containers can allow-list and deny-list specific system calls. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/static/vulnerabilities_get.md b/openapi-specs/compute/33-03/desc/static/vulnerabilities_get.md index cb6acab28..19809472b 100644 --- a/openapi-specs/compute/33-03/desc/static/vulnerabilities_get.md +++ b/openapi-specs/compute/33-03/desc/static/vulnerabilities_get.md @@ -3,7 +3,7 @@ This data can be used for building out reports with the API. This data can be correlated with the `/api/v1/images` endpoint, specifically the the `complianceVulnerabilities` and `cveVulnerabilities` objects, to generate more thorough reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/stats/compliance.md b/openapi-specs/compute/33-03/desc/stats/compliance.md index 5c5be3991..4f4c90071 100644 --- a/openapi-specs/compute/33-03/desc/stats/compliance.md +++ b/openapi-specs/compute/33-03/desc/stats/compliance.md @@ -5,7 +5,7 @@ For the current day, the response will also include detailed compliance stats fo The following example command that uses curl and basic auth to retrieve compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/stats/compliance_get.md b/openapi-specs/compute/33-03/desc/stats/compliance_get.md index 314f6a179..2ef2f9f75 100644 --- a/openapi-specs/compute/33-03/desc/stats/compliance_get.md +++ b/openapi-specs/compute/33-03/desc/stats/compliance_get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Compliance > Compliance explorer* Refer to the following example cURL command that retrieves compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/stats/compliance_refresh.md b/openapi-specs/compute/33-03/desc/stats/compliance_refresh.md index b75491a69..d8ce211a8 100644 --- a/openapi-specs/compute/33-03/desc/stats/compliance_refresh.md +++ b/openapi-specs/compute/33-03/desc/stats/compliance_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/compliance endpoint return The following example command that uses curl and basic auth to refresh compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/stats/compliance_refresh_post.md b/openapi-specs/compute/33-03/desc/stats/compliance_refresh_post.md index 541a54d16..0f329d1db 100644 --- a/openapi-specs/compute/33-03/desc/stats/compliance_refresh_post.md +++ b/openapi-specs/compute/33-03/desc/stats/compliance_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/compliance`, b Refer to the following example cURL command that refreshes compliance statistics for the current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/stats/daily.md b/openapi-specs/compute/33-03/desc/stats/daily.md index 082f58a27..9fd4c6138 100644 --- a/openapi-specs/compute/33-03/desc/stats/daily.md +++ b/openapi-specs/compute/33-03/desc/stats/daily.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/stats/daily_get.md b/openapi-specs/compute/33-03/desc/stats/daily_get.md index 0db89bdc3..fe852126c 100644 --- a/openapi-specs/compute/33-03/desc/stats/daily_get.md +++ b/openapi-specs/compute/33-03/desc/stats/daily_get.md @@ -3,7 +3,7 @@ Returns a historical list of per-day statistics for the resources protected by P The following example command uses curl and basic auth to retrieve the daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/stats/dashboard.md b/openapi-specs/compute/33-03/desc/stats/dashboard.md index be90a2d32..1e5fabf08 100644 --- a/openapi-specs/compute/33-03/desc/stats/dashboard.md +++ b/openapi-specs/compute/33-03/desc/stats/dashboard.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/stats/dashboard_get.md b/openapi-specs/compute/33-03/desc/stats/dashboard_get.md index 601769645..8f0bc827c 100644 --- a/openapi-specs/compute/33-03/desc/stats/dashboard_get.md +++ b/openapi-specs/compute/33-03/desc/stats/dashboard_get.md @@ -5,7 +5,7 @@ Returns statistics about the resources protected by Prisma Cloud Compute, includ Refer to the following example cURL command that retrieves dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/stats/events_get.md b/openapi-specs/compute/33-03/desc/stats/events_get.md index 3be5eb4e7..e64f98e57 100644 --- a/openapi-specs/compute/33-03/desc/stats/events_get.md +++ b/openapi-specs/compute/33-03/desc/stats/events_get.md @@ -5,7 +5,7 @@ Returns events statistics for your environment. Refer to the following example cURL command retrieves event stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/stats/vulnerabilities.md b/openapi-specs/compute/33-03/desc/stats/vulnerabilities.md index 40c4dd1f1..199cfab62 100644 --- a/openapi-specs/compute/33-03/desc/stats/vulnerabilities.md +++ b/openapi-specs/compute/33-03/desc/stats/vulnerabilities.md @@ -5,7 +5,7 @@ For the current day, the response will also include descriptions of the CVEs cur The following example command that uses curl and basic auth to retrieve vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/stats/vulnerabilities_download_get.md b/openapi-specs/compute/33-03/desc/stats/vulnerabilities_download_get.md index 753af8c7f..9930a636b 100644 --- a/openapi-specs/compute/33-03/desc/stats/vulnerabilities_download_get.md +++ b/openapi-specs/compute/33-03/desc/stats/vulnerabilities_download_get.md @@ -17,7 +17,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a summary count of the CVEs and detailed descriptions for each CVE in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/stats/vulnerabilities_get.md b/openapi-specs/compute/33-03/desc/stats/vulnerabilities_get.md index 2fe5d4e18..978e96cfe 100644 --- a/openapi-specs/compute/33-03/desc/stats/vulnerabilities_get.md +++ b/openapi-specs/compute/33-03/desc/stats/vulnerabilities_get.md @@ -20,7 +20,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a summary count of the CVEs and detailed descriptions for each CVE: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/stats/vulnerabilities_impacted_resources_download_get.md b/openapi-specs/compute/33-03/desc/stats/vulnerabilities_impacted_resources_download_get.md index 0821d6a9f..502c09a6c 100644 --- a/openapi-specs/compute/33-03/desc/stats/vulnerabilities_impacted_resources_download_get.md +++ b/openapi-specs/compute/33-03/desc/stats/vulnerabilities_impacted_resources_download_get.md @@ -15,7 +15,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a list of impacted resources for `CVE-2015-0313` in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/stats/vulnerabilities_impacted_resources_get.md b/openapi-specs/compute/33-03/desc/stats/vulnerabilities_impacted_resources_get.md index c1e6d0ba2..014a5f4a2 100644 --- a/openapi-specs/compute/33-03/desc/stats/vulnerabilities_impacted_resources_get.md +++ b/openapi-specs/compute/33-03/desc/stats/vulnerabilities_impacted_resources_get.md @@ -18,7 +18,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a list of impacted resources for `CVE-2022-28391`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -95,7 +95,7 @@ Refer to the following example JSON response that shows the risk tree for the im Refer to the following example cURL command that retrieves a the impacted registry images `CVE-2015-0313` by using an optional query parameter `resourceType`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -108,7 +108,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a paginated list of impacted resources for `CVE-2015-0313` by using optional query parameters `limit` and `offset`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/stats/vulnerabilities_refresh.md b/openapi-specs/compute/33-03/desc/stats/vulnerabilities_refresh.md index 505a99d98..2aa7da8a1 100644 --- a/openapi-specs/compute/33-03/desc/stats/vulnerabilities_refresh.md +++ b/openapi-specs/compute/33-03/desc/stats/vulnerabilities_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/vulnerabilities endpoint r The following example command that uses curl and basic auth to refresh vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/stats/vulnerabilities_refresh_post.md b/openapi-specs/compute/33-03/desc/stats/vulnerabilities_refresh_post.md index 1e3210e18..85e3ddd7a 100644 --- a/openapi-specs/compute/33-03/desc/stats/vulnerabilities_refresh_post.md +++ b/openapi-specs/compute/33-03/desc/stats/vulnerabilities_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/vulnerabilitie Refer to the following example cURL command that refreshes the vulnerability statistics for current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/stats/workload_get.md b/openapi-specs/compute/33-03/desc/stats/workload_get.md index a25deed5c..940a835ee 100644 --- a/openapi-specs/compute/33-03/desc/stats/workload_get.md +++ b/openapi-specs/compute/33-03/desc/stats/workload_get.md @@ -1,7 +1,7 @@ Returns the workload statistics from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/statuses/intelligence.md b/openapi-specs/compute/33-03/desc/statuses/intelligence.md index 74da8c7ff..ac102e81f 100644 --- a/openapi-specs/compute/33-03/desc/statuses/intelligence.md +++ b/openapi-specs/compute/33-03/desc/statuses/intelligence.md @@ -3,7 +3,7 @@ Returns the connection status of the intelligence stream and the last intelligen The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/statuses/intelligence_get.md b/openapi-specs/compute/33-03/desc/statuses/intelligence_get.md index c18dd9611..b5f620ad9 100644 --- a/openapi-specs/compute/33-03/desc/statuses/intelligence_get.md +++ b/openapi-specs/compute/33-03/desc/statuses/intelligence_get.md @@ -3,7 +3,7 @@ Returns the connection status for the Intelligence Stream, along with the time o The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/statuses/registry_get.md b/openapi-specs/compute/33-03/desc/statuses/registry_get.md index 427c4915c..e4fd09fe9 100644 --- a/openapi-specs/compute/33-03/desc/statuses/registry_get.md +++ b/openapi-specs/compute/33-03/desc/statuses/registry_get.md @@ -13,7 +13,7 @@ To view the more details about the progress of a regular or on-demand registry s Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/statuses/secrets_get.md b/openapi-specs/compute/33-03/desc/statuses/secrets_get.md index 510f15161..e77c5ed70 100644 --- a/openapi-specs/compute/33-03/desc/statuses/secrets_get.md +++ b/openapi-specs/compute/33-03/desc/statuses/secrets_get.md @@ -3,7 +3,7 @@ Returns the connection status of any secret stores you have configured, as well The following is an example curl using basic auth to find the secret store status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/statuses/serverless-radar_get.md b/openapi-specs/compute/33-03/desc/statuses/serverless-radar_get.md index 3bfdbb5bf..4ab5d0c1d 100644 --- a/openapi-specs/compute/33-03/desc/statuses/serverless-radar_get.md +++ b/openapi-specs/compute/33-03/desc/statuses/serverless-radar_get.md @@ -1,7 +1,7 @@ Returns the status of the serverless scans. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/tags/get.md b/openapi-specs/compute/33-03/desc/tags/get.md index 6da7ad135..604eee98e 100644 --- a/openapi-specs/compute/33-03/desc/tags/get.md +++ b/openapi-specs/compute/33-03/desc/tags/get.md @@ -5,7 +5,7 @@ Retrieves a list of tags. Refer to the following example cURL command that retrieves a list of tags: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/tags/name_delete.md b/openapi-specs/compute/33-03/desc/tags/name_delete.md index 2ed010e57..6dedfce8f 100644 --- a/openapi-specs/compute/33-03/desc/tags/name_delete.md +++ b/openapi-specs/compute/33-03/desc/tags/name_delete.md @@ -5,7 +5,7 @@ Deletes a tag from the system. Refer to the following example cURL command that deletes a tag named *my tag*: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-03/desc/tags/name_put.md b/openapi-specs/compute/33-03/desc/tags/name_put.md index cbaea40d3..a5923b8ef 100644 --- a/openapi-specs/compute/33-03/desc/tags/name_put.md +++ b/openapi-specs/compute/33-03/desc/tags/name_put.md @@ -9,7 +9,7 @@ You must define all parameters in your PUT request. Refer to the following example cURL command that updates the parameters in a tag named `my_tag`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-03/desc/tags/post.md b/openapi-specs/compute/33-03/desc/tags/post.md index d55ae8b96..8e1a493d6 100644 --- a/openapi-specs/compute/33-03/desc/tags/post.md +++ b/openapi-specs/compute/33-03/desc/tags/post.md @@ -8,7 +8,7 @@ You can use tags as policy exceptions or assign them to vulnerabilities for acti Refer to the following example cURL command that creates a tag named "my-tag": ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/tags/tag_cve_delete.md b/openapi-specs/compute/33-03/desc/tags/tag_cve_delete.md index 8caed79cf..3031029b9 100644 --- a/openapi-specs/compute/33-03/desc/tags/tag_cve_delete.md +++ b/openapi-specs/compute/33-03/desc/tags/tag_cve_delete.md @@ -6,7 +6,7 @@ When you delete a tag, the tag is deleted from a wider scope. All the packages a Refer to the following example cURL command that removes the tag named `ignored` from the CVE `CVE-2017-15088`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-03/desc/tags/tag_cve_post.md b/openapi-specs/compute/33-03/desc/tags/tag_cve_post.md index 966a80bd8..1b4ead89b 100644 --- a/openapi-specs/compute/33-03/desc/tags/tag_cve_post.md +++ b/openapi-specs/compute/33-03/desc/tags/tag_cve_post.md @@ -45,7 +45,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the source package `perl`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -72,7 +72,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2021-20305` on the binary package `gnutls`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -98,7 +98,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -120,7 +120,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `image` and to all the packages and resources. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -140,7 +140,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `host`, resource `servo-vmware71`, and to all the packages. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/tas-droplets/download_get.md b/openapi-specs/compute/33-03/desc/tas-droplets/download_get.md index db92ec66a..7fdd6e259 100644 --- a/openapi-specs/compute/33-03/desc/tas-droplets/download_get.md +++ b/openapi-specs/compute/33-03/desc/tas-droplets/download_get.md @@ -9,7 +9,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo The following cURL command downloads all TAS droplets to a CSV file called `tas_droplets.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/tas-droplets/get.md b/openapi-specs/compute/33-03/desc/tas-droplets/get.md index d820517c2..ce07f8527 100644 --- a/openapi-specs/compute/33-03/desc/tas-droplets/get.md +++ b/openapi-specs/compute/33-03/desc/tas-droplets/get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > VMware Tanzu bl The following cURL command retrieves all TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/tas-droplets/get_tas_addresses.md b/openapi-specs/compute/33-03/desc/tas-droplets/get_tas_addresses.md index 528281613..8333cd24f 100644 --- a/openapi-specs/compute/33-03/desc/tas-droplets/get_tas_addresses.md +++ b/openapi-specs/compute/33-03/desc/tas-droplets/get_tas_addresses.md @@ -9,7 +9,7 @@ Gets the Cloud Controller Addresses of scanned Tanzu Application Service (TAS) d The following cURL command retrieves the Cloud Controller Addresses of scanned TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/tas-droplets/progress_get.md b/openapi-specs/compute/33-03/desc/tas-droplets/progress_get.md index 504a21e84..507d001bf 100644 --- a/openapi-specs/compute/33-03/desc/tas-droplets/progress_get.md +++ b/openapi-specs/compute/33-03/desc/tas-droplets/progress_get.md @@ -5,7 +5,7 @@ Returns the details of the TAS Droplets ongoing scan. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/tas-droplets/scan_post.md b/openapi-specs/compute/33-03/desc/tas-droplets/scan_post.md index aad2174af..13c4eeeb9 100644 --- a/openapi-specs/compute/33-03/desc/tas-droplets/scan_post.md +++ b/openapi-specs/compute/33-03/desc/tas-droplets/scan_post.md @@ -5,7 +5,7 @@ Scans the TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/tas-droplets/stop_post.md b/openapi-specs/compute/33-03/desc/tas-droplets/stop_post.md index 5f5a019b1..53d709ec7 100644 --- a/openapi-specs/compute/33-03/desc/tas-droplets/stop_post.md +++ b/openapi-specs/compute/33-03/desc/tas-droplets/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing scan of TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/trust/data_get.md b/openapi-specs/compute/33-03/desc/trust/data_get.md index dd55d47a3..88983f139 100644 --- a/openapi-specs/compute/33-03/desc/trust/data_get.md +++ b/openapi-specs/compute/33-03/desc/trust/data_get.md @@ -5,7 +5,7 @@ Returns the trusted registries, repositories, and images. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/trust/data_put.md b/openapi-specs/compute/33-03/desc/trust/data_put.md index 0e6a0ba49..733514505 100644 --- a/openapi-specs/compute/33-03/desc/trust/data_put.md +++ b/openapi-specs/compute/33-03/desc/trust/data_put.md @@ -6,7 +6,7 @@ Specify trusted images using either the image name or layers properties. Refer to the following example cURL command that uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -19,7 +19,7 @@ To edit a trust group based on image base layers, use PUT to specify a list of S Refer to the following example that specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-03/desc/trust/get.md b/openapi-specs/compute/33-03/desc/trust/get.md index 1226cd0a3..57ff5bdb5 100644 --- a/openapi-specs/compute/33-03/desc/trust/get.md +++ b/openapi-specs/compute/33-03/desc/trust/get.md @@ -3,7 +3,7 @@ Retrieves a list of all trusted images. The following example curl command uses basic auth to retrieve all trusted images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/trust/id_delete.md b/openapi-specs/compute/33-03/desc/trust/id_delete.md index b3114775f..d63cdf71a 100644 --- a/openapi-specs/compute/33-03/desc/trust/id_delete.md +++ b/openapi-specs/compute/33-03/desc/trust/id_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to specify a image trust grou ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-03/desc/trust/id_put.md b/openapi-specs/compute/33-03/desc/trust/id_put.md index 44d2c8b8b..c98617bcd 100644 --- a/openapi-specs/compute/33-03/desc/trust/id_put.md +++ b/openapi-specs/compute/33-03/desc/trust/id_put.md @@ -9,7 +9,7 @@ For more information about handles, see the `_id` in the response body for the G The following example curl command uses basic auth to modify the image property for an existing trusted image entry, where the handle for the entry is `docker-ubuntu-group`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/33-03/desc/trust/learn_get.md b/openapi-specs/compute/33-03/desc/trust/learn_get.md index d8a3414d0..004b16b02 100644 --- a/openapi-specs/compute/33-03/desc/trust/learn_get.md +++ b/openapi-specs/compute/33-03/desc/trust/learn_get.md @@ -1,7 +1,7 @@ Returns the state of the trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/trust/learn_post.md b/openapi-specs/compute/33-03/desc/trust/learn_post.md index 094817738..008657fa2 100644 --- a/openapi-specs/compute/33-03/desc/trust/learn_post.md +++ b/openapi-specs/compute/33-03/desc/trust/learn_post.md @@ -1,7 +1,7 @@ Sets the state of trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/trust/post.md b/openapi-specs/compute/33-03/desc/trust/post.md index 1072275a1..23a324c6c 100644 --- a/openapi-specs/compute/33-03/desc/trust/post.md +++ b/openapi-specs/compute/33-03/desc/trust/post.md @@ -7,7 +7,7 @@ For more information about handles, see the `_id` key in the response body for t The following example curl command uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ To create a trust group based on image base layers, POST a list of SHA256 hashes The following example specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/users/get.md b/openapi-specs/compute/33-03/desc/users/get.md index e4e6966ec..cd5a661ba 100644 --- a/openapi-specs/compute/33-03/desc/users/get.md +++ b/openapi-specs/compute/33-03/desc/users/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Manage > Authentication > Users** in the Console UI. The following cURL command retrieves all users. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/users/id_delete.md b/openapi-specs/compute/33-03/desc/users/id_delete.md index 1cfa5642d..66a1102f9 100644 --- a/openapi-specs/compute/33-03/desc/users/id_delete.md +++ b/openapi-specs/compute/33-03/desc/users/id_delete.md @@ -17,7 +17,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes user `ID` from the system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/33-03/desc/util/osx_twistcli_arm64_get.md b/openapi-specs/compute/33-03/desc/util/osx_twistcli_arm64_get.md index b385d0d3b..a30686374 100644 --- a/openapi-specs/compute/33-03/desc/util/osx_twistcli_arm64_get.md +++ b/openapi-specs/compute/33-03/desc/util/osx_twistcli_arm64_get.md @@ -7,7 +7,7 @@ Downloads the twistcli binary executable for MacOS platforms based on ARM64 arch Refer to the following example cURL command that downloads and saves the “twistcli” binary executable for ARM64 bit MacOS platforms to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/compute/33-03/desc/util/osx_twistcli_get.md b/openapi-specs/compute/33-03/desc/util/osx_twistcli_get.md index c49f96c41..2353ea338 100644 --- a/openapi-specs/compute/33-03/desc/util/osx_twistcli_get.md +++ b/openapi-specs/compute/33-03/desc/util/osx_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **MacOS platform** hyperlink in **Manage > System > Ut The following cURL command downloads the twistcli binary executable for MacOS platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli \ diff --git a/openapi-specs/compute/33-03/desc/util/twistcli_arm64_get.md b/openapi-specs/compute/33-03/desc/util/twistcli_arm64_get.md index 7ec36d3f5..a3d7318ab 100644 --- a/openapi-specs/compute/33-03/desc/util/twistcli_arm64_get.md +++ b/openapi-specs/compute/33-03/desc/util/twistcli_arm64_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/compute/33-03/desc/util/twistcli_get.md b/openapi-specs/compute/33-03/desc/util/twistcli_get.md index f9d2d295c..08a3ae8aa 100644 --- a/openapi-specs/compute/33-03/desc/util/twistcli_get.md +++ b/openapi-specs/compute/33-03/desc/util/twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -X GET -o \ 'https:///api/v/util/twistcli' diff --git a/openapi-specs/compute/33-03/desc/util/twistlock_jenkins_plugin_get.md b/openapi-specs/compute/33-03/desc/util/twistlock_jenkins_plugin_get.md index 9fb8d4a02..c9f180e5e 100644 --- a/openapi-specs/compute/33-03/desc/util/twistlock_jenkins_plugin_get.md +++ b/openapi-specs/compute/33-03/desc/util/twistlock_jenkins_plugin_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-jenkins-plugin.hpi \ diff --git a/openapi-specs/compute/33-03/desc/util/twistlock_tas_tile_get.md b/openapi-specs/compute/33-03/desc/util/twistlock_tas_tile_get.md index fea28aaad..3fd114e2d 100644 --- a/openapi-specs/compute/33-03/desc/util/twistlock_tas_tile_get.md +++ b/openapi-specs/compute/33-03/desc/util/twistlock_tas_tile_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-tile.pivotal \ diff --git a/openapi-specs/compute/33-03/desc/util/windows_twistcli_get.md b/openapi-specs/compute/33-03/desc/util/windows_twistcli_get.md index 1c545dbbb..38c609b08 100644 --- a/openapi-specs/compute/33-03/desc/util/windows_twistcli_get.md +++ b/openapi-specs/compute/33-03/desc/util/windows_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Windows platform** hyperlink in **Manage > System > The following cURL command downloads the twistcli binary executable for Windows platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli.exe \ diff --git a/openapi-specs/compute/33-03/desc/version/get.md b/openapi-specs/compute/33-03/desc/version/get.md index 28be315e0..5787e90fd 100644 --- a/openapi-specs/compute/33-03/desc/version/get.md +++ b/openapi-specs/compute/33-03/desc/version/get.md @@ -5,7 +5,7 @@ Retrieves the version number for Console. The following cURL command retrieves the version number for Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/vms/download_get.md b/openapi-specs/compute/33-03/desc/vms/download_get.md index e65e4efc9..3cc813bc5 100644 --- a/openapi-specs/compute/33-03/desc/vms/download_get.md +++ b/openapi-specs/compute/33-03/desc/vms/download_get.md @@ -7,7 +7,7 @@ Returns all VM image scan reports in CSV format. Refer to the following example cURL command that retrieves all VM image scan reports and saves the results in a CSV file called `vm_images_scan.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/vms/get.md b/openapi-specs/compute/33-03/desc/vms/get.md index e78a28c76..03ed8deb3 100644 --- a/openapi-specs/compute/33-03/desc/vms/get.md +++ b/openapi-specs/compute/33-03/desc/vms/get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > Hosts > VM imag Refer to the following example cURL command that retrieves all VM image scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/vms/labels_get.md b/openapi-specs/compute/33-03/desc/vms/labels_get.md index 0aed1a217..f509da479 100644 --- a/openapi-specs/compute/33-03/desc/vms/labels_get.md +++ b/openapi-specs/compute/33-03/desc/vms/labels_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/33-03/desc/vms/names_get.md b/openapi-specs/compute/33-03/desc/vms/names_get.md index 1145cfa0d..9f92e0156 100644 --- a/openapi-specs/compute/33-03/desc/vms/names_get.md +++ b/openapi-specs/compute/33-03/desc/vms/names_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/33-03/desc/vms/scan_post.md b/openapi-specs/compute/33-03/desc/vms/scan_post.md index 1caa2dcaf..4d4de3ab1 100644 --- a/openapi-specs/compute/33-03/desc/vms/scan_post.md +++ b/openapi-specs/compute/33-03/desc/vms/scan_post.md @@ -5,7 +5,7 @@ Re-scans all VM images immediately. This endpoint returns the time that the scan Refer to the following example cURL command that forces Prisma Cloud to re-scan all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/33-03/desc/vms/stop_post.md b/openapi-specs/compute/33-03/desc/vms/stop_post.md index 4a74743eb..49b2b26f9 100644 --- a/openapi-specs/compute/33-03/desc/vms/stop_post.md +++ b/openapi-specs/compute/33-03/desc/vms/stop_post.md @@ -7,7 +7,7 @@ Note: It might take a few minutes for the scan to stop completely. Refer to the following example cURL command that forces Prisma Cloud to stop scanning all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/SCAP/get.md b/openapi-specs/compute/34-00/desc/SCAP/get.md index a25abe94e..f5870d822 100644 --- a/openapi-specs/compute/34-00/desc/SCAP/get.md +++ b/openapi-specs/compute/34-00/desc/SCAP/get.md @@ -3,7 +3,7 @@ This endpoint will return any SCAP datastreams uploaded to the console. This end The following is an example curl command that uses basic auth to retrieve any uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/SCAP/id_delete.md b/openapi-specs/compute/34-00/desc/SCAP/id_delete.md index 39f1b0132..52923f20a 100644 --- a/openapi-specs/compute/34-00/desc/SCAP/id_delete.md +++ b/openapi-specs/compute/34-00/desc/SCAP/id_delete.md @@ -3,7 +3,7 @@ This endpoint will delete any SCAP datastreams uploaded to the console. You can The following is an example curl command that uses basic auth to delete an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-00/desc/SCAP/post.md b/openapi-specs/compute/34-00/desc/SCAP/post.md index d459a0e97..c45fd6b4e 100644 --- a/openapi-specs/compute/34-00/desc/SCAP/post.md +++ b/openapi-specs/compute/34-00/desc/SCAP/post.md @@ -3,7 +3,7 @@ This endpoint will allow you to add a SCAP datastream to the console. The following is an example curl command that uses basic auth to add an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/_ping/get.md b/openapi-specs/compute/34-00/desc/_ping/get.md index 8e143ef67..b7ffdc653 100644 --- a/openapi-specs/compute/34-00/desc/_ping/get.md +++ b/openapi-specs/compute/34-00/desc/_ping/get.md @@ -5,7 +5,7 @@ Checks if Console is reachable from your network host. Refer to the following cURL example command that pings Console and prints the HTTP response code: ```bash -$ curl -k \ +$ curl \ -s \ -o /dev/null \ -w "%{http_code}\n" \ diff --git a/openapi-specs/compute/34-00/desc/agentless/get_agentless_progress.md b/openapi-specs/compute/34-00/desc/agentless/get_agentless_progress.md index b98ed9da5..78396eec6 100644 --- a/openapi-specs/compute/34-00/desc/agentless/get_agentless_progress.md +++ b/openapi-specs/compute/34-00/desc/agentless/get_agentless_progress.md @@ -5,7 +5,7 @@ Shows the progress of an ongoing scan on hosts or containers for vulnerabilities Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/agentless/post_agentless_scan.md b/openapi-specs/compute/34-00/desc/agentless/post_agentless_scan.md index f1295cdc4..e2f8a4e11 100644 --- a/openapi-specs/compute/34-00/desc/agentless/post_agentless_scan.md +++ b/openapi-specs/compute/34-00/desc/agentless/post_agentless_scan.md @@ -9,7 +9,7 @@ Make sure that you download (use the agentless/templates API) and apply the perm Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/agentless/post_agentless_stop.md b/openapi-specs/compute/34-00/desc/agentless/post_agentless_stop.md index ab83960cc..ddee6ec7a 100644 --- a/openapi-specs/compute/34-00/desc/agentless/post_agentless_stop.md +++ b/openapi-specs/compute/34-00/desc/agentless/post_agentless_stop.md @@ -5,7 +5,7 @@ Stops an ongoing scan on hosts or containers for vulnerabilities and compliance. Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/agentless/post_agentless_templates.md b/openapi-specs/compute/34-00/desc/agentless/post_agentless_templates.md index 96be32555..5159c439a 100644 --- a/openapi-specs/compute/34-00/desc/agentless/post_agentless_templates.md +++ b/openapi-specs/compute/34-00/desc/agentless/post_agentless_templates.md @@ -31,7 +31,7 @@ Add the supported cloud accounts (AWS, Azure, GCP, and OCI) in Prisma Cloud Comp Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/alert-profiles/get.md b/openapi-specs/compute/34-00/desc/alert-profiles/get.md index 82647e248..f17191ac4 100644 --- a/openapi-specs/compute/34-00/desc/alert-profiles/get.md +++ b/openapi-specs/compute/34-00/desc/alert-profiles/get.md @@ -3,7 +3,7 @@ Retrieve a list of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/alert-profiles/id_delete.md b/openapi-specs/compute/34-00/desc/alert-profiles/id_delete.md index 1a67fe20e..2cf21b57e 100644 --- a/openapi-specs/compute/34-00/desc/alert-profiles/id_delete.md +++ b/openapi-specs/compute/34-00/desc/alert-profiles/id_delete.md @@ -5,7 +5,7 @@ This method has no response data. The following example curl command deletes an existing alert profile named `PROFILE-NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-00/desc/alert-profiles/names_get.md b/openapi-specs/compute/34-00/desc/alert-profiles/names_get.md index cac14437b..38a1f78ca 100644 --- a/openapi-specs/compute/34-00/desc/alert-profiles/names_get.md +++ b/openapi-specs/compute/34-00/desc/alert-profiles/names_get.md @@ -3,7 +3,7 @@ Retrieve a list of only the names of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles' names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/alert-profiles/post.md b/openapi-specs/compute/34-00/desc/alert-profiles/post.md index 9fa643429..19db863d5 100644 --- a/openapi-specs/compute/34-00/desc/alert-profiles/post.md +++ b/openapi-specs/compute/34-00/desc/alert-profiles/post.md @@ -3,7 +3,7 @@ Update an existing alert profile created in the system. The following example curl command uses basic auth to add a Jira Alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/alert-profiles/test_post.md b/openapi-specs/compute/34-00/desc/alert-profiles/test_post.md index 1fc745efa..2205a6e73 100644 --- a/openapi-specs/compute/34-00/desc/alert-profiles/test_post.md +++ b/openapi-specs/compute/34-00/desc/alert-profiles/test_post.md @@ -3,7 +3,7 @@ Sends a test alert to verify successful configuration of the alert profile setti The following example curl command uses basic auth to send test alert for an email alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/application-control/get.md b/openapi-specs/compute/34-00/desc/application-control/get.md index 5bd600beb..535584284 100644 --- a/openapi-specs/compute/34-00/desc/application-control/get.md +++ b/openapi-specs/compute/34-00/desc/application-control/get.md @@ -3,7 +3,7 @@ Retrieves the host application control rules. The following example curl command uses basic auth to retrieve the control rules: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/access_delete.md b/openapi-specs/compute/34-00/desc/audits/access_delete.md index 37f33ca64..0450b534c 100644 --- a/openapi-specs/compute/34-00/desc/audits/access_delete.md +++ b/openapi-specs/compute/34-00/desc/audits/access_delete.md @@ -2,7 +2,7 @@ Deletes **all** access audits. This deletion cannot be undone. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-00/desc/audits/access_download_get.md b/openapi-specs/compute/34-00/desc/audits/access_download_get.md index 1700deb8d..8d8fee259 100644 --- a/openapi-specs/compute/34-00/desc/audits/access_download_get.md +++ b/openapi-specs/compute/34-00/desc/audits/access_download_get.md @@ -3,7 +3,7 @@ Returns the docker access audit events data in CSV format that are logged and ag **Note**: You can download the access events from Console under **Monitor > Events > Docker audits > Download CSV**. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/access_filters_get.md b/openapi-specs/compute/34-00/desc/audits/access_filters_get.md index 00ac061c1..4b8e9cd9b 100644 --- a/openapi-specs/compute/34-00/desc/audits/access_filters_get.md +++ b/openapi-specs/compute/34-00/desc/audits/access_filters_get.md @@ -5,7 +5,7 @@ The following example uses basic auth to list history of commands that are run o ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ The following command gives list of sudo events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -27,7 +27,7 @@ $ curl -k \ The following command gives list of SSHD events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/access_get.md b/openapi-specs/compute/34-00/desc/audits/access_get.md index 2401391c7..56e53fe12 100644 --- a/openapi-specs/compute/34-00/desc/audits/access_get.md +++ b/openapi-specs/compute/34-00/desc/audits/access_get.md @@ -8,7 +8,7 @@ You can configure Prisma Cloud Compute to log and aggregate events such as sudo Refer to the following example cURL command that gives a list of all access audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/admission_download_get.md b/openapi-specs/compute/34-00/desc/audits/admission_download_get.md index 9571c483f..d45f47c4e 100644 --- a/openapi-specs/compute/34-00/desc/audits/admission_download_get.md +++ b/openapi-specs/compute/34-00/desc/audits/admission_download_get.md @@ -4,7 +4,7 @@ Returns the access admission events data in CSV format that were alerted or bloc Refer to the following example cURL command that downloads the admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/admission_get.md b/openapi-specs/compute/34-00/desc/audits/admission_get.md index 84414496c..3640c737c 100644 --- a/openapi-specs/compute/34-00/desc/audits/admission_get.md +++ b/openapi-specs/compute/34-00/desc/audits/admission_get.md @@ -4,7 +4,7 @@ Returns all activities that were alerted or blocked by Defender functioning as O Refer to the following example cURL command that gives a list of all admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/firewall_network_container_download_get.md b/openapi-specs/compute/34-00/desc/audits/firewall_network_container_download_get.md index 29029ac6d..434e09acd 100644 --- a/openapi-specs/compute/34-00/desc/audits/firewall_network_container_download_get.md +++ b/openapi-specs/compute/34-00/desc/audits/firewall_network_container_download_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/firewall_network_container_get.md b/openapi-specs/compute/34-00/desc/audits/firewall_network_container_get.md index 454558a44..be03b2c45 100644 --- a/openapi-specs/compute/34-00/desc/audits/firewall_network_container_get.md +++ b/openapi-specs/compute/34-00/desc/audits/firewall_network_container_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/firewall_network_host_download_get.md b/openapi-specs/compute/34-00/desc/audits/firewall_network_host_download_get.md index 768dd00d7..e83e8e1c3 100644 --- a/openapi-specs/compute/34-00/desc/audits/firewall_network_host_download_get.md +++ b/openapi-specs/compute/34-00/desc/audits/firewall_network_host_download_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/firewall_network_host_get.md b/openapi-specs/compute/34-00/desc/audits/firewall_network_host_get.md index e5dc4c399..6cbda0d4b 100644 --- a/openapi-specs/compute/34-00/desc/audits/firewall_network_host_get.md +++ b/openapi-specs/compute/34-00/desc/audits/firewall_network_host_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/incidents_archive_patch.md b/openapi-specs/compute/34-00/desc/audits/incidents_archive_patch.md index a1127a001..d1f42eedd 100644 --- a/openapi-specs/compute/34-00/desc/audits/incidents_archive_patch.md +++ b/openapi-specs/compute/34-00/desc/audits/incidents_archive_patch.md @@ -7,7 +7,7 @@ You can get an incident ID from the list of incidents using the endpoint GET /ap Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/compute/34-00/desc/audits/incidents_download_get.md b/openapi-specs/compute/34-00/desc/audits/incidents_download_get.md index 2266c3471..5958756bf 100644 --- a/openapi-specs/compute/34-00/desc/audits/incidents_download_get.md +++ b/openapi-specs/compute/34-00/desc/audits/incidents_download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the **CSV** hyperlink in **Monitor > Runtime > Incident ex The following cURL command downloads all incidents and saves the result in a CSV file called `incidents.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/incidents_filters_get.md b/openapi-specs/compute/34-00/desc/audits/incidents_filters_get.md index 7d1c6f303..856881c90 100644 --- a/openapi-specs/compute/34-00/desc/audits/incidents_filters_get.md +++ b/openapi-specs/compute/34-00/desc/audits/incidents_filters_get.md @@ -3,7 +3,7 @@ This endpoint lists the incident categories found in your environment. The following example lists incident filters. ```bash -$ curl -k \ +$ curl \ -u \ https://console:8083/api/v1/audits/incidents/filters ``` diff --git a/openapi-specs/compute/34-00/desc/audits/incidents_get.md b/openapi-specs/compute/34-00/desc/audits/incidents_get.md index 7724a08c1..9b9451821 100644 --- a/openapi-specs/compute/34-00/desc/audits/incidents_get.md +++ b/openapi-specs/compute/34-00/desc/audits/incidents_get.md @@ -9,7 +9,7 @@ This endpoint maps to the table in **Monitor > Runtime > Incident explorer** in Refer to the following example cURL command that retrieves a list of unacknowledged incidents (not in the archived state): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/kubernetes_download_get.md b/openapi-specs/compute/34-00/desc/audits/kubernetes_download_get.md index 6008bd92a..62992095c 100644 --- a/openapi-specs/compute/34-00/desc/audits/kubernetes_download_get.md +++ b/openapi-specs/compute/34-00/desc/audits/kubernetes_download_get.md @@ -7,7 +7,7 @@ Returns the audit events data that occur in an integrated Kubernetes cluster tha Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/kubernetes_get.md b/openapi-specs/compute/34-00/desc/audits/kubernetes_get.md index e1ecb8a88..2e3f51b71 100644 --- a/openapi-specs/compute/34-00/desc/audits/kubernetes_get.md +++ b/openapi-specs/compute/34-00/desc/audits/kubernetes_get.md @@ -7,7 +7,7 @@ Retrieves events that occur in an integrated Kubernetes cluster that you configu Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/mgmt_download_get.md b/openapi-specs/compute/34-00/desc/audits/mgmt_download_get.md index ae3ef45b6..bcee17342 100644 --- a/openapi-specs/compute/34-00/desc/audits/mgmt_download_get.md +++ b/openapi-specs/compute/34-00/desc/audits/mgmt_download_get.md @@ -10,7 +10,7 @@ Management audits are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/mgmt_filters_get.md b/openapi-specs/compute/34-00/desc/audits/mgmt_filters_get.md index 854977b99..f910a4c2a 100644 --- a/openapi-specs/compute/34-00/desc/audits/mgmt_filters_get.md +++ b/openapi-specs/compute/34-00/desc/audits/mgmt_filters_get.md @@ -6,7 +6,7 @@ Use these filters to query management audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/mgmt_get.md b/openapi-specs/compute/34-00/desc/audits/mgmt_get.md index 5b586cb5e..abe802348 100644 --- a/openapi-specs/compute/34-00/desc/audits/mgmt_get.md +++ b/openapi-specs/compute/34-00/desc/audits/mgmt_get.md @@ -10,7 +10,7 @@ Management audit events are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/runtime_app_embedded_download_get.md b/openapi-specs/compute/34-00/desc/audits/runtime_app_embedded_download_get.md index f3d844ead..ec5ae0f2a 100644 --- a/openapi-specs/compute/34-00/desc/audits/runtime_app_embedded_download_get.md +++ b/openapi-specs/compute/34-00/desc/audits/runtime_app_embedded_download_get.md @@ -5,7 +5,7 @@ Returns the app-embedded runtime audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/runtime_app_embedded_get.md b/openapi-specs/compute/34-00/desc/audits/runtime_app_embedded_get.md index c1d72acfa..51a43b7f5 100644 --- a/openapi-specs/compute/34-00/desc/audits/runtime_app_embedded_get.md +++ b/openapi-specs/compute/34-00/desc/audits/runtime_app_embedded_get.md @@ -5,7 +5,7 @@ Retrieves all app-embedded runtime audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/runtime_container_delete.md b/openapi-specs/compute/34-00/desc/audits/runtime_container_delete.md index ddc8e82d6..62050c71f 100644 --- a/openapi-specs/compute/34-00/desc/audits/runtime_container_delete.md +++ b/openapi-specs/compute/34-00/desc/audits/runtime_container_delete.md @@ -3,7 +3,7 @@ Deletes all container runtime audits. The following example curl command uses basic auth to delete all the audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-00/desc/audits/runtime_container_download_get.md b/openapi-specs/compute/34-00/desc/audits/runtime_container_download_get.md index 20e673b5e..81286d929 100644 --- a/openapi-specs/compute/34-00/desc/audits/runtime_container_download_get.md +++ b/openapi-specs/compute/34-00/desc/audits/runtime_container_download_get.md @@ -6,7 +6,7 @@ Returns the container audit events data in CSV format when a runtime sensor such Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o \ diff --git a/openapi-specs/compute/34-00/desc/audits/runtime_container_get.md b/openapi-specs/compute/34-00/desc/audits/runtime_container_get.md index 11beffb24..a6b6ba484 100644 --- a/openapi-specs/compute/34-00/desc/audits/runtime_container_get.md +++ b/openapi-specs/compute/34-00/desc/audits/runtime_container_get.md @@ -7,7 +7,7 @@ Retrieves all container audit events when a runtime sensor such as process, netw Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/runtime_container_timeslice_get.md b/openapi-specs/compute/34-00/desc/audits/runtime_container_timeslice_get.md index f65d477af..01df48f28 100644 --- a/openapi-specs/compute/34-00/desc/audits/runtime_container_timeslice_get.md +++ b/openapi-specs/compute/34-00/desc/audits/runtime_container_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/runtime_file-integrity_download_get.md b/openapi-specs/compute/34-00/desc/audits/runtime_file-integrity_download_get.md index 99ec70c52..234c3ce32 100644 --- a/openapi-specs/compute/34-00/desc/audits/runtime_file-integrity_download_get.md +++ b/openapi-specs/compute/34-00/desc/audits/runtime_file-integrity_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for file-integrity checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/runtime_file-integrity_get.md b/openapi-specs/compute/34-00/desc/audits/runtime_file-integrity_get.md index 53fec9f9f..c31904422 100644 --- a/openapi-specs/compute/34-00/desc/audits/runtime_file-integrity_get.md +++ b/openapi-specs/compute/34-00/desc/audits/runtime_file-integrity_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for file-integrity checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/runtime_host_delete.md b/openapi-specs/compute/34-00/desc/audits/runtime_host_delete.md index 0ab1c877e..2ada9b15a 100644 --- a/openapi-specs/compute/34-00/desc/audits/runtime_host_delete.md +++ b/openapi-specs/compute/34-00/desc/audits/runtime_host_delete.md @@ -3,7 +3,7 @@ Deletes all host audits from the database. The following example curl command uses basic auth to delete all host audits: ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/audits/runtime/host diff --git a/openapi-specs/compute/34-00/desc/audits/runtime_host_download_get.md b/openapi-specs/compute/34-00/desc/audits/runtime_host_download_get.md index 4d0454f56..d85cc39d0 100644 --- a/openapi-specs/compute/34-00/desc/audits/runtime_host_download_get.md +++ b/openapi-specs/compute/34-00/desc/audits/runtime_host_download_get.md @@ -5,7 +5,7 @@ Returns the runtime host audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/runtime_host_get.md b/openapi-specs/compute/34-00/desc/audits/runtime_host_get.md index 044b8b42d..e063550d6 100644 --- a/openapi-specs/compute/34-00/desc/audits/runtime_host_get.md +++ b/openapi-specs/compute/34-00/desc/audits/runtime_host_get.md @@ -5,7 +5,7 @@ Retrieves the runtime host audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/runtime_host_timeslice_get.md b/openapi-specs/compute/34-00/desc/audits/runtime_host_timeslice_get.md index 8933efa74..aafd869b8 100644 --- a/openapi-specs/compute/34-00/desc/audits/runtime_host_timeslice_get.md +++ b/openapi-specs/compute/34-00/desc/audits/runtime_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/runtime_log-inspection_download_get.md b/openapi-specs/compute/34-00/desc/audits/runtime_log-inspection_download_get.md index f047ed96f..0aa1a5710 100644 --- a/openapi-specs/compute/34-00/desc/audits/runtime_log-inspection_download_get.md +++ b/openapi-specs/compute/34-00/desc/audits/runtime_log-inspection_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for log inspection checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/runtime_log-inspection_get.md b/openapi-specs/compute/34-00/desc/audits/runtime_log-inspection_get.md index 49f0d7be4..8292b623e 100644 --- a/openapi-specs/compute/34-00/desc/audits/runtime_log-inspection_get.md +++ b/openapi-specs/compute/34-00/desc/audits/runtime_log-inspection_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for log inspection checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/runtime_rasp_delete.md b/openapi-specs/compute/34-00/desc/audits/runtime_rasp_delete.md index 688e04038..14315c55b 100644 --- a/openapi-specs/compute/34-00/desc/audits/runtime_rasp_delete.md +++ b/openapi-specs/compute/34-00/desc/audits/runtime_rasp_delete.md @@ -1,7 +1,7 @@ Deletes all RASP Defender runtime audits. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-00/desc/audits/runtime_rasp_download_get.md b/openapi-specs/compute/34-00/desc/audits/runtime_rasp_download_get.md index 303c75858..11a85100d 100644 --- a/openapi-specs/compute/34-00/desc/audits/runtime_rasp_download_get.md +++ b/openapi-specs/compute/34-00/desc/audits/runtime_rasp_download_get.md @@ -1,7 +1,7 @@ Returns CSV data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/runtime_rasp_get.md b/openapi-specs/compute/34-00/desc/audits/runtime_rasp_get.md index 229d908b1..0475cb149 100644 --- a/openapi-specs/compute/34-00/desc/audits/runtime_rasp_get.md +++ b/openapi-specs/compute/34-00/desc/audits/runtime_rasp_get.md @@ -1,7 +1,7 @@ Returns JSON data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/runtime_serverless_delete.md b/openapi-specs/compute/34-00/desc/audits/runtime_serverless_delete.md index 99ada0515..e27ebe858 100644 --- a/openapi-specs/compute/34-00/desc/audits/runtime_serverless_delete.md +++ b/openapi-specs/compute/34-00/desc/audits/runtime_serverless_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to delete the current audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-00/desc/audits/runtime_serverless_download_get.md b/openapi-specs/compute/34-00/desc/audits/runtime_serverless_download_get.md index f829d2342..91693c145 100644 --- a/openapi-specs/compute/34-00/desc/audits/runtime_serverless_download_get.md +++ b/openapi-specs/compute/34-00/desc/audits/runtime_serverless_download_get.md @@ -5,7 +5,7 @@ Returns the scan audit events data in CSV format for any configured serverless f Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/runtime_serverless_filters_get.md b/openapi-specs/compute/34-00/desc/audits/runtime_serverless_filters_get.md index b9bf38610..babda78dd 100644 --- a/openapi-specs/compute/34-00/desc/audits/runtime_serverless_filters_get.md +++ b/openapi-specs/compute/34-00/desc/audits/runtime_serverless_filters_get.md @@ -2,7 +2,7 @@ Returns all serverless filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/runtime_serverless_get.md b/openapi-specs/compute/34-00/desc/audits/runtime_serverless_get.md index 045946886..f6aeb748e 100644 --- a/openapi-specs/compute/34-00/desc/audits/runtime_serverless_get.md +++ b/openapi-specs/compute/34-00/desc/audits/runtime_serverless_get.md @@ -5,7 +5,7 @@ Retrieves all scan events for any configured serverless functions in Prisma Clou Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/runtime_serverless_timeslice_get.md b/openapi-specs/compute/34-00/desc/audits/runtime_serverless_timeslice_get.md index 863890174..a2456cec0 100644 --- a/openapi-specs/compute/34-00/desc/audits/runtime_serverless_timeslice_get.md +++ b/openapi-specs/compute/34-00/desc/audits/runtime_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/trust_delete.md b/openapi-specs/compute/34-00/desc/audits/trust_delete.md index 0bfb2bd81..4aaeef3fe 100644 --- a/openapi-specs/compute/34-00/desc/audits/trust_delete.md +++ b/openapi-specs/compute/34-00/desc/audits/trust_delete.md @@ -1,7 +1,7 @@ Deletes all the trust audits from the events page in Console. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-00/desc/audits/trust_download_get.md b/openapi-specs/compute/34-00/desc/audits/trust_download_get.md index 21c0e55a2..234089449 100644 --- a/openapi-specs/compute/34-00/desc/audits/trust_download_get.md +++ b/openapi-specs/compute/34-00/desc/audits/trust_download_get.md @@ -5,7 +5,7 @@ Returns the trust audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/trust_get.md b/openapi-specs/compute/34-00/desc/audits/trust_get.md index 8fb3a341d..de7d47e96 100644 --- a/openapi-specs/compute/34-00/desc/audits/trust_get.md +++ b/openapi-specs/compute/34-00/desc/audits/trust_get.md @@ -4,7 +4,7 @@ Retrieves all the trust audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/waas_agentless_download_get.md b/openapi-specs/compute/34-00/desc/audits/waas_agentless_download_get.md index bbfcd12f5..f930ef6b3 100644 --- a/openapi-specs/compute/34-00/desc/audits/waas_agentless_download_get.md +++ b/openapi-specs/compute/34-00/desc/audits/waas_agentless_download_get.md @@ -7,7 +7,7 @@ Returns the agentless Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/waas_agentless_get.md b/openapi-specs/compute/34-00/desc/audits/waas_agentless_get.md index ad40ae497..b257b0385 100644 --- a/openapi-specs/compute/34-00/desc/audits/waas_agentless_get.md +++ b/openapi-specs/compute/34-00/desc/audits/waas_agentless_get.md @@ -7,7 +7,7 @@ Retrieves all agentless Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/waas_agentless_timeslice_get.md b/openapi-specs/compute/34-00/desc/audits/waas_agentless_timeslice_get.md index 007c6dba3..3eaf34b25 100644 --- a/openapi-specs/compute/34-00/desc/audits/waas_agentless_timeslice_get.md +++ b/openapi-specs/compute/34-00/desc/audits/waas_agentless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/waas_app_embedded_download_get.md b/openapi-specs/compute/34-00/desc/audits/waas_app_embedded_download_get.md index 149c10376..c94aa87b0 100644 --- a/openapi-specs/compute/34-00/desc/audits/waas_app_embedded_download_get.md +++ b/openapi-specs/compute/34-00/desc/audits/waas_app_embedded_download_get.md @@ -6,7 +6,7 @@ Returns the app-embedded WAAS audit events data in CSV format for the specified Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/waas_app_embedded_get.md b/openapi-specs/compute/34-00/desc/audits/waas_app_embedded_get.md index 400fa447d..6318fb299 100644 --- a/openapi-specs/compute/34-00/desc/audits/waas_app_embedded_get.md +++ b/openapi-specs/compute/34-00/desc/audits/waas_app_embedded_get.md @@ -6,7 +6,7 @@ Returns all app-embedded WAAS audit events for the specified query parameters. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/waas_app_embedded_timeslice_get.md b/openapi-specs/compute/34-00/desc/audits/waas_app_embedded_timeslice_get.md index 79a60038e..42a76d08c 100644 --- a/openapi-specs/compute/34-00/desc/audits/waas_app_embedded_timeslice_get.md +++ b/openapi-specs/compute/34-00/desc/audits/waas_app_embedded_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the app-embedded WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/waas_container_download_get.md b/openapi-specs/compute/34-00/desc/audits/waas_container_download_get.md index 9a5e04fad..7d26c34f4 100644 --- a/openapi-specs/compute/34-00/desc/audits/waas_container_download_get.md +++ b/openapi-specs/compute/34-00/desc/audits/waas_container_download_get.md @@ -6,7 +6,7 @@ Returns the container Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that downloads the WAAS container audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/waas_container_get.md b/openapi-specs/compute/34-00/desc/audits/waas_container_get.md index ac0df80fd..c1ad08f3c 100644 --- a/openapi-specs/compute/34-00/desc/audits/waas_container_get.md +++ b/openapi-specs/compute/34-00/desc/audits/waas_container_get.md @@ -6,7 +6,7 @@ Retrieves all container Web-Application and API Security (WAAS) audits. Refer to the following example cURL command that retrieves all container WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/waas_container_timeslice_get.md b/openapi-specs/compute/34-00/desc/audits/waas_container_timeslice_get.md index a56b4c48f..be56260d6 100644 --- a/openapi-specs/compute/34-00/desc/audits/waas_container_timeslice_get.md +++ b/openapi-specs/compute/34-00/desc/audits/waas_container_timeslice_get.md @@ -11,7 +11,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the container WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s):: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/waas_host_download_get.md b/openapi-specs/compute/34-00/desc/audits/waas_host_download_get.md index 4bc66202b..71692e682 100644 --- a/openapi-specs/compute/34-00/desc/audits/waas_host_download_get.md +++ b/openapi-specs/compute/34-00/desc/audits/waas_host_download_get.md @@ -7,7 +7,7 @@ Returns the host Web-Application and API Security (WAAS) audit events data in CS Refer to the following example cURL command that downloads the host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/waas_host_get.md b/openapi-specs/compute/34-00/desc/audits/waas_host_get.md index 14c967594..f6e3df050 100644 --- a/openapi-specs/compute/34-00/desc/audits/waas_host_get.md +++ b/openapi-specs/compute/34-00/desc/audits/waas_host_get.md @@ -7,7 +7,7 @@ Retrieves all host Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/waas_host_timeslice_get.md b/openapi-specs/compute/34-00/desc/audits/waas_host_timeslice_get.md index e28ed7b7a..67b3a54c3 100644 --- a/openapi-specs/compute/34-00/desc/audits/waas_host_timeslice_get.md +++ b/openapi-specs/compute/34-00/desc/audits/waas_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves host WAAS audit events for a specific time frame: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/waas_serverless_download_get.md b/openapi-specs/compute/34-00/desc/audits/waas_serverless_download_get.md index da05504df..0c0dbe698 100644 --- a/openapi-specs/compute/34-00/desc/audits/waas_serverless_download_get.md +++ b/openapi-specs/compute/34-00/desc/audits/waas_serverless_download_get.md @@ -7,7 +7,7 @@ Returns the serverless function Web-Application and API Security (WAAS) audit ev Refer to the following example cURL command that downloads the serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/waas_serverless_get.md b/openapi-specs/compute/34-00/desc/audits/waas_serverless_get.md index fe482a3f3..82488f7ee 100644 --- a/openapi-specs/compute/34-00/desc/audits/waas_serverless_get.md +++ b/openapi-specs/compute/34-00/desc/audits/waas_serverless_get.md @@ -7,7 +7,7 @@ Retrieves all serverless function Web-Application and API Security (WAAS) audit Refer to the following example cURL command that retrieves all serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/audits/waas_serverless_timeslice_get.md b/openapi-specs/compute/34-00/desc/audits/waas_serverless_timeslice_get.md index ec9ff3df1..a0a9a1368 100644 --- a/openapi-specs/compute/34-00/desc/audits/waas_serverless_timeslice_get.md +++ b/openapi-specs/compute/34-00/desc/audits/waas_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the serverless WAAS audit events for a : ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/authenticate-client/post.md b/openapi-specs/compute/34-00/desc/authenticate-client/post.md index bc493d04e..ce6f00afe 100644 --- a/openapi-specs/compute/34-00/desc/authenticate-client/post.md +++ b/openapi-specs/compute/34-00/desc/authenticate-client/post.md @@ -8,7 +8,7 @@ This endpoint checks the supplied client certificate and authorizes the user bas Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X POST \ --cert \ https:///api/v/authenticate-client diff --git a/openapi-specs/compute/34-00/desc/authenticate/post.md b/openapi-specs/compute/34-00/desc/authenticate/post.md index cb018de64..4f85c5d34 100644 --- a/openapi-specs/compute/34-00/desc/authenticate/post.md +++ b/openapi-specs/compute/34-00/desc/authenticate/post.md @@ -9,7 +9,7 @@ You can set the validity period in Console under **Manage > Authentication > Log Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H "Content-Type: application/json" \ -X POST \ -d \ diff --git a/openapi-specs/compute/34-00/desc/authenticate/renew_get.md b/openapi-specs/compute/34-00/desc/authenticate/renew_get.md index 6040d58e1..3458b500a 100644 --- a/openapi-specs/compute/34-00/desc/authenticate/renew_get.md +++ b/openapi-specs/compute/34-00/desc/authenticate/renew_get.md @@ -5,7 +5,7 @@ Renews an old (unexpired) access token and returns a new token. The following cURL command retrieves a new access token using an old access token. ```bash -$ curl -k \ +$ curl \ -H "Authorization: Bearer " \ https:///api/v1/authenticate/renew ``` diff --git a/openapi-specs/compute/34-00/desc/certs/capem_get.md b/openapi-specs/compute/34-00/desc/certs/capem_get.md index f0f0f1bf3..945476c9b 100644 --- a/openapi-specs/compute/34-00/desc/certs/capem_get.md +++ b/openapi-specs/compute/34-00/desc/certs/capem_get.md @@ -5,7 +5,7 @@ Retrieves the Base64-encoded SSL root certificate self-signed by primary certifi Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/certs/client-certs_get.md b/openapi-specs/compute/34-00/desc/certs/client-certs_get.md index d099b3e3d..279d196b1 100644 --- a/openapi-specs/compute/34-00/desc/certs/client-certs_get.md +++ b/openapi-specs/compute/34-00/desc/certs/client-certs_get.md @@ -3,7 +3,7 @@ Downloads a script that installs a client certificate, client private key, and c The following example curl command uses basic auth to download and run the install script for your client certs: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/certs/client-certs.sh | sh diff --git a/openapi-specs/compute/34-00/desc/certs/server-certs_get.md b/openapi-specs/compute/34-00/desc/certs/server-certs_get.md index 0bb13f51d..118a4d9b0 100644 --- a/openapi-specs/compute/34-00/desc/certs/server-certs_get.md +++ b/openapi-specs/compute/34-00/desc/certs/server-certs_get.md @@ -12,7 +12,7 @@ Retrieves the server certificate bundle from Prisma Cloud Compute that contains Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -u \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/cloud/compliance_download_get.md b/openapi-specs/compute/34-00/desc/cloud/compliance_download_get.md index 7b1ec9fea..14f2725b1 100644 --- a/openapi-specs/compute/34-00/desc/cloud/compliance_download_get.md +++ b/openapi-specs/compute/34-00/desc/cloud/compliance_download_get.md @@ -2,7 +2,7 @@ Download all cloud scan data in CSV format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/cloud/compliance_get.md b/openapi-specs/compute/34-00/desc/cloud/compliance_get.md index 48c2fe5bb..ad47e0998 100644 --- a/openapi-specs/compute/34-00/desc/cloud/compliance_get.md +++ b/openapi-specs/compute/34-00/desc/cloud/compliance_get.md @@ -2,7 +2,7 @@ Returns a list of all cloud compliance scan results. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/cloud/compliance_scan_post.md b/openapi-specs/compute/34-00/desc/cloud/compliance_scan_post.md index 7f87bf1f4..7321c3b9d 100644 --- a/openapi-specs/compute/34-00/desc/cloud/compliance_scan_post.md +++ b/openapi-specs/compute/34-00/desc/cloud/compliance_scan_post.md @@ -2,7 +2,7 @@ Initiates a new cloud compliance scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/cloud/compliance_stop_post.md b/openapi-specs/compute/34-00/desc/cloud/compliance_stop_post.md index df0febb56..60c31dc51 100644 --- a/openapi-specs/compute/34-00/desc/cloud/compliance_stop_post.md +++ b/openapi-specs/compute/34-00/desc/cloud/compliance_stop_post.md @@ -2,7 +2,7 @@ Terminates a cloud compliance scan that's in progress.. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/cloud/discovery_download_get.md b/openapi-specs/compute/34-00/desc/cloud/discovery_download_get.md index 44d60a113..a667c8471 100644 --- a/openapi-specs/compute/34-00/desc/cloud/discovery_download_get.md +++ b/openapi-specs/compute/34-00/desc/cloud/discovery_download_get.md @@ -5,7 +5,7 @@ Downloads all cloud scan data in a CSV file. Refer to the following cURL example command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/cloud/discovery_entities_get.md b/openapi-specs/compute/34-00/desc/cloud/discovery_entities_get.md index a7abbdfb6..85f1be971 100644 --- a/openapi-specs/compute/34-00/desc/cloud/discovery_entities_get.md +++ b/openapi-specs/compute/34-00/desc/cloud/discovery_entities_get.md @@ -7,7 +7,7 @@ Use this API endpoint along with the `GET, api/vVERSION/cloud/discovery` to get Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/cloud/discovery_get.md b/openapi-specs/compute/34-00/desc/cloud/discovery_get.md index 28025f140..c2b4c6e3c 100644 --- a/openapi-specs/compute/34-00/desc/cloud/discovery_get.md +++ b/openapi-specs/compute/34-00/desc/cloud/discovery_get.md @@ -8,7 +8,7 @@ Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/cloud/discovery_scan_post.md b/openapi-specs/compute/34-00/desc/cloud/discovery_scan_post.md index 51799ebdb..0717096f8 100644 --- a/openapi-specs/compute/34-00/desc/cloud/discovery_scan_post.md +++ b/openapi-specs/compute/34-00/desc/cloud/discovery_scan_post.md @@ -5,7 +5,7 @@ Initiates a new cloud discovery scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/cloud/discovery_stop_post.md b/openapi-specs/compute/34-00/desc/cloud/discovery_stop_post.md index 6a6c7a5a5..73dbf46e7 100644 --- a/openapi-specs/compute/34-00/desc/cloud/discovery_stop_post.md +++ b/openapi-specs/compute/34-00/desc/cloud/discovery_stop_post.md @@ -5,7 +5,7 @@ Terminates a cloud discovery scan that's in progress. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/cloud/discovery_vms_get.md b/openapi-specs/compute/34-00/desc/cloud/discovery_vms_get.md index 6766f4e5a..2264a27fe 100644 --- a/openapi-specs/compute/34-00/desc/cloud/discovery_vms_get.md +++ b/openapi-specs/compute/34-00/desc/cloud/discovery_vms_get.md @@ -5,7 +5,7 @@ Returns the discovered cloud VM instances. Refer to the following example cURL command that retrieves all the discovered cloud VM instances: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/coderepos/download_get.md b/openapi-specs/compute/34-00/desc/coderepos/download_get.md index 4ec0197bb..b06dd9f17 100644 --- a/openapi-specs/compute/34-00/desc/coderepos/download_get.md +++ b/openapi-specs/compute/34-00/desc/coderepos/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Code re The following cURL command generates a CSV file containing the reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/coderepos/get.md b/openapi-specs/compute/34-00/desc/coderepos/get.md index 54c4e99bf..42dc16fb6 100644 --- a/openapi-specs/compute/34-00/desc/coderepos/get.md +++ b/openapi-specs/compute/34-00/desc/coderepos/get.md @@ -10,7 +10,7 @@ This endpoint maps to the **Code repositories** table in **Monitor > Vulnerabili The following cURL command retrieves all code repository scan reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/collections/get.md b/openapi-specs/compute/34-00/desc/collections/get.md index 99120d17d..5a9e8a50c 100755 --- a/openapi-specs/compute/34-00/desc/collections/get.md +++ b/openapi-specs/compute/34-00/desc/collections/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table in **Manage > Collections and Tags > Collections Refer to the following example cURL command that returns a list of collections: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/collections/name_delete.md b/openapi-specs/compute/34-00/desc/collections/name_delete.md index 3e2debd01..033358000 100755 --- a/openapi-specs/compute/34-00/desc/collections/name_delete.md +++ b/openapi-specs/compute/34-00/desc/collections/name_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that deletes a collection with the name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-00/desc/collections/name_usages_get.md b/openapi-specs/compute/34-00/desc/collections/name_usages_get.md index 5c9c40424..89e383cce 100755 --- a/openapi-specs/compute/34-00/desc/collections/name_usages_get.md +++ b/openapi-specs/compute/34-00/desc/collections/name_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that retrieves all policies with name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/containers/count_get.md b/openapi-specs/compute/34-00/desc/containers/count_get.md index 4c6ecdcb4..aca59a913 100644 --- a/openapi-specs/compute/34-00/desc/containers/count_get.md +++ b/openapi-specs/compute/34-00/desc/containers/count_get.md @@ -5,7 +5,7 @@ Returns an integer representing the number of containers in your environment. Refer to the following example cURL command that returns the number of containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/containers/download_get.md b/openapi-specs/compute/34-00/desc/containers/download_get.md index 5c0811d7c..5ed3fec35 100644 --- a/openapi-specs/compute/34-00/desc/containers/download_get.md +++ b/openapi-specs/compute/34-00/desc/containers/download_get.md @@ -9,7 +9,7 @@ You can download the container scan reports in CSV format in Console under **Mon Refer to the following example cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/containers/filters_get.md b/openapi-specs/compute/34-00/desc/containers/filters_get.md index c8a1dfca4..6c2777819 100644 --- a/openapi-specs/compute/34-00/desc/containers/filters_get.md +++ b/openapi-specs/compute/34-00/desc/containers/filters_get.md @@ -1,7 +1,7 @@ Returns all container filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/containers/get.md b/openapi-specs/compute/34-00/desc/containers/get.md index 4cacdde60..3de9dd4af 100644 --- a/openapi-specs/compute/34-00/desc/containers/get.md +++ b/openapi-specs/compute/34-00/desc/containers/get.md @@ -16,7 +16,7 @@ Refer to the following available options for the `fields` query parameters: Refer to the following example cURL command that retrieves a scan report for all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -26,7 +26,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a scan report for a container with the collection ``: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/containers/labels_get.md b/openapi-specs/compute/34-00/desc/containers/labels_get.md index eb40a748d..7a63ab6fb 100644 --- a/openapi-specs/compute/34-00/desc/containers/labels_get.md +++ b/openapi-specs/compute/34-00/desc/containers/labels_get.md @@ -1,7 +1,7 @@ Returns an array of strings containing all of the labels. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/containers/names_get.md b/openapi-specs/compute/34-00/desc/containers/names_get.md index 8b32465d5..9025e2e10 100644 --- a/openapi-specs/compute/34-00/desc/containers/names_get.md +++ b/openapi-specs/compute/34-00/desc/containers/names_get.md @@ -5,7 +5,7 @@ Returns an array of strings containing all container names. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/containers/scan_post.md b/openapi-specs/compute/34-00/desc/containers/scan_post.md index 6b2bdaaba..56137cf64 100644 --- a/openapi-specs/compute/34-00/desc/containers/scan_post.md +++ b/openapi-specs/compute/34-00/desc/containers/scan_post.md @@ -4,7 +4,7 @@ This endpoint returns the time that the scans were initiated. The following example command uses curl and basic auth to force Prisma Cloud Compute to re-scan all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/credentials/get.md b/openapi-specs/compute/34-00/desc/credentials/get.md index ee4309dee..b807ce8f3 100644 --- a/openapi-specs/compute/34-00/desc/credentials/get.md +++ b/openapi-specs/compute/34-00/desc/credentials/get.md @@ -6,7 +6,7 @@ This endpoint maps to **Manage > Authentication > Credentials store** in the Con Refer to the following example cURL command that retrieves all credentials: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/credentials/id_delete.md b/openapi-specs/compute/34-00/desc/credentials/id_delete.md index e5c70259e..27f090158 100644 --- a/openapi-specs/compute/34-00/desc/credentials/id_delete.md +++ b/openapi-specs/compute/34-00/desc/credentials/id_delete.md @@ -14,7 +14,7 @@ To invoke this endpoint in the Prisma Cloud Compute user interface: Refer to the following example cURL command that deletes an existing credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-00/desc/credentials/id_usages_get.md b/openapi-specs/compute/34-00/desc/credentials/id_usages_get.md index 76c1099aa..ca2ce6216 100644 --- a/openapi-specs/compute/34-00/desc/credentials/id_usages_get.md +++ b/openapi-specs/compute/34-00/desc/credentials/id_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following cURL command that retrieves all usages for a credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/curl_examples.md b/openapi-specs/compute/34-00/desc/curl_examples.md index 3d4fcd468..745d21db3 100644 --- a/openapi-specs/compute/34-00/desc/curl_examples.md +++ b/openapi-specs/compute/34-00/desc/curl_examples.md @@ -6,7 +6,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -17,7 +17,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -29,7 +29,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/compute/34-00/desc/custom-compliance/get.md b/openapi-specs/compute/34-00/desc/custom-compliance/get.md index 9022a87b7..9dddcff4e 100644 --- a/openapi-specs/compute/34-00/desc/custom-compliance/get.md +++ b/openapi-specs/compute/34-00/desc/custom-compliance/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example curl command that gets the list of custom compliance checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/custom-compliance/id_delete.md b/openapi-specs/compute/34-00/desc/custom-compliance/id_delete.md index 72c7183ee..f6536e51d 100644 --- a/openapi-specs/compute/34-00/desc/custom-compliance/id_delete.md +++ b/openapi-specs/compute/34-00/desc/custom-compliance/id_delete.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example cURL command that uses basic auth to delete the compliance check with id 9000: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-00/desc/custom-compliance/put.md b/openapi-specs/compute/34-00/desc/custom-compliance/put.md index 480e41b54..b8760a11f 100644 --- a/openapi-specs/compute/34-00/desc/custom-compliance/put.md +++ b/openapi-specs/compute/34-00/desc/custom-compliance/put.md @@ -21,7 +21,7 @@ Create `custom_check.json` file (example): Refer to the following example curl command that uses basic auth to update the checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-00/desc/custom-rules/get.md b/openapi-specs/compute/34-00/desc/custom-rules/get.md index f0385f81a..f77924be8 100644 --- a/openapi-specs/compute/34-00/desc/custom-rules/get.md +++ b/openapi-specs/compute/34-00/desc/custom-rules/get.md @@ -7,7 +7,7 @@ This endpoint maps to the policy table in **Defend > Custom rules** in the Conso Refer to the following example cURL command that retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/custom-rules/id_delete.md b/openapi-specs/compute/34-00/desc/custom-rules/id_delete.md index c0d6dc8b0..01412abf3 100644 --- a/openapi-specs/compute/34-00/desc/custom-rules/id_delete.md +++ b/openapi-specs/compute/34-00/desc/custom-rules/id_delete.md @@ -5,7 +5,7 @@ Deletes a custom rule. Refer to the following example cURL command that deletes a custom rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-00/desc/cves/distribution_get.md b/openapi-specs/compute/34-00/desc/cves/distribution_get.md index aecddce23..7365e1a5e 100644 --- a/openapi-specs/compute/34-00/desc/cves/distribution_get.md +++ b/openapi-specs/compute/34-00/desc/cves/distribution_get.md @@ -3,7 +3,7 @@ Retrieves CVEs from the vulnerability database grouped into distribution where y The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/cves/get.md b/openapi-specs/compute/34-00/desc/cves/get.md index 469ea4b28..f81223298 100644 --- a/openapi-specs/compute/34-00/desc/cves/get.md +++ b/openapi-specs/compute/34-00/desc/cves/get.md @@ -6,7 +6,7 @@ A null response indicates that the CVE is not in our database. The following example curl command queries the Prisma Cloud Compute database for `CVE-2018-1102`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/defenders/app_embedded_post.md b/openapi-specs/compute/34-00/desc/defenders/app_embedded_post.md index 9167469d0..7999cbadb 100644 --- a/openapi-specs/compute/34-00/desc/defenders/app_embedded_post.md +++ b/openapi-specs/compute/34-00/desc/defenders/app_embedded_post.md @@ -5,7 +5,7 @@ Creates an augmented Dockerfile with Defender and dependencies included as a ZIP Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/defenders/daemonset_yaml_get.md b/openapi-specs/compute/34-00/desc/defenders/daemonset_yaml_get.md index 678901a8a..b68869081 100644 --- a/openapi-specs/compute/34-00/desc/defenders/daemonset_yaml_get.md +++ b/openapi-specs/compute/34-00/desc/defenders/daemonset_yaml_get.md @@ -10,7 +10,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https://:8083/api/v1/defenders/daemonset.yaml?consoleaddr=&listener=none&namespace=twistlock&orchestration=kubernetes' diff --git a/openapi-specs/compute/34-00/desc/defenders/daemonset_yaml_post.md b/openapi-specs/compute/34-00/desc/defenders/daemonset_yaml_post.md index 268e3ba81..af006122b 100644 --- a/openapi-specs/compute/34-00/desc/defenders/daemonset_yaml_post.md +++ b/openapi-specs/compute/34-00/desc/defenders/daemonset_yaml_post.md @@ -5,7 +5,7 @@ Creates a DaemonSet deployment file in YAML format that you can use to deploy De Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/defenders/download_get.md b/openapi-specs/compute/34-00/desc/defenders/download_get.md index 2d9435506..67f08c0e5 100644 --- a/openapi-specs/compute/34-00/desc/defenders/download_get.md +++ b/openapi-specs/compute/34-00/desc/defenders/download_get.md @@ -8,7 +8,7 @@ Use the query parameters to filter what data is returned. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o \ diff --git a/openapi-specs/compute/34-00/desc/defenders/fargate_json_post.md b/openapi-specs/compute/34-00/desc/defenders/fargate_json_post.md index 5128e90a1..e2e4e85ab 100644 --- a/openapi-specs/compute/34-00/desc/defenders/fargate_json_post.md +++ b/openapi-specs/compute/34-00/desc/defenders/fargate_json_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command: Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -23,7 +23,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/defenders/fargate_yaml_post.md b/openapi-specs/compute/34-00/desc/defenders/fargate_yaml_post.md index 9a8306a1b..95560526a 100644 --- a/openapi-specs/compute/34-00/desc/defenders/fargate_yaml_post.md +++ b/openapi-specs/compute/34-00/desc/defenders/fargate_yaml_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.yaml` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/yaml' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/defenders/get.md b/openapi-specs/compute/34-00/desc/defenders/get.md index 471e7ef9d..8d2f5cd4c 100644 --- a/openapi-specs/compute/34-00/desc/defenders/get.md +++ b/openapi-specs/compute/34-00/desc/defenders/get.md @@ -7,7 +7,7 @@ This endpoint maps to the UI Console page in **Manage > Defenders > Defenders**. Refer to the following example cURL command that retrieves all deployed Defenders. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/defenders/helm_get.md b/openapi-specs/compute/34-00/desc/defenders/helm_get.md index b11f9c4b9..487c8b7e8 100644 --- a/openapi-specs/compute/34-00/desc/defenders/helm_get.md +++ b/openapi-specs/compute/34-00/desc/defenders/helm_get.md @@ -13,7 +13,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o twistlock-defender-helm.tar.gz \ diff --git a/openapi-specs/compute/34-00/desc/defenders/helm_post.md b/openapi-specs/compute/34-00/desc/defenders/helm_post.md index 2046e63eb..fb76807ae 100644 --- a/openapi-specs/compute/34-00/desc/defenders/helm_post.md +++ b/openapi-specs/compute/34-00/desc/defenders/helm_post.md @@ -5,7 +5,7 @@ Creates a Helm deployment file that you can use to deploy Defenders to your clus Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/defenders/id_delete.md b/openapi-specs/compute/34-00/desc/defenders/id_delete.md index f637ef850..e3ac52daf 100644 --- a/openapi-specs/compute/34-00/desc/defenders/id_delete.md +++ b/openapi-specs/compute/34-00/desc/defenders/id_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes an existing Defender on a host. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-00/desc/defenders/id_features_post.md b/openapi-specs/compute/34-00/desc/defenders/id_features_post.md index ec8e4c5f3..9b42f5fa0 100644 --- a/openapi-specs/compute/34-00/desc/defenders/id_features_post.md +++ b/openapi-specs/compute/34-00/desc/defenders/id_features_post.md @@ -3,7 +3,7 @@ Updates a deployed Defender's configuration. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/defenders/id_restart_post.md b/openapi-specs/compute/34-00/desc/defenders/id_restart_post.md index da0cc7811..7296a186b 100644 --- a/openapi-specs/compute/34-00/desc/defenders/id_restart_post.md +++ b/openapi-specs/compute/34-00/desc/defenders/id_restart_post.md @@ -3,7 +3,7 @@ Restarts Defender on a given host. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/defenders/id_upgrade_post.md b/openapi-specs/compute/34-00/desc/defenders/id_upgrade_post.md index f0d30d1e9..3e63c6414 100644 --- a/openapi-specs/compute/34-00/desc/defenders/id_upgrade_post.md +++ b/openapi-specs/compute/34-00/desc/defenders/id_upgrade_post.md @@ -7,7 +7,7 @@ Upgrades Defender on ``. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/defenders/image-name_get.md b/openapi-specs/compute/34-00/desc/defenders/image-name_get.md index e81ba3e19..19f360c07 100644 --- a/openapi-specs/compute/34-00/desc/defenders/image-name_get.md +++ b/openapi-specs/compute/34-00/desc/defenders/image-name_get.md @@ -5,7 +5,7 @@ Returns the full Docker image name for Defender. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/defenders/install-bundle_get.md b/openapi-specs/compute/34-00/desc/defenders/install-bundle_get.md index 882d0cd53..9b09e733f 100644 --- a/openapi-specs/compute/34-00/desc/defenders/install-bundle_get.md +++ b/openapi-specs/compute/34-00/desc/defenders/install-bundle_get.md @@ -5,7 +5,7 @@ Returns the certificate bundle that Defender needs to securely connect to Consol Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/defenders/names_get.md b/openapi-specs/compute/34-00/desc/defenders/names_get.md index 728eb6364..6339c1483 100644 --- a/openapi-specs/compute/34-00/desc/defenders/names_get.md +++ b/openapi-specs/compute/34-00/desc/defenders/names_get.md @@ -5,7 +5,7 @@ Retrieves a list of Defender hostnames that can be used as the `{id}` query para Refer to the following example cURL command that retrieves a list of all Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -15,7 +15,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of connected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -25,7 +25,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of disconnected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -37,7 +37,7 @@ The endpoint enlists all the connected and disconnected Defenders if do not spec Refer to the following example cURL command that retrieves a list of Defenders by type: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/defenders/rasp_post.md b/openapi-specs/compute/34-00/desc/defenders/rasp_post.md index 526a9e112..e110044dd 100644 --- a/openapi-specs/compute/34-00/desc/defenders/rasp_post.md +++ b/openapi-specs/compute/34-00/desc/defenders/rasp_post.md @@ -7,7 +7,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o rasp-defender.zip diff --git a/openapi-specs/compute/34-00/desc/defenders/serverless-bundle_post.md b/openapi-specs/compute/34-00/desc/defenders/serverless-bundle_post.md index df4f13e6a..7533e436b 100644 --- a/openapi-specs/compute/34-00/desc/defenders/serverless-bundle_post.md +++ b/openapi-specs/compute/34-00/desc/defenders/serverless-bundle_post.md @@ -5,7 +5,7 @@ Downloads a ZIP file with serverless Defender bundle. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/octet-stream' \ -o serverless_bundle.zip \ diff --git a/openapi-specs/compute/34-00/desc/defenders/summary_get.md b/openapi-specs/compute/34-00/desc/defenders/summary_get.md index 08be4ebc4..e308ef64b 100644 --- a/openapi-specs/compute/34-00/desc/defenders/summary_get.md +++ b/openapi-specs/compute/34-00/desc/defenders/summary_get.md @@ -6,7 +6,7 @@ Lists the number of Defenders in each defender category. Refer to the following example cURL command that retrieves a summary of Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/defenders/upgrade_post.md b/openapi-specs/compute/34-00/desc/defenders/upgrade_post.md index 2f0b4d39e..eacd6b779 100644 --- a/openapi-specs/compute/34-00/desc/defenders/upgrade_post.md +++ b/openapi-specs/compute/34-00/desc/defenders/upgrade_post.md @@ -9,7 +9,7 @@ To upgrade Serverless and Fargate Defenders, re-embed them. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/deployment/daemonsets_deploy_post.md b/openapi-specs/compute/34-00/desc/deployment/daemonsets_deploy_post.md index 94ec9386b..b60f28346 100644 --- a/openapi-specs/compute/34-00/desc/deployment/daemonsets_deploy_post.md +++ b/openapi-specs/compute/34-00/desc/deployment/daemonsets_deploy_post.md @@ -5,7 +5,7 @@ It identifies the cluster's API server, user, and credentials. Use the various request parameters to control the properties of the deployed DaemonSet. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/deployment/daemonsets_get.md b/openapi-specs/compute/34-00/desc/deployment/daemonsets_get.md index a0b7f3798..0385acf75 100644 --- a/openapi-specs/compute/34-00/desc/deployment/daemonsets_get.md +++ b/openapi-specs/compute/34-00/desc/deployment/daemonsets_get.md @@ -3,7 +3,7 @@ You must specify a `credentialID`, of type `kubeconfig`, which identifies your c Credentials are managed in Console's credentials store (`/api/v1/credentials`). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/feeds/custom-vulnerabilities_get.md b/openapi-specs/compute/34-00/desc/feeds/custom-vulnerabilities_get.md index 71834f19d..d661acf55 100644 --- a/openapi-specs/compute/34-00/desc/feeds/custom-vulnerabilities_get.md +++ b/openapi-specs/compute/34-00/desc/feeds/custom-vulnerabilities_get.md @@ -11,7 +11,7 @@ Vulnerability rules can be created using the Prisma Cloud Compute. Refer to the following cURL command that retrieves a list of all the custom vulnerabilities and associated rules. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/feeds/custom-vulnerabilities_put.md b/openapi-specs/compute/34-00/desc/feeds/custom-vulnerabilities_put.md index 4fe1c1898..149ada978 100644 --- a/openapi-specs/compute/34-00/desc/feeds/custom-vulnerabilities_put.md +++ b/openapi-specs/compute/34-00/desc/feeds/custom-vulnerabilities_put.md @@ -5,7 +5,7 @@ Updates all the custom vulnerabilities and associated rules simultaneously for h Refer to the following cURL command that updates a vulnerability for a library named `internal-lib`, and specifies that its versions `1.1` to `1.8` are known to be vulnerable. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -37,7 +37,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: **Note:** You will need `jq` to execute this command. ``` - $ curl -k \ + $ curl \ -u \ https:///api/v/feeds/custom/custom-vulnerabilities \ | jq '.' > custom_vulnerability_rules.json @@ -66,7 +66,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 3. Update the rules by pushing the new JSON payload. **Note:** Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -77,7 +77,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 4. Run the cURL command for the `GET /api/vVERSION/feeds/custom/custom-vulnerabilities` endpoint and you can see that the previously installed rules are now overwritten with your new rules. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/feeds/custom_vulnerabilities_digest_get.md b/openapi-specs/compute/34-00/desc/feeds/custom_vulnerabilities_digest_get.md index 0eb501d9b..02af9a3ab 100644 --- a/openapi-specs/compute/34-00/desc/feeds/custom_vulnerabilities_digest_get.md +++ b/openapi-specs/compute/34-00/desc/feeds/custom_vulnerabilities_digest_get.md @@ -5,7 +5,7 @@ Returns the unique digest for the custom vulnerabilities and associated rules fo The following cURL command retrieves the digest for the configured custom vulnerabilities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/feeds/cve_allow_list_digest_get.md b/openapi-specs/compute/34-00/desc/feeds/cve_allow_list_digest_get.md index e27f21251..911a07fd9 100644 --- a/openapi-specs/compute/34-00/desc/feeds/cve_allow_list_digest_get.md +++ b/openapi-specs/compute/34-00/desc/feeds/cve_allow_list_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the Common Vulnerabilities and Exposures (CVE) a The following cURL command retrieves the digest for the configured CVE allow list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/feeds/cve_allow_list_get.md b/openapi-specs/compute/34-00/desc/feeds/cve_allow_list_get.md index 34fb2c7f8..d73ce17c2 100644 --- a/openapi-specs/compute/34-00/desc/feeds/cve_allow_list_get.md +++ b/openapi-specs/compute/34-00/desc/feeds/cve_allow_list_get.md @@ -5,7 +5,7 @@ Retrieves the globally allow-listed Common Vulnerabilities and Exposures (CVE). The following cURL command retrieves the globally allow-listed CVEs. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/feeds/cve_allow_list_put.md b/openapi-specs/compute/34-00/desc/feeds/cve_allow_list_put.md index 850016965..c4e2ce0af 100644 --- a/openapi-specs/compute/34-00/desc/feeds/cve_allow_list_put.md +++ b/openapi-specs/compute/34-00/desc/feeds/cve_allow_list_put.md @@ -7,7 +7,7 @@ Globally allow-lists a set of Common Vulnerabilities and Exposures (CVE). The following cURL command installs a global CVE allow-list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-00/desc/feeds/ips_digest_get.md b/openapi-specs/compute/34-00/desc/feeds/ips_digest_get.md index d059271ea..ae2a09915 100644 --- a/openapi-specs/compute/34-00/desc/feeds/ips_digest_get.md +++ b/openapi-specs/compute/34-00/desc/feeds/ips_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the list of suspicious or high risk IP endpoints The following cURL command retrieves the digest for the banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/feeds/ips_get.md b/openapi-specs/compute/34-00/desc/feeds/ips_get.md index 381257d47..f51c577a7 100644 --- a/openapi-specs/compute/34-00/desc/feeds/ips_get.md +++ b/openapi-specs/compute/34-00/desc/feeds/ips_get.md @@ -5,7 +5,7 @@ Retrieves the customized list of block-listed suspicious or high-risk IP address The following cURL command retrieves the list of globally block-listed suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/feeds/ips_put.md b/openapi-specs/compute/34-00/desc/feeds/ips_put.md index 6f8fc2419..5bf791044 100644 --- a/openapi-specs/compute/34-00/desc/feeds/ips_put.md +++ b/openapi-specs/compute/34-00/desc/feeds/ips_put.md @@ -7,7 +7,7 @@ Bans a custom list of suspicious or high-risk IP addresses. The following cURL command installs a custom list of banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-00/desc/feeds/malware_digest_get.md b/openapi-specs/compute/34-00/desc/feeds/malware_digest_get.md index 005c476a2..522a59aef 100644 --- a/openapi-specs/compute/34-00/desc/feeds/malware_digest_get.md +++ b/openapi-specs/compute/34-00/desc/feeds/malware_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for all the MD5 signatures of malicious executables The following cURL command retrieves the digest for the configured list for the MD5 signatures of malicious executables. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/feeds/malware_get.md b/openapi-specs/compute/34-00/desc/feeds/malware_get.md index 2a7aa128b..72bee6594 100644 --- a/openapi-specs/compute/34-00/desc/feeds/malware_get.md +++ b/openapi-specs/compute/34-00/desc/feeds/malware_get.md @@ -5,7 +5,7 @@ Returns the customized list of MD5 signatures of malicious executables. Refer to the following cURL command that retrieves the list of MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/feeds/malware_put.md b/openapi-specs/compute/34-00/desc/feeds/malware_put.md index 7e6ec5da0..176304cb9 100644 --- a/openapi-specs/compute/34-00/desc/feeds/malware_put.md +++ b/openapi-specs/compute/34-00/desc/feeds/malware_put.md @@ -7,7 +7,7 @@ Creates a custom list of malware MD5 signatures of malicious executables. Refer to the following cURL command that installs a custom list of malware MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-00/desc/feeds/refresh_post.md b/openapi-specs/compute/34-00/desc/feeds/refresh_post.md index a83c40d10..1c756edae 100644 --- a/openapi-specs/compute/34-00/desc/feeds/refresh_post.md +++ b/openapi-specs/compute/34-00/desc/feeds/refresh_post.md @@ -1,7 +1,7 @@ Triggers Console to refresh its data from the **Intelligence Stream** ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/forensic/activities_download_get.md b/openapi-specs/compute/34-00/desc/forensic/activities_download_get.md index 8a2dbd926..1918e3790 100644 --- a/openapi-specs/compute/34-00/desc/forensic/activities_download_get.md +++ b/openapi-specs/compute/34-00/desc/forensic/activities_download_get.md @@ -3,7 +3,7 @@ Downloads all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/forensic/activities_get.md b/openapi-specs/compute/34-00/desc/forensic/activities_get.md index c8fb1d0cd..c0761aa60 100644 --- a/openapi-specs/compute/34-00/desc/forensic/activities_get.md +++ b/openapi-specs/compute/34-00/desc/forensic/activities_get.md @@ -3,7 +3,7 @@ Retrieves all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/groups/get.md b/openapi-specs/compute/34-00/desc/groups/get.md index 6a0daa2eb..34a2711e0 100644 --- a/openapi-specs/compute/34-00/desc/groups/get.md +++ b/openapi-specs/compute/34-00/desc/groups/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups. ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/34-00/desc/groups/id_delete.md b/openapi-specs/compute/34-00/desc/groups/id_delete.md index 5962a1135..0c3cfa1cd 100644 --- a/openapi-specs/compute/34-00/desc/groups/id_delete.md +++ b/openapi-specs/compute/34-00/desc/groups/id_delete.md @@ -13,7 +13,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes a collection with the name `{id}`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-00/desc/groups/names.md b/openapi-specs/compute/34-00/desc/groups/names.md index 80f34f536..9c2dd1089 100644 --- a/openapi-specs/compute/34-00/desc/groups/names.md +++ b/openapi-specs/compute/34-00/desc/groups/names.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/34-00/desc/groups/post.md b/openapi-specs/compute/34-00/desc/groups/post.md index d0fc23a6d..ebad011f4 100644 --- a/openapi-specs/compute/34-00/desc/groups/post.md +++ b/openapi-specs/compute/34-00/desc/groups/post.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that creates a new group named `my-group`: ```bash -$ curl -k \ +$ curl \ -X POST \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/34-00/desc/high-availability/get.md b/openapi-specs/compute/34-00/desc/high-availability/get.md index a988d47ef..83d5d9b46 100644 --- a/openapi-specs/compute/34-00/desc/high-availability/get.md +++ b/openapi-specs/compute/34-00/desc/high-availability/get.md @@ -3,7 +3,7 @@ Returns the status of high high availability. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/34-00/desc/hosts/download_get.md b/openapi-specs/compute/34-00/desc/hosts/download_get.md index ab691fb49..34e546573 100644 --- a/openapi-specs/compute/34-00/desc/hosts/download_get.md +++ b/openapi-specs/compute/34-00/desc/hosts/download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Hosts > Refer to the following example cURL command that downloads all host scan reports to a CSV file called `hosts_report.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o hosts_report.csv \ diff --git a/openapi-specs/compute/34-00/desc/hosts/filters_get.md b/openapi-specs/compute/34-00/desc/hosts/filters_get.md index 4bf6df5e6..a39ec8a97 100644 --- a/openapi-specs/compute/34-00/desc/hosts/filters_get.md +++ b/openapi-specs/compute/34-00/desc/hosts/filters_get.md @@ -3,7 +3,7 @@ Returns host filters such as distribution and host name. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/hosts/get.md b/openapi-specs/compute/34-00/desc/hosts/get.md index 43020558a..9bdf69c6c 100644 --- a/openapi-specs/compute/34-00/desc/hosts/get.md +++ b/openapi-specs/compute/34-00/desc/hosts/get.md @@ -37,7 +37,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following cURL command that retrieves all host scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/hosts/info_get.md b/openapi-specs/compute/34-00/desc/hosts/info_get.md index 5b3903b7e..523024735 100644 --- a/openapi-specs/compute/34-00/desc/hosts/info_get.md +++ b/openapi-specs/compute/34-00/desc/hosts/info_get.md @@ -5,7 +5,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/hosts/scan_post.md b/openapi-specs/compute/34-00/desc/hosts/scan_post.md index 6b72cbfa3..0e0e7b074 100644 --- a/openapi-specs/compute/34-00/desc/hosts/scan_post.md +++ b/openapi-specs/compute/34-00/desc/hosts/scan_post.md @@ -3,7 +3,7 @@ Re-scan all hosts immediately. Refer to the following example command that forces Prisma Cloud Compute to re-scan all hosts: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/hosts/scan diff --git a/openapi-specs/compute/34-00/desc/images/defender_layer_get.md b/openapi-specs/compute/34-00/desc/images/defender_layer_get.md index 1dfe3633d..4bb88d62c 100644 --- a/openapi-specs/compute/34-00/desc/images/defender_layer_get.md +++ b/openapi-specs/compute/34-00/desc/images/defender_layer_get.md @@ -5,7 +5,7 @@ Returns the the Prisma Cloud Compute Defender in as a layer that can be used in Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/compute/34-00/desc/images/defender_rasp_get.md b/openapi-specs/compute/34-00/desc/images/defender_rasp_get.md index a8e145ff7..260e271a1 100644 --- a/openapi-specs/compute/34-00/desc/images/defender_rasp_get.md +++ b/openapi-specs/compute/34-00/desc/images/defender_rasp_get.md @@ -3,7 +3,7 @@ Returns the the Prisma Cloud Compute Defender as the RASP Defender A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/compute/34-00/desc/images/download_get.md b/openapi-specs/compute/34-00/desc/images/download_get.md index 2df61a58c..599b77f78 100644 --- a/openapi-specs/compute/34-00/desc/images/download_get.md +++ b/openapi-specs/compute/34-00/desc/images/download_get.md @@ -16,7 +16,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -27,7 +27,7 @@ $ curl -k \ Refer to the following example cURL command that might be useful for developers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/images/get.md b/openapi-specs/compute/34-00/desc/images/get.md index 3f594c6c8..dcef1b0a4 100644 --- a/openapi-specs/compute/34-00/desc/images/get.md +++ b/openapi-specs/compute/34-00/desc/images/get.md @@ -26,7 +26,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following cURL command that retrieves a compact scan report for all images: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -36,7 +36,7 @@ $ curl -k \ Refer to the following cURL command that retrieves a compact scan report for an Ubuntu image: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -47,7 +47,7 @@ The name query is synonymous with the filter images text field in the Console UI Refer to the following cURL command that retrieves the scan report for an image with the matching SHA-256 hash: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/images/names_get.md b/openapi-specs/compute/34-00/desc/images/names_get.md index 3a234df98..311b33574 100644 --- a/openapi-specs/compute/34-00/desc/images/names_get.md +++ b/openapi-specs/compute/34-00/desc/images/names_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/34-00/desc/images/scan_post.md b/openapi-specs/compute/34-00/desc/images/scan_post.md index 8d802727a..36278249b 100644 --- a/openapi-specs/compute/34-00/desc/images/scan_post.md +++ b/openapi-specs/compute/34-00/desc/images/scan_post.md @@ -5,7 +5,7 @@ Re-scan all images immediately. This endpoint returns the time that the scans we Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all images: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/images/scan diff --git a/openapi-specs/compute/34-00/desc/images/twistlock_defender_tar_gz_get.md b/openapi-specs/compute/34-00/desc/images/twistlock_defender_tar_gz_get.md index 7852e12ba..36fb66ae8 100644 --- a/openapi-specs/compute/34-00/desc/images/twistlock_defender_tar_gz_get.md +++ b/openapi-specs/compute/34-00/desc/images/twistlock_defender_tar_gz_get.md @@ -1,7 +1,7 @@ Download the Container Defender image for Linux platforms. ```bash -$ curl -k \ +$ curl \ -u \ -H "Content-Type: application/octet-stream" \ -o twistlock_defender.tar.gz \ diff --git a/openapi-specs/compute/34-00/desc/intro.md b/openapi-specs/compute/34-00/desc/intro.md index 9038a3734..5b4ed5864 100644 --- a/openapi-specs/compute/34-00/desc/intro.md +++ b/openapi-specs/compute/34-00/desc/intro.md @@ -47,7 +47,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -58,7 +58,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -70,7 +70,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/compute/34-00/desc/kubernetes/scan_post.md b/openapi-specs/compute/34-00/desc/kubernetes/scan_post.md index 15d614c1a..ab74d5d96 100644 --- a/openapi-specs/compute/34-00/desc/kubernetes/scan_post.md +++ b/openapi-specs/compute/34-00/desc/kubernetes/scan_post.md @@ -3,7 +3,7 @@ This endpoint will trigger a Kubernetes scan. The following example curl command uses basic auth to initiate this scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/logs/console_get.md b/openapi-specs/compute/34-00/desc/logs/console_get.md index 80ece6611..113543540 100644 --- a/openapi-specs/compute/34-00/desc/logs/console_get.md +++ b/openapi-specs/compute/34-00/desc/logs/console_get.md @@ -3,7 +3,7 @@ Retrieves the latest Console log messages. The following example curl command retrieves the 10 latest Console log messages: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/logs/defender_download_get.md b/openapi-specs/compute/34-00/desc/logs/defender_download_get.md index 5d6718db0..05bbc6a75 100644 --- a/openapi-specs/compute/34-00/desc/logs/defender_download_get.md +++ b/openapi-specs/compute/34-00/desc/logs/defender_download_get.md @@ -5,7 +5,7 @@ The hostname can be returned from the endpoint `/defenders/names` The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/logs/defender_get.md b/openapi-specs/compute/34-00/desc/logs/defender_get.md index 1e733a746..f2e3b25df 100644 --- a/openapi-specs/compute/34-00/desc/logs/defender_get.md +++ b/openapi-specs/compute/34-00/desc/logs/defender_get.md @@ -7,7 +7,7 @@ Note that you must quote the URL when running the following command. Otherwise the shell misinterprets the ampersand (`&`) as the end of the command, and puts the curl command in the background. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/logs/system_download_get.md b/openapi-specs/compute/34-00/desc/logs/system_download_get.md index 1e5b5b873..43bb0abce 100644 --- a/openapi-specs/compute/34-00/desc/logs/system_download_get.md +++ b/openapi-specs/compute/34-00/desc/logs/system_download_get.md @@ -4,7 +4,7 @@ This endpoint will return the system debug logs with `tar.gz` file extension. The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/pcf-droplets/addresses_get.md b/openapi-specs/compute/34-00/desc/pcf-droplets/addresses_get.md index 257a47455..bb3365015 100644 --- a/openapi-specs/compute/34-00/desc/pcf-droplets/addresses_get.md +++ b/openapi-specs/compute/34-00/desc/pcf-droplets/addresses_get.md @@ -5,7 +5,7 @@ You can also add optional query parameters to this API call, in this example `cl The following example curl command retrieves the list of addresses: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/pcf-droplets/download_get.md b/openapi-specs/compute/34-00/desc/pcf-droplets/download_get.md index ad761e744..ac8546a25 100644 --- a/openapi-specs/compute/34-00/desc/pcf-droplets/download_get.md +++ b/openapi-specs/compute/34-00/desc/pcf-droplets/download_get.md @@ -3,7 +3,7 @@ This endpoint will download the list of configured cloud controller addresses co The following example curl command retrieves the list of addresses and outputs it to a file call `PCF_blobstores.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/pcf-droplets/get.md b/openapi-specs/compute/34-00/desc/pcf-droplets/get.md index 930d16948..aad607cba 100644 --- a/openapi-specs/compute/34-00/desc/pcf-droplets/get.md +++ b/openapi-specs/compute/34-00/desc/pcf-droplets/get.md @@ -3,7 +3,7 @@ This endpoint will return the full metadata of PCF blobstore from page **Monitor The following example curl command will retrieve this: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/pcf-droplets/scan_post.md b/openapi-specs/compute/34-00/desc/pcf-droplets/scan_post.md index 34e75b26c..d9c9df4dd 100644 --- a/openapi-specs/compute/34-00/desc/pcf-droplets/scan_post.md +++ b/openapi-specs/compute/34-00/desc/pcf-droplets/scan_post.md @@ -3,7 +3,7 @@ This endpoint will kick off a scan of the any PCF Blobstores you have configured Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/pcf-droplets/stop_post.md b/openapi-specs/compute/34-00/desc/pcf-droplets/stop_post.md index 94c376972..2c4d5264a 100644 --- a/openapi-specs/compute/34-00/desc/pcf-droplets/stop_post.md +++ b/openapi-specs/compute/34-00/desc/pcf-droplets/stop_post.md @@ -3,7 +3,7 @@ This endpoint will instruct the PFC Defenders to stop scanning. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/policies/compliance_ci_images_get.md b/openapi-specs/compute/34-00/desc/policies/compliance_ci_images_get.md index f97130a97..9a2b2abf5 100644 --- a/openapi-specs/compute/34-00/desc/policies/compliance_ci_images_get.md +++ b/openapi-specs/compute/34-00/desc/policies/compliance_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > CI** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/policies/compliance_ci_serverless_get.md b/openapi-specs/compute/34-00/desc/policies/compliance_ci_serverless_get.md index 59195f070..2f30e2d74 100644 --- a/openapi-specs/compute/34-00/desc/policies/compliance_ci_serverless_get.md +++ b/openapi-specs/compute/34-00/desc/policies/compliance_ci_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Functions > CI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/policies/compliance_container_get.md b/openapi-specs/compute/34-00/desc/policies/compliance_container_get.md index 7f10245ea..657d4f2dd 100644 --- a/openapi-specs/compute/34-00/desc/policies/compliance_container_get.md +++ b/openapi-specs/compute/34-00/desc/policies/compliance_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > Deployed** Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/policies/compliance_container_impacted_get.md b/openapi-specs/compute/34-00/desc/policies/compliance_container_impacted_get.md index 607bfa3c8..de9e0ee77 100644 --- a/openapi-specs/compute/34-00/desc/policies/compliance_container_impacted_get.md +++ b/openapi-specs/compute/34-00/desc/policies/compliance_container_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of containers captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/compliance/container/impacted?ruleName=' diff --git a/openapi-specs/compute/34-00/desc/policies/compliance_host_get.md b/openapi-specs/compute/34-00/desc/policies/compliance_host_get.md index c029ecf7f..a5e429af5 100755 --- a/openapi-specs/compute/34-00/desc/policies/compliance_host_get.md +++ b/openapi-specs/compute/34-00/desc/policies/compliance_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Hosts > Running hosts** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/policies/compliance_serverless_get.md b/openapi-specs/compute/34-00/desc/policies/compliance_serverless_get.md index c7de886c1..f559179f6 100755 --- a/openapi-specs/compute/34-00/desc/policies/compliance_serverless_get.md +++ b/openapi-specs/compute/34-00/desc/policies/compliance_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Functions > Functions** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/policies/compliance_vms_get.md b/openapi-specs/compute/34-00/desc/policies/compliance_vms_get.md index f7d7e1a49..b61d20d9d 100755 --- a/openapi-specs/compute/34-00/desc/policies/compliance_vms_get.md +++ b/openapi-specs/compute/34-00/desc/policies/compliance_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Hosts > VM ima The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/policies/compliance_vms_impacted_get.md b/openapi-specs/compute/34-00/desc/policies/compliance_vms_impacted_get.md index 9cf5b9d03..4ac3f2832 100644 --- a/openapi-specs/compute/34-00/desc/policies/compliance_vms_impacted_get.md +++ b/openapi-specs/compute/34-00/desc/policies/compliance_vms_impacted_get.md @@ -8,7 +8,7 @@ Use query parameters to retrieve the list of impacted resources by *account ID*, Refer to the following example cURL command, which retrieves a list of impacted resources: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/policies/docker_get.md b/openapi-specs/compute/34-00/desc/policies/docker_get.md index f56872c67..e8ab3d5bb 100644 --- a/openapi-specs/compute/34-00/desc/policies/docker_get.md +++ b/openapi-specs/compute/34-00/desc/policies/docker_get.md @@ -3,7 +3,7 @@ Retrieves a list of all access control rules for Docker Engine commands. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/policies/docker_put.md b/openapi-specs/compute/34-00/desc/policies/docker_put.md index 860e2bb1e..a5d0c0230 100644 --- a/openapi-specs/compute/34-00/desc/policies/docker_put.md +++ b/openapi-specs/compute/34-00/desc/policies/docker_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove Docker access control rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/docker \ | jq '.' > docker_access_control_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove Docker access control rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/34-00/desc/policies/firewall_app-embedded_get.md b/openapi-specs/compute/34-00/desc/policies/firewall_app-embedded_get.md index 3da2a7cd6..4e59c4c21 100644 --- a/openapi-specs/compute/34-00/desc/policies/firewall_app-embedded_get.md +++ b/openapi-specs/compute/34-00/desc/policies/firewall_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > App-Embedded** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/policies/firewall_app_container_get.md b/openapi-specs/compute/34-00/desc/policies/firewall_app_container_get.md index 3b8c157fa..f0486aa4c 100644 --- a/openapi-specs/compute/34-00/desc/policies/firewall_app_container_get.md +++ b/openapi-specs/compute/34-00/desc/policies/firewall_app_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Container** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/container' diff --git a/openapi-specs/compute/34-00/desc/policies/firewall_app_host_get.md b/openapi-specs/compute/34-00/desc/policies/firewall_app_host_get.md index adb90128a..75c22add4 100644 --- a/openapi-specs/compute/34-00/desc/policies/firewall_app_host_get.md +++ b/openapi-specs/compute/34-00/desc/policies/firewall_app_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Host** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/policies/firewall_app_network_list_get.md b/openapi-specs/compute/34-00/desc/policies/firewall_app_network_list_get.md index 13f7fb450..5a1f87d85 100644 --- a/openapi-specs/compute/34-00/desc/policies/firewall_app_network_list_get.md +++ b/openapi-specs/compute/34-00/desc/policies/firewall_app_network_list_get.md @@ -11,7 +11,7 @@ This endpoint maps to **Defend > WAAS > Network lists** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/network-list' diff --git a/openapi-specs/compute/34-00/desc/policies/firewall_app_out-of-band_get.md b/openapi-specs/compute/34-00/desc/policies/firewall_app_out-of-band_get.md index d4f72d041..9ae662687 100644 --- a/openapi-specs/compute/34-00/desc/policies/firewall_app_out-of-band_get.md +++ b/openapi-specs/compute/34-00/desc/policies/firewall_app_out-of-band_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/policies/firewall_app_out-of-band_impacted_get.md b/openapi-specs/compute/34-00/desc/policies/firewall_app_out-of-band_impacted_get.md index 25d2c6691..96a427f94 100644 --- a/openapi-specs/compute/34-00/desc/policies/firewall_app_out-of-band_impacted_get.md +++ b/openapi-specs/compute/34-00/desc/policies/firewall_app_out-of-band_impacted_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/policies/firewall_app_rasp_get.md b/openapi-specs/compute/34-00/desc/policies/firewall_app_rasp_get.md index 15d481cf3..a201d3beb 100644 --- a/openapi-specs/compute/34-00/desc/policies/firewall_app_rasp_get.md +++ b/openapi-specs/compute/34-00/desc/policies/firewall_app_rasp_get.md @@ -1,7 +1,7 @@ Retrieves a list of all application firewall (CNAF) rules for RASP. ``` -$ curl -k \ +$ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp ``` diff --git a/openapi-specs/compute/34-00/desc/policies/firewall_app_rasp_put.md b/openapi-specs/compute/34-00/desc/policies/firewall_app_rasp_put.md index 04ba86483..1101c7690 100644 --- a/openapi-specs/compute/34-00/desc/policies/firewall_app_rasp_put.md +++ b/openapi-specs/compute/34-00/desc/policies/firewall_app_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp \ | jq '.' > app_firewall_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/34-00/desc/policies/firewall_app_serverless_get.md b/openapi-specs/compute/34-00/desc/policies/firewall_app_serverless_get.md index d19e909f3..90cac0015 100644 --- a/openapi-specs/compute/34-00/desc/policies/firewall_app_serverless_get.md +++ b/openapi-specs/compute/34-00/desc/policies/firewall_app_serverless_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Serverless** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/serverless' diff --git a/openapi-specs/compute/34-00/desc/policies/firewall_network_container_get.md b/openapi-specs/compute/34-00/desc/policies/firewall_network_container_get.md index 3f1343b53..82e656818 100644 --- a/openapi-specs/compute/34-00/desc/policies/firewall_network_container_get.md +++ b/openapi-specs/compute/34-00/desc/policies/firewall_network_container_get.md @@ -4,7 +4,7 @@ Retrieves a list of all CNNS container and host rules. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/policies/firewall_network_container_put.md b/openapi-specs/compute/34-00/desc/policies/firewall_network_container_put.md index fd9263430..cffb3f1c4 100644 --- a/openapi-specs/compute/34-00/desc/policies/firewall_network_container_put.md +++ b/openapi-specs/compute/34-00/desc/policies/firewall_network_container_put.md @@ -9,7 +9,7 @@ The procedure to add, edit, or remove rules is: Refer to the following example cURL command that retrieves a list of all rules, pretty-print the JSON response, and save the results to a file: ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -26,7 +26,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/34-00/desc/policies/firewall_network_entities_get.md b/openapi-specs/compute/34-00/desc/policies/firewall_network_entities_get.md index 757121f70..28ed8dbcb 100644 --- a/openapi-specs/compute/34-00/desc/policies/firewall_network_entities_get.md +++ b/openapi-specs/compute/34-00/desc/policies/firewall_network_entities_get.md @@ -1,7 +1,7 @@ Retrieves a list of all CNNF network objects. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/policies/firewall_network_entities_put.md b/openapi-specs/compute/34-00/desc/policies/firewall_network_entities_put.md index 83c023286..39044ee10 100644 --- a/openapi-specs/compute/34-00/desc/policies/firewall_network_entities_put.md +++ b/openapi-specs/compute/34-00/desc/policies/firewall_network_entities_put.md @@ -3,7 +3,7 @@ Updates the list of CNNF network objects. The following example curl command updates the network objects. There is an example of all three types (images,subnets, and applications ): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-00/desc/policies/policies.md b/openapi-specs/compute/34-00/desc/policies/policies.md index 69768c03d..97be7b616 100644 --- a/openapi-specs/compute/34-00/desc/policies/policies.md +++ b/openapi-specs/compute/34-00/desc/policies/policies.md @@ -21,7 +21,7 @@ To add, edit, or remove vulnerability rules from a policy: For example, the following cURL command uses basic auth to retrieve a list of all image vulnerability rules, pretty-prints the JSON response, and saves the results to a `vulnerability_rules.json` file. ```bash - $ curl -k \ + $ curl \ -u \ https:///api/v1/policies/runtime/host \ | jq '.' > vulnerability_rules.json @@ -36,7 +36,7 @@ To add, edit, or remove vulnerability rules from a policy: **Note:** Remember to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -107,7 +107,7 @@ Use the `PUT` method to delete all rules by submitting an empty JSON object. For example, to delete all host runtime rules: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-00/desc/policies/runtime_app-embedded_get.md b/openapi-specs/compute/34-00/desc/policies/runtime_app-embedded_get.md index fcf0ba8b9..517b741bb 100755 --- a/openapi-specs/compute/34-00/desc/policies/runtime_app-embedded_get.md +++ b/openapi-specs/compute/34-00/desc/policies/runtime_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > App-Embedded policy** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/policies/runtime_container_get.md b/openapi-specs/compute/34-00/desc/policies/runtime_container_get.md index f1b50b727..65cd10660 100644 --- a/openapi-specs/compute/34-00/desc/policies/runtime_container_get.md +++ b/openapi-specs/compute/34-00/desc/policies/runtime_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Container policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/policies/runtime_container_impacted_get.md b/openapi-specs/compute/34-00/desc/policies/runtime_container_impacted_get.md index 195f75547..e026d33b9 100644 --- a/openapi-specs/compute/34-00/desc/policies/runtime_container_impacted_get.md +++ b/openapi-specs/compute/34-00/desc/policies/runtime_container_impacted_get.md @@ -6,7 +6,7 @@ In the Console UI, you can see how it works by going to the **Defend > Runtime > Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ $ curl -k \ For additional help with your `ruleName`: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/policies/runtime_host_get.md b/openapi-specs/compute/34-00/desc/policies/runtime_host_get.md index 38800596c..559ef690a 100644 --- a/openapi-specs/compute/34-00/desc/policies/runtime_host_get.md +++ b/openapi-specs/compute/34-00/desc/policies/runtime_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Host policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/policies/runtime_rasp_get.md b/openapi-specs/compute/34-00/desc/policies/runtime_rasp_get.md index 5b7a76457..55a6ff05b 100644 --- a/openapi-specs/compute/34-00/desc/policies/runtime_rasp_get.md +++ b/openapi-specs/compute/34-00/desc/policies/runtime_rasp_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your RASP runtime policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/policies/runtime_rasp_put.md b/openapi-specs/compute/34-00/desc/policies/runtime_rasp_put.md index bba60ba81..f71fb4b93 100644 --- a/openapi-specs/compute/34-00/desc/policies/runtime_rasp_put.md +++ b/openapi-specs/compute/34-00/desc/policies/runtime_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve the rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET @@ -24,7 +24,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -H "Content-Type:application/json" \ -X PUT \ diff --git a/openapi-specs/compute/34-00/desc/policies/runtime_serverless_get.md b/openapi-specs/compute/34-00/desc/policies/runtime_serverless_get.md index 44326bbf6..c98489e16 100644 --- a/openapi-specs/compute/34-00/desc/policies/runtime_serverless_get.md +++ b/openapi-specs/compute/34-00/desc/policies/runtime_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Serverless policy** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/policies/secrets_get.md b/openapi-specs/compute/34-00/desc/policies/secrets_get.md index 89e6b9c0e..cb4ecb37c 100644 --- a/openapi-specs/compute/34-00/desc/policies/secrets_get.md +++ b/openapi-specs/compute/34-00/desc/policies/secrets_get.md @@ -3,7 +3,7 @@ Retrieves a list of all secrets rules. The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/policies/secrets diff --git a/openapi-specs/compute/34-00/desc/policies/secrets_put.md b/openapi-specs/compute/34-00/desc/policies/secrets_put.md index 1e8877ca1..04fd41f24 100644 --- a/openapi-specs/compute/34-00/desc/policies/secrets_put.md +++ b/openapi-specs/compute/34-00/desc/policies/secrets_put.md @@ -10,7 +10,7 @@ The procedure to add, edit, or remove secrets rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/secrets \ | jq '.' > secrets_rules.json @@ -24,7 +24,7 @@ The procedure to add, edit, or remove secrets rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/34-00/desc/policies/trust_get.md b/openapi-specs/compute/34-00/desc/policies/trust_get.md index 8de1ba409..0805d6777 100644 --- a/openapi-specs/compute/34-00/desc/policies/trust_get.md +++ b/openapi-specs/compute/34-00/desc/policies/trust_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/policies/trust_put.md b/openapi-specs/compute/34-00/desc/policies/trust_put.md index fccd4b91e..7fec72031 100644 --- a/openapi-specs/compute/34-00/desc/policies/trust_put.md +++ b/openapi-specs/compute/34-00/desc/policies/trust_put.md @@ -1,7 +1,7 @@ Updates the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-00/desc/policies/vulnerability_ci_images_get.md b/openapi-specs/compute/34-00/desc/policies/vulnerability_ci_images_get.md index abc3da8fa..ce0d50a29 100644 --- a/openapi-specs/compute/34-00/desc/policies/vulnerability_ci_images_get.md +++ b/openapi-specs/compute/34-00/desc/policies/vulnerability_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/policies/vulnerability_ci_serverless_get.md b/openapi-specs/compute/34-00/desc/policies/vulnerability_ci_serverless_get.md index 958c86495..6fb5f93ce 100644 --- a/openapi-specs/compute/34-00/desc/policies/vulnerability_ci_serverless_get.md +++ b/openapi-specs/compute/34-00/desc/policies/vulnerability_ci_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/policies/vulnerability_coderepos_get.md b/openapi-specs/compute/34-00/desc/policies/vulnerability_coderepos_get.md index 08dfed8e1..a4ac62f33 100644 --- a/openapi-specs/compute/34-00/desc/policies/vulnerability_coderepos_get.md +++ b/openapi-specs/compute/34-00/desc/policies/vulnerability_coderepos_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Code repositories** in the Co Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/vulnerability/coderepos' diff --git a/openapi-specs/compute/34-00/desc/policies/vulnerability_coderepos_impacted_get.md b/openapi-specs/compute/34-00/desc/policies/vulnerability_coderepos_impacted_get.md index a401a12c4..e64ef768e 100644 --- a/openapi-specs/compute/34-00/desc/policies/vulnerability_coderepos_impacted_get.md +++ b/openapi-specs/compute/34-00/desc/policies/vulnerability_coderepos_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/coderepos/impacted?project=&ruleName=' ``` diff --git a/openapi-specs/compute/34-00/desc/policies/vulnerability_coderepos_put.md b/openapi-specs/compute/34-00/desc/policies/vulnerability_coderepos_put.md index 514eec136..a002415b9 100644 --- a/openapi-specs/compute/34-00/desc/policies/vulnerability_coderepos_put.md +++ b/openapi-specs/compute/34-00/desc/policies/vulnerability_coderepos_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Code repo Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT 'https:///api/v/policies/vulnerability/coderepos' \ diff --git a/openapi-specs/compute/34-00/desc/policies/vulnerability_host_get.md b/openapi-specs/compute/34-00/desc/policies/vulnerability_host_get.md index 3b9b14b9c..260da7675 100644 --- a/openapi-specs/compute/34-00/desc/policies/vulnerability_host_get.md +++ b/openapi-specs/compute/34-00/desc/policies/vulnerability_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Hosts > Running hosts** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/policies/vulnerability_host_impacted_get.md b/openapi-specs/compute/34-00/desc/policies/vulnerability_host_impacted_get.md index 346368518..f44592830 100644 --- a/openapi-specs/compute/34-00/desc/policies/vulnerability_host_impacted_get.md +++ b/openapi-specs/compute/34-00/desc/policies/vulnerability_host_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by `RULE_NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/host/impacted?project={PROJECT_NAME}&ruleName={RULE_NAME}' ``` diff --git a/openapi-specs/compute/34-00/desc/policies/vulnerability_images_get.md b/openapi-specs/compute/34-00/desc/policies/vulnerability_images_get.md index 33581be37..57359bb8f 100644 --- a/openapi-specs/compute/34-00/desc/policies/vulnerability_images_get.md +++ b/openapi-specs/compute/34-00/desc/policies/vulnerability_images_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images?project=" diff --git a/openapi-specs/compute/34-00/desc/policies/vulnerability_images_impacted_get.md b/openapi-specs/compute/34-00/desc/policies/vulnerability_images_impacted_get.md index ae1d5e396..e2a4efa23 100644 --- a/openapi-specs/compute/34-00/desc/policies/vulnerability_images_impacted_get.md +++ b/openapi-specs/compute/34-00/desc/policies/vulnerability_images_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of images caught by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images/impacted?project=&ruleName=" diff --git a/openapi-specs/compute/34-00/desc/policies/vulnerability_images_put.md b/openapi-specs/compute/34-00/desc/policies/vulnerability_images_put.md index b3330dab7..8c3cc8af2 100644 --- a/openapi-specs/compute/34-00/desc/policies/vulnerability_images_put.md +++ b/openapi-specs/compute/34-00/desc/policies/vulnerability_images_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -X PUT 'https:///api/v/policies/vulnerability/images' \ --data '{ diff --git a/openapi-specs/compute/34-00/desc/policies/vulnerability_serverless_get.md b/openapi-specs/compute/34-00/desc/policies/vulnerability_serverless_get.md index c7a8e2ef5..41c7e75d8 100644 --- a/openapi-specs/compute/34-00/desc/policies/vulnerability_serverless_get.md +++ b/openapi-specs/compute/34-00/desc/policies/vulnerability_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Functions** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/policies/vulnerability_serverless_put.md b/openapi-specs/compute/34-00/desc/policies/vulnerability_serverless_put.md index 2b567b5b1..5199f0997 100644 --- a/openapi-specs/compute/34-00/desc/policies/vulnerability_serverless_put.md +++ b/openapi-specs/compute/34-00/desc/policies/vulnerability_serverless_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k 'https:///api/v/policies/vulnerability/serverless' \ +$ curl 'https:///api/v/policies/vulnerability/serverless' \ -X PUT \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/34-00/desc/policies/vulnerability_vms_get.md b/openapi-specs/compute/34-00/desc/policies/vulnerability_vms_get.md index 117d2cc4a..e37c1520f 100644 --- a/openapi-specs/compute/34-00/desc/policies/vulnerability_vms_get.md +++ b/openapi-specs/compute/34-00/desc/policies/vulnerability_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Hosts > V The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/policies/vulnerability_vms_impacted_get.md b/openapi-specs/compute/34-00/desc/policies/vulnerability_vms_impacted_get.md index 29d9621ea..f1a7f7ef5 100644 --- a/openapi-specs/compute/34-00/desc/policies/vulnerability_vms_impacted_get.md +++ b/openapi-specs/compute/34-00/desc/policies/vulnerability_vms_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/vms?project=&ruleName=' ``` diff --git a/openapi-specs/compute/34-00/desc/profiles/app-embedded_download_get.md b/openapi-specs/compute/34-00/desc/profiles/app-embedded_download_get.md index 4b3f7ff8a..2e8cac56d 100644 --- a/openapi-specs/compute/34-00/desc/profiles/app-embedded_download_get.md +++ b/openapi-specs/compute/34-00/desc/profiles/app-embedded_download_get.md @@ -5,7 +5,7 @@ Downloads the app-embedded observations in a CSV format. Refer to the following example cURL command that downloads all the app-embedded runtime profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/profiles/app-embedded_get.md b/openapi-specs/compute/34-00/desc/profiles/app-embedded_get.md index f3ddb3125..c332061e5 100644 --- a/openapi-specs/compute/34-00/desc/profiles/app-embedded_get.md +++ b/openapi-specs/compute/34-00/desc/profiles/app-embedded_get.md @@ -5,7 +5,7 @@ Retrieves the app-embedded observations. Refer to the following example cURL command that lists all the app-embedded runtime: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/profiles/container_download_get.md b/openapi-specs/compute/34-00/desc/profiles/container_download_get.md index ad7a86101..ee9d5e9e4 100644 --- a/openapi-specs/compute/34-00/desc/profiles/container_download_get.md +++ b/openapi-specs/compute/34-00/desc/profiles/container_download_get.md @@ -6,7 +6,7 @@ Retrieves the details and state of all runtime models in CSV format. Refer to the following example cURL command that downloads a complete list in CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/profiles/container_filters_get.md b/openapi-specs/compute/34-00/desc/profiles/container_filters_get.md index 8b6122b80..13535b520 100644 --- a/openapi-specs/compute/34-00/desc/profiles/container_filters_get.md +++ b/openapi-specs/compute/34-00/desc/profiles/container_filters_get.md @@ -4,7 +4,7 @@ Returns a list of os and images from page monitor/runtime/container-models in Co Example curl command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/profiles/container_get.md b/openapi-specs/compute/34-00/desc/profiles/container_get.md index cdbc24c3e..59a3764fb 100644 --- a/openapi-specs/compute/34-00/desc/profiles/container_get.md +++ b/openapi-specs/compute/34-00/desc/profiles/container_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of all runtime models. Refer to the following example cURL command that lists all runtime models in a system: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/profiles/container_learn_post.md b/openapi-specs/compute/34-00/desc/profiles/container_learn_post.md index 5fef2e31e..2c1d08af1 100644 --- a/openapi-specs/compute/34-00/desc/profiles/container_learn_post.md +++ b/openapi-specs/compute/34-00/desc/profiles/container_learn_post.md @@ -7,7 +7,7 @@ For more information, refer to [Learning mode](https://docs.prismacloud.io/en/cl Refer to the following example cURL command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/profiles/host_download_get.md b/openapi-specs/compute/34-00/desc/profiles/host_download_get.md index ace270a32..2dfb51ec0 100644 --- a/openapi-specs/compute/34-00/desc/profiles/host_download_get.md +++ b/openapi-specs/compute/34-00/desc/profiles/host_download_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of each host service runtime model in CSV format Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/profiles/host_get.md b/openapi-specs/compute/34-00/desc/profiles/host_get.md index 208a24de3..55d8bf8ff 100644 --- a/openapi-specs/compute/34-00/desc/profiles/host_get.md +++ b/openapi-specs/compute/34-00/desc/profiles/host_get.md @@ -15,7 +15,7 @@ The returned JSON object has the following structure: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/profiles/host_id_rule_get.md b/openapi-specs/compute/34-00/desc/profiles/host_id_rule_get.md index 672cb4c62..8be668fca 100644 --- a/openapi-specs/compute/34-00/desc/profiles/host_id_rule_get.md +++ b/openapi-specs/compute/34-00/desc/profiles/host_id_rule_get.md @@ -10,7 +10,7 @@ This is the `PROFILE_ID`. The following example command uses curl and basic auth to specify the learning mode for a profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/profiles/service_download_get.md b/openapi-specs/compute/34-00/desc/profiles/service_download_get.md index 63dff3354..4c1c431c1 100644 --- a/openapi-specs/compute/34-00/desc/profiles/service_download_get.md +++ b/openapi-specs/compute/34-00/desc/profiles/service_download_get.md @@ -1,7 +1,7 @@ Retrieves the details and state of all host service runtime models in CSV format ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/profiles/service_get.md b/openapi-specs/compute/34-00/desc/profiles/service_get.md index a4f8c348d..5d786d919 100644 --- a/openapi-specs/compute/34-00/desc/profiles/service_get.md +++ b/openapi-specs/compute/34-00/desc/profiles/service_get.md @@ -10,7 +10,7 @@ The returned JSON object has the following structure: Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/profiles/service_id_learn_post.md b/openapi-specs/compute/34-00/desc/profiles/service_id_learn_post.md index fb338b80d..fa85fc3a2 100644 --- a/openapi-specs/compute/34-00/desc/profiles/service_id_learn_post.md +++ b/openapi-specs/compute/34-00/desc/profiles/service_id_learn_post.md @@ -11,7 +11,7 @@ The `PROFILE_ID` is typically the service's name, such as `sshd` or `ntpd`. The following example command uses curl and basic auth to specify the learning mode for a host service profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/profiles/service_learn_post.md b/openapi-specs/compute/34-00/desc/profiles/service_learn_post.md index 02a1f299e..ceff8e5a5 100644 --- a/openapi-specs/compute/34-00/desc/profiles/service_learn_post.md +++ b/openapi-specs/compute/34-00/desc/profiles/service_learn_post.md @@ -3,7 +3,7 @@ Specify the learning mode for all host service profiles. The following example command uses curl and basic auth to specify the learning mode for all host service profiles. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/profiles/service_names_get.md b/openapi-specs/compute/34-00/desc/profiles/service_names_get.md index 7da863545..afae56f0d 100644 --- a/openapi-specs/compute/34-00/desc/profiles/service_names_get.md +++ b/openapi-specs/compute/34-00/desc/profiles/service_names_get.md @@ -3,7 +3,7 @@ Retrieves the name of all host service runtime models from within the app at **M The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/projects/get.md b/openapi-specs/compute/34-00/desc/projects/get.md index 05485c24c..1ac04d2c0 100644 --- a/openapi-specs/compute/34-00/desc/projects/get.md +++ b/openapi-specs/compute/34-00/desc/projects/get.md @@ -3,7 +3,7 @@ Lists all projects visible to the given user. Assuming the given user is an admin, the following example curl command would list all projects: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/projects/name_delete.md b/openapi-specs/compute/34-00/desc/projects/name_delete.md index fba889f7e..0a34e72a2 100644 --- a/openapi-specs/compute/34-00/desc/projects/name_delete.md +++ b/openapi-specs/compute/34-00/desc/projects/name_delete.md @@ -6,7 +6,7 @@ The value for `` can be retrieved from the `_id` field in the resp The DELETE method returns the decommissioned supervisor's admin username and password. ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/compute/34-00/desc/projects/name_put.md b/openapi-specs/compute/34-00/desc/projects/name_put.md index b5a83a67d..1bde9b0c7 100644 --- a/openapi-specs/compute/34-00/desc/projects/name_put.md +++ b/openapi-specs/compute/34-00/desc/projects/name_put.md @@ -4,7 +4,7 @@ The following example curl command updates a project named ``. The value for `` can be retrieved from the `_id` field in the response object from `GET /api/v1/projects`. ```bash -$ curl -k \ +$ curl \ -u \ -X PUT \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/compute/34-00/desc/projects/post.md b/openapi-specs/compute/34-00/desc/projects/post.md index 8862c0fd4..38c574173 100644 --- a/openapi-specs/compute/34-00/desc/projects/post.md +++ b/openapi-specs/compute/34-00/desc/projects/post.md @@ -3,7 +3,7 @@ Provisions a new project. The following example curl command provisions a new project named `my-project`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ $ curl -k \ If you have installed a new instance of Console, and you have already created an initial admin user for it, then you can specify the admin username name and password when you provision the project. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/projects/projects.md b/openapi-specs/compute/34-00/desc/projects/projects.md index 7e7dcff66..19c904e9e 100644 --- a/openapi-specs/compute/34-00/desc/projects/projects.md +++ b/openapi-specs/compute/34-00/desc/projects/projects.md @@ -20,7 +20,7 @@ If `project` is not specified, it is set to `Central+Console`. For example, to retrieve the compliance policies for a tenant project named `mobile_payments_division`, use the following curl command: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/radar/container_clean_post.md b/openapi-specs/compute/34-00/desc/radar/container_clean_post.md index 662b6d53f..d4f87e91e 100644 --- a/openapi-specs/compute/34-00/desc/radar/container_clean_post.md +++ b/openapi-specs/compute/34-00/desc/radar/container_clean_post.md @@ -1,7 +1,7 @@ Cleans the container runtime profiles and Radar entities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/radar/container_delete.md b/openapi-specs/compute/34-00/desc/radar/container_delete.md index 4eabe337f..b6cc69cf2 100644 --- a/openapi-specs/compute/34-00/desc/radar/container_delete.md +++ b/openapi-specs/compute/34-00/desc/radar/container_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-00/desc/radar/container_export_get.md b/openapi-specs/compute/34-00/desc/radar/container_export_get.md index 7f577568f..f776c7e6c 100644 --- a/openapi-specs/compute/34-00/desc/radar/container_export_get.md +++ b/openapi-specs/compute/34-00/desc/radar/container_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for containers) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/radar/container_filters_get.md b/openapi-specs/compute/34-00/desc/radar/container_filters_get.md index f66463da1..8d7cd6df3 100644 --- a/openapi-specs/compute/34-00/desc/radar/container_filters_get.md +++ b/openapi-specs/compute/34-00/desc/radar/container_filters_get.md @@ -1,7 +1,7 @@ Returns the namespaces from the container view on the Radar page. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/radar/container_get.md b/openapi-specs/compute/34-00/desc/radar/container_get.md index 280d683d9..404629a25 100644 --- a/openapi-specs/compute/34-00/desc/radar/container_get.md +++ b/openapi-specs/compute/34-00/desc/radar/container_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (container view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/radar/host_delete.md b/openapi-specs/compute/34-00/desc/radar/host_delete.md index 738fa7a7c..b4910a8b7 100644 --- a/openapi-specs/compute/34-00/desc/radar/host_delete.md +++ b/openapi-specs/compute/34-00/desc/radar/host_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two apps in CNNF for hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-00/desc/radar/host_export_get.md b/openapi-specs/compute/34-00/desc/radar/host_export_get.md index dd91b5335..851d6f40f 100644 --- a/openapi-specs/compute/34-00/desc/radar/host_export_get.md +++ b/openapi-specs/compute/34-00/desc/radar/host_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for hosts) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/radar/host_get.md b/openapi-specs/compute/34-00/desc/radar/host_get.md index a12025856..222d075aa 100644 --- a/openapi-specs/compute/34-00/desc/radar/host_get.md +++ b/openapi-specs/compute/34-00/desc/radar/host_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (host view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/radar/serverless_get.md b/openapi-specs/compute/34-00/desc/radar/serverless_get.md index b2f329149..170cfb48d 100644 --- a/openapi-specs/compute/34-00/desc/radar/serverless_get.md +++ b/openapi-specs/compute/34-00/desc/radar/serverless_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/radar/serverless_progress_get.md b/openapi-specs/compute/34-00/desc/radar/serverless_progress_get.md index a11c1ae20..0808dfbf4 100644 --- a/openapi-specs/compute/34-00/desc/radar/serverless_progress_get.md +++ b/openapi-specs/compute/34-00/desc/radar/serverless_progress_get.md @@ -1,7 +1,7 @@ Returns the scan progress from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/radar/serverless_scan_post.md b/openapi-specs/compute/34-00/desc/radar/serverless_scan_post.md index 0d519ba88..2d444ac88 100644 --- a/openapi-specs/compute/34-00/desc/radar/serverless_scan_post.md +++ b/openapi-specs/compute/34-00/desc/radar/serverless_scan_post.md @@ -1,7 +1,7 @@ Initiates a serverless scan of your environments. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/radar/serverless_stop_post.md b/openapi-specs/compute/34-00/desc/radar/serverless_stop_post.md index 5c0bdf186..f15bef34d 100644 --- a/openapi-specs/compute/34-00/desc/radar/serverless_stop_post.md +++ b/openapi-specs/compute/34-00/desc/radar/serverless_stop_post.md @@ -1,7 +1,7 @@ Stops an in-progress serverless scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/rbac/role_delete.md b/openapi-specs/compute/34-00/desc/rbac/role_delete.md index 87015b6e8..46efcf9c9 100644 --- a/openapi-specs/compute/34-00/desc/rbac/role_delete.md +++ b/openapi-specs/compute/34-00/desc/rbac/role_delete.md @@ -4,7 +4,7 @@ System roles and roles assigned to users/groups cannot be deleted. The following example curl command uses basic auth to delete role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-00/desc/rbac/roles_get.md b/openapi-specs/compute/34-00/desc/rbac/roles_get.md index 4cd1d9bc7..112026937 100644 --- a/openapi-specs/compute/34-00/desc/rbac/roles_get.md +++ b/openapi-specs/compute/34-00/desc/rbac/roles_get.md @@ -3,7 +3,7 @@ This endpoint will return a list in JSON format of the roles can be found under The following example curl command uses basic auth to return: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/rbac/roles_post.md b/openapi-specs/compute/34-00/desc/rbac/roles_post.md index 1f20772ce..6988766e8 100644 --- a/openapi-specs/compute/34-00/desc/rbac/roles_post.md +++ b/openapi-specs/compute/34-00/desc/rbac/roles_post.md @@ -37,7 +37,7 @@ The added role must contain the "user" permission with read-write access. This p The following example curl command uses basic auth to create the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/rbac/roles_put.md b/openapi-specs/compute/34-00/desc/rbac/roles_put.md index 34d7b41a7..f62e34ccb 100644 --- a/openapi-specs/compute/34-00/desc/rbac/roles_put.md +++ b/openapi-specs/compute/34-00/desc/rbac/roles_put.md @@ -38,7 +38,7 @@ The updated role must contain the "user" permission with read-write access. This The following example curl command uses basic auth to update the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-00/desc/recovery/backup_get.md b/openapi-specs/compute/34-00/desc/recovery/backup_get.md index 4da46f356..bf735905a 100644 --- a/openapi-specs/compute/34-00/desc/recovery/backup_get.md +++ b/openapi-specs/compute/34-00/desc/recovery/backup_get.md @@ -3,7 +3,7 @@ Returns a list of available backups. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/recovery/backup_id_delete.md b/openapi-specs/compute/34-00/desc/recovery/backup_id_delete.md index ae9c33e90..80cd4c3f6 100644 --- a/openapi-specs/compute/34-00/desc/recovery/backup_id_delete.md +++ b/openapi-specs/compute/34-00/desc/recovery/backup_id_delete.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-00/desc/recovery/backup_id_patch.md b/openapi-specs/compute/34-00/desc/recovery/backup_id_patch.md index 4a78cd67d..b3699972f 100644 --- a/openapi-specs/compute/34-00/desc/recovery/backup_id_patch.md +++ b/openapi-specs/compute/34-00/desc/recovery/backup_id_patch.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/compute/34-00/desc/recovery/backup_post.md b/openapi-specs/compute/34-00/desc/recovery/backup_post.md index f45161712..41436fe5f 100644 --- a/openapi-specs/compute/34-00/desc/recovery/backup_post.md +++ b/openapi-specs/compute/34-00/desc/recovery/backup_post.md @@ -3,7 +3,7 @@ Creates a backup named `backup_name` by invoking the MongoDB dump process. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/recovery/restore_id_post.md b/openapi-specs/compute/34-00/desc/recovery/restore_id_post.md index 850fceeaa..e424641cc 100644 --- a/openapi-specs/compute/34-00/desc/recovery/restore_id_post.md +++ b/openapi-specs/compute/34-00/desc/recovery/restore_id_post.md @@ -5,7 +5,7 @@ Restores Prisma Cloud Compute from the given backup. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/registry/download_get.md b/openapi-specs/compute/34-00/desc/registry/download_get.md index 5a3eb0141..3eef8d50e 100644 --- a/openapi-specs/compute/34-00/desc/registry/download_get.md +++ b/openapi-specs/compute/34-00/desc/registry/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Compliance > Images > Reg Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/registry/get.md b/openapi-specs/compute/34-00/desc/registry/get.md index e8b87080e..208b2f1e3 100644 --- a/openapi-specs/compute/34-00/desc/registry/get.md +++ b/openapi-specs/compute/34-00/desc/registry/get.md @@ -21,7 +21,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that retrieves a scan report for all images in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -33,7 +33,7 @@ The compact query can be used to get a general overview of the number of Vulnera Refer to the following cURL command that retrieves a compact scan report for the Ubuntu image in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -44,7 +44,7 @@ The name query is synonymous with the filter registry text field in the Console Refer to the following cURL that retrieves the scan report for the image in the registry with the matching **sha256** hash: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -54,7 +54,7 @@ $ curl -k \ Refer to the following cURL command that retrieves the images in the first 10 registries: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/registry/get_registry_progress.md b/openapi-specs/compute/34-00/desc/registry/get_registry_progress.md index ddc319c1b..cc6feac3d 100644 --- a/openapi-specs/compute/34-00/desc/registry/get_registry_progress.md +++ b/openapi-specs/compute/34-00/desc/registry/get_registry_progress.md @@ -11,7 +11,7 @@ For a regular scan, use the API path only without any query parameters. Refer to the following example cURL request that retrieves the ongoing scan details for a regular registry scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -61,7 +61,7 @@ For an on-demand scan that is started using the `/registry/scan` endpoint with t Refer to the following example cURL request that retrieves the ongoing scan details for an on-demand registry scan that is started using the `/registry/scan` endpoint for the repository `alpine` with tag `3.16`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/registry/names_get.md b/openapi-specs/compute/34-00/desc/registry/names_get.md index 6933a570c..25afb48b8 100644 --- a/openapi-specs/compute/34-00/desc/registry/names_get.md +++ b/openapi-specs/compute/34-00/desc/registry/names_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command that retrieves a list of image names from your scanned registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/registry/scan_post.md b/openapi-specs/compute/34-00/desc/registry/scan_post.md index ce7e19533..96bfd5f16 100644 --- a/openapi-specs/compute/34-00/desc/registry/scan_post.md +++ b/openapi-specs/compute/34-00/desc/registry/scan_post.md @@ -17,7 +17,7 @@ For information on scan result, see [Get Registry Scan Report](https://prisma.pa Refer to the following example cURL command that forces Prisma Cloud Compute to rescan all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -27,7 +27,7 @@ $ curl -k \ Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan a specific image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -52,7 +52,7 @@ For information on scan result, see [Get Registry Scan Report](https://pan.dev/p Refer to the following example cURL command to trigger an on-demand scan for an image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/registry/stop_post.md b/openapi-specs/compute/34-00/desc/registry/stop_post.md index 29e103ac1..05ac2f436 100644 --- a/openapi-specs/compute/34-00/desc/registry/stop_post.md +++ b/openapi-specs/compute/34-00/desc/registry/stop_post.md @@ -5,7 +5,7 @@ Stops current registry scan immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to stop scanning all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/scans/download_get.md b/openapi-specs/compute/34-00/desc/scans/download_get.md index 61a0ccc2d..3785bf562 100644 --- a/openapi-specs/compute/34-00/desc/scans/download_get.md +++ b/openapi-specs/compute/34-00/desc/scans/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Images The following cURL command retrieves and saves your Jenkins and twistcli scan reports to a CSV file called `scans_report.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/scans/filter_get.md b/openapi-specs/compute/34-00/desc/scans/filter_get.md index 58550ad35..df3e9cdb0 100644 --- a/openapi-specs/compute/34-00/desc/scans/filter_get.md +++ b/openapi-specs/compute/34-00/desc/scans/filter_get.md @@ -3,7 +3,7 @@ Retrieves the list of Jenkins projects that have been scanned by the Jenkins plu The following example curl command uses basic auth to retrieve the list of Jenkins project names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/scans/get.md b/openapi-specs/compute/34-00/desc/scans/get.md index e28506972..107b733bd 100644 --- a/openapi-specs/compute/34-00/desc/scans/get.md +++ b/openapi-specs/compute/34-00/desc/scans/get.md @@ -11,7 +11,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command that retrieves the scan reports for all images scanned using the Jenkins CI plugin or the twistcli tool: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -23,7 +23,7 @@ To get the report of a specific scan, add query parameters to narrow the scope o The following cURL command retrieves the scan report for an image with a SHA256 ID of `sha256:f756e84300d8e53006090573dd33abe5b8cfac3e42d104fc4be37f435fe512f3`. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/scans/id_get.md b/openapi-specs/compute/34-00/desc/scans/id_get.md index 7a342ef60..1557b1905 100644 --- a/openapi-specs/compute/34-00/desc/scans/id_get.md +++ b/openapi-specs/compute/34-00/desc/scans/id_get.md @@ -3,7 +3,7 @@ Retrieves all scan reports for images scanned by the Jenkins plugin or twistcli The following example curl command uses basic auth to retrieve the scan report for just an image with a SHA256 ID of `5c3385fd2e76c5c16124c077`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/scripts/console_sh_get.md b/openapi-specs/compute/34-00/desc/scripts/console_sh_get.md index d8f02038f..1622321ca 100644 --- a/openapi-specs/compute/34-00/desc/scripts/console_sh_get.md +++ b/openapi-specs/compute/34-00/desc/scripts/console_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/scripts/defender_ps1_get.md b/openapi-specs/compute/34-00/desc/scripts/defender_ps1_get.md index a47616983..45e4a6133 100644 --- a/openapi-specs/compute/34-00/desc/scripts/defender_ps1_get.md +++ b/openapi-specs/compute/34-00/desc/scripts/defender_ps1_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/scripts/defender_sh_get.md b/openapi-specs/compute/34-00/desc/scripts/defender_sh_get.md index 98ad6cf62..a8a302426 100644 --- a/openapi-specs/compute/34-00/desc/scripts/defender_sh_get.md +++ b/openapi-specs/compute/34-00/desc/scripts/defender_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/serverless/download_get.md b/openapi-specs/compute/34-00/desc/serverless/download_get.md index a8e49ff25..4d7d3adc1 100644 --- a/openapi-specs/compute/34-00/desc/serverless/download_get.md +++ b/openapi-specs/compute/34-00/desc/serverless/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Functio The following cURL command retrieves a list of all serverless resources monitored by Prisma Cloud Compute and saves the results in a CSV file called `serverless.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/serverless/download' \ diff --git a/openapi-specs/compute/34-00/desc/serverless/embed_post.md b/openapi-specs/compute/34-00/desc/serverless/embed_post.md index 6cce784b8..353b5721c 100644 --- a/openapi-specs/compute/34-00/desc/serverless/embed_post.md +++ b/openapi-specs/compute/34-00/desc/serverless/embed_post.md @@ -1,7 +1,7 @@ The following curl command uses basic auth to retrieve a list of all Serverless resources that monitored by Prisma Cloud Compute, and save the results to a CSV file: ```bash -$ curl -k \ +$ curl \ -X POST \ -H "Content-Type: application/octet-stream" \ -u \ diff --git a/openapi-specs/compute/34-00/desc/serverless/get.md b/openapi-specs/compute/34-00/desc/serverless/get.md index aee50492f..430ee065a 100644 --- a/openapi-specs/compute/34-00/desc/serverless/get.md +++ b/openapi-specs/compute/34-00/desc/serverless/get.md @@ -11,7 +11,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Functions > Scanned function Refer to the following example cURL command that retrieves the scan reports for serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/serverless/names_get.md b/openapi-specs/compute/34-00/desc/serverless/names_get.md index 3cab17092..90285574a 100644 --- a/openapi-specs/compute/34-00/desc/serverless/names_get.md +++ b/openapi-specs/compute/34-00/desc/serverless/names_get.md @@ -5,7 +5,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo The following curl command uses basic auth to retrieve a list of names of all Serverless resources monitored by Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -X GET \ -H "Content-Type: application/json" \ -u \ diff --git a/openapi-specs/compute/34-00/desc/serverless/scan_post.md b/openapi-specs/compute/34-00/desc/serverless/scan_post.md index 159285349..70a3a3b4e 100644 --- a/openapi-specs/compute/34-00/desc/serverless/scan_post.md +++ b/openapi-specs/compute/34-00/desc/serverless/scan_post.md @@ -5,7 +5,7 @@ Re-scan all serverless functions immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/scan diff --git a/openapi-specs/compute/34-00/desc/serverless/stop_post.md b/openapi-specs/compute/34-00/desc/serverless/stop_post.md index 763710842..67c0d2239 100644 --- a/openapi-specs/compute/34-00/desc/serverless/stop_post.md +++ b/openapi-specs/compute/34-00/desc/serverless/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing serverless scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/stop diff --git a/openapi-specs/compute/34-00/desc/settings/alerts_get.md b/openapi-specs/compute/34-00/desc/settings/alerts_get.md index 060114c39..2b25dc6c9 100644 --- a/openapi-specs/compute/34-00/desc/settings/alerts_get.md +++ b/openapi-specs/compute/34-00/desc/settings/alerts_get.md @@ -1,7 +1,7 @@ Retrieves a list of your alert settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/settings/alerts_options_get.md b/openapi-specs/compute/34-00/desc/settings/alerts_options_get.md index 095c1f1b7..aa7a1d250 100644 --- a/openapi-specs/compute/34-00/desc/settings/alerts_options_get.md +++ b/openapi-specs/compute/34-00/desc/settings/alerts_options_get.md @@ -3,7 +3,7 @@ This endpoint will return the alert profile configuration options that can be fo The following example curl command uses basic auth to retrieve all alert profile configuration options: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/settings/alerts_post.md b/openapi-specs/compute/34-00/desc/settings/alerts_post.md index 3acb8d543..cd303f880 100644 --- a/openapi-specs/compute/34-00/desc/settings/alerts_post.md +++ b/openapi-specs/compute/34-00/desc/settings/alerts_post.md @@ -3,7 +3,7 @@ Configure alerts. The following example curl command sets the aggregation period for alerts to one hour. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/settings/certificates_post.md b/openapi-specs/compute/34-00/desc/settings/certificates_post.md index fbdc8a5a9..bd30ea399 100644 --- a/openapi-specs/compute/34-00/desc/settings/certificates_post.md +++ b/openapi-specs/compute/34-00/desc/settings/certificates_post.md @@ -9,7 +9,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to set the validity period for client certificates to seven days: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/34-00/desc/settings/certs_get.md b/openapi-specs/compute/34-00/desc/settings/certs_get.md index ba6674a3c..dbf1d3790 100644 --- a/openapi-specs/compute/34-00/desc/settings/certs_get.md +++ b/openapi-specs/compute/34-00/desc/settings/certs_get.md @@ -6,7 +6,7 @@ Defenders use these names to connect to Console. Refer to the following example cURL request that uses basic auth to retrieve the SANs in Console's cert: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/settings/certs_post.md b/openapi-specs/compute/34-00/desc/settings/certs_post.md index a6e429006..fb2cedee5 100644 --- a/openapi-specs/compute/34-00/desc/settings/certs_post.md +++ b/openapi-specs/compute/34-00/desc/settings/certs_post.md @@ -12,7 +12,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to add `node-01.example.com` to the `subjectAltName` field in the certificate: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/34-00/desc/settings/coderepos_get.md b/openapi-specs/compute/34-00/desc/settings/coderepos_get.md index 6cbfb78cb..286a8d905 100644 --- a/openapi-specs/compute/34-00/desc/settings/coderepos_get.md +++ b/openapi-specs/compute/34-00/desc/settings/coderepos_get.md @@ -20,7 +20,7 @@ Construct the full webhook using Console's publicly accessible DNS name or IP ad Refer to the following example cURL command that retrieves all code repositories to scan, as well as the webhook URL suffix: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/settings/console-certificates_post.md b/openapi-specs/compute/34-00/desc/settings/console-certificates_post.md index 5673af840..392061c8f 100644 --- a/openapi-specs/compute/34-00/desc/settings/console-certificates_post.md +++ b/openapi-specs/compute/34-00/desc/settings/console-certificates_post.md @@ -9,7 +9,7 @@ For the custom TLS certificate for securing browser access, this file must be in Refer to the following example cURL request that uses basic auth and configures the custom certificate to use for securing browser access to the console: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/settings/custom-labels_get.md b/openapi-specs/compute/34-00/desc/settings/custom-labels_get.md index a849dd8a8..19c1cadde 100644 --- a/openapi-specs/compute/34-00/desc/settings/custom-labels_get.md +++ b/openapi-specs/compute/34-00/desc/settings/custom-labels_get.md @@ -5,7 +5,7 @@ Returns the list of alert labels configured in Prisma Cloud Compute. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/settings/custom-labels_post.md b/openapi-specs/compute/34-00/desc/settings/custom-labels_post.md index 6bb66e706..9b0702fe8 100644 --- a/openapi-specs/compute/34-00/desc/settings/custom-labels_post.md +++ b/openapi-specs/compute/34-00/desc/settings/custom-labels_post.md @@ -5,7 +5,7 @@ Creates a custom alert label to augment audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/settings/defender_get.md b/openapi-specs/compute/34-00/desc/settings/defender_get.md index ecb8b6989..cf43bb304 100644 --- a/openapi-specs/compute/34-00/desc/settings/defender_get.md +++ b/openapi-specs/compute/34-00/desc/settings/defender_get.md @@ -5,7 +5,7 @@ Returns the advanced settings for Defenders. Refer to the following example cURL command that gets all advanced settings for Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/settings/forensic_get.md b/openapi-specs/compute/34-00/desc/settings/forensic_get.md index 9c16b70b9..3486b2bf9 100644 --- a/openapi-specs/compute/34-00/desc/settings/forensic_get.md +++ b/openapi-specs/compute/34-00/desc/settings/forensic_get.md @@ -1,7 +1,7 @@ Retrieves the settings for the forensics system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/settings/forensic_post.md b/openapi-specs/compute/34-00/desc/settings/forensic_post.md index 31f809d39..8943842fb 100644 --- a/openapi-specs/compute/34-00/desc/settings/forensic_post.md +++ b/openapi-specs/compute/34-00/desc/settings/forensic_post.md @@ -3,7 +3,7 @@ Configures the forensics system. The following example curl command allocates 100 MB of local disk space for container forensic data and 10 MB for host forensics data. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/settings/initialized_get.md b/openapi-specs/compute/34-00/desc/settings/initialized_get.md index 3134912d1..2af8462f1 100644 --- a/openapi-specs/compute/34-00/desc/settings/initialized_get.md +++ b/openapi-specs/compute/34-00/desc/settings/initialized_get.md @@ -4,7 +4,7 @@ After first installing Console, the first thing you must do is create an admin a Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/settings/intelligence-windows_post.md b/openapi-specs/compute/34-00/desc/settings/intelligence-windows_post.md index c39e256d2..0721dab3b 100644 --- a/openapi-specs/compute/34-00/desc/settings/intelligence-windows_post.md +++ b/openapi-specs/compute/34-00/desc/settings/intelligence-windows_post.md @@ -3,7 +3,7 @@ This endpoint will enable or disable the Windows Intelligence Service from **Man The following example curl command uses basic auth to enable online updates of Windows vulnerabilities from the intelligence stream: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/settings/intelligence_get.md b/openapi-specs/compute/34-00/desc/settings/intelligence_get.md index 26c694246..15e9f24ae 100644 --- a/openapi-specs/compute/34-00/desc/settings/intelligence_get.md +++ b/openapi-specs/compute/34-00/desc/settings/intelligence_get.md @@ -5,7 +5,7 @@ Returns the details about the Intelligence Stream configuration. Refer to the following example cURL command that uses basic auth to retrieve your Intelligence Stream configuration settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/settings/intelligence_post.md b/openapi-specs/compute/34-00/desc/settings/intelligence_post.md index 74b06a3a0..2dbbd0168 100644 --- a/openapi-specs/compute/34-00/desc/settings/intelligence_post.md +++ b/openapi-specs/compute/34-00/desc/settings/intelligence_post.md @@ -7,7 +7,7 @@ For more information, see [Intelligence Stream](https://docs.paloaltonetworks.co Refer to the following example cURL command that uses basic auth to configure settings of your Intelligence Stream. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/settings/latest-version_get.md b/openapi-specs/compute/34-00/desc/settings/latest-version_get.md index c443fa7b5..16601fb5b 100644 --- a/openapi-specs/compute/34-00/desc/settings/latest-version_get.md +++ b/openapi-specs/compute/34-00/desc/settings/latest-version_get.md @@ -3,7 +3,7 @@ Retrieves the version number of the latest available Prisma Cloud Compute releas Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/settings/latest_version_get.md b/openapi-specs/compute/34-00/desc/settings/latest_version_get.md index 18e436668..5c64edff1 100644 --- a/openapi-specs/compute/34-00/desc/settings/latest_version_get.md +++ b/openapi-specs/compute/34-00/desc/settings/latest_version_get.md @@ -1,7 +1,7 @@ This endpoint will return the latest version of the product. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/settings/ldap_get.md b/openapi-specs/compute/34-00/desc/settings/ldap_get.md index 4ad0ad0c9..7d803ba1c 100644 --- a/openapi-specs/compute/34-00/desc/settings/ldap_get.md +++ b/openapi-specs/compute/34-00/desc/settings/ldap_get.md @@ -5,7 +5,7 @@ Returns the LDAP integration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/settings/ldap_post.md b/openapi-specs/compute/34-00/desc/settings/ldap_post.md index c152c7dc5..34bc06ef4 100644 --- a/openapi-specs/compute/34-00/desc/settings/ldap_post.md +++ b/openapi-specs/compute/34-00/desc/settings/ldap_post.md @@ -7,7 +7,7 @@ For more information, see [Active Directory](https://docs.paloaltonetworks.com/p Refer to the following example cURL command that enables the LDAP integration and specifies the parameters required to integrate with an Active Directory service. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/settings/license_get.md b/openapi-specs/compute/34-00/desc/settings/license_get.md index 5c792cae8..2b4b548e3 100644 --- a/openapi-specs/compute/34-00/desc/settings/license_get.md +++ b/openapi-specs/compute/34-00/desc/settings/license_get.md @@ -5,7 +5,7 @@ Returns the details about the installed license. Refer to the following example cURL request that retrieves the license details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/settings/license_post.md b/openapi-specs/compute/34-00/desc/settings/license_post.md index b77800a5f..ce74b0d0f 100644 --- a/openapi-specs/compute/34-00/desc/settings/license_post.md +++ b/openapi-specs/compute/34-00/desc/settings/license_post.md @@ -8,7 +8,7 @@ For more information, see [Licensing](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to set your license: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/settings/logging_get.md b/openapi-specs/compute/34-00/desc/settings/logging_get.md index 6eda3e484..012be5def 100644 --- a/openapi-specs/compute/34-00/desc/settings/logging_get.md +++ b/openapi-specs/compute/34-00/desc/settings/logging_get.md @@ -5,7 +5,7 @@ Returns the logging settings. Refer to the following example cURL request that uses basic auth to retrieve your logging details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/settings/logging_post.md b/openapi-specs/compute/34-00/desc/settings/logging_post.md index 3619d9c0f..8d27ee1b3 100644 --- a/openapi-specs/compute/34-00/desc/settings/logging_post.md +++ b/openapi-specs/compute/34-00/desc/settings/logging_post.md @@ -8,7 +8,7 @@ For more information, see [Logging](https://docs.paloaltonetworks.com/prisma/pri Refer to the following example cURL request that enables verbose scan output for syslog and stdout: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/settings/logon_get.md b/openapi-specs/compute/34-00/desc/settings/logon_get.md index 1559f2405..b1e9164f2 100644 --- a/openapi-specs/compute/34-00/desc/settings/logon_get.md +++ b/openapi-specs/compute/34-00/desc/settings/logon_get.md @@ -5,7 +5,7 @@ Configures the logon settings. Refer to the following example cURL request that uses basic auth to retrieve all current logon settings. ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/settings/logon_post.md b/openapi-specs/compute/34-00/desc/settings/logon_post.md index 5c2b60c9f..691e082fe 100644 --- a/openapi-specs/compute/34-00/desc/settings/logon_post.md +++ b/openapi-specs/compute/34-00/desc/settings/logon_post.md @@ -7,7 +7,7 @@ For more information, see [Logon Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that uses basic auth to set the timeout to 900 seconds (15 minutes): ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/34-00/desc/settings/oauth_get.md b/openapi-specs/compute/34-00/desc/settings/oauth_get.md index 6dcf70fb5..5d997f016 100644 --- a/openapi-specs/compute/34-00/desc/settings/oauth_get.md +++ b/openapi-specs/compute/34-00/desc/settings/oauth_get.md @@ -5,7 +5,7 @@ Returns the OAuth configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/settings/oauth_post.md b/openapi-specs/compute/34-00/desc/settings/oauth_post.md index c593b9237..da3c83d2f 100644 --- a/openapi-specs/compute/34-00/desc/settings/oauth_post.md +++ b/openapi-specs/compute/34-00/desc/settings/oauth_post.md @@ -7,7 +7,7 @@ For more information, see [GitHub OAuth](https://docs.paloaltonetworks.com/prism Refer to the following example cURL response: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/settings/oidc_get.md b/openapi-specs/compute/34-00/desc/settings/oidc_get.md index ee439622b..1f27f93ba 100644 --- a/openapi-specs/compute/34-00/desc/settings/oidc_get.md +++ b/openapi-specs/compute/34-00/desc/settings/oidc_get.md @@ -5,7 +5,7 @@ Returns the OpenID Connect configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/settings/oidc_post.md b/openapi-specs/compute/34-00/desc/settings/oidc_post.md index e0270247e..5bd3a9192 100644 --- a/openapi-specs/compute/34-00/desc/settings/oidc_post.md +++ b/openapi-specs/compute/34-00/desc/settings/oidc_post.md @@ -7,7 +7,7 @@ For more information, see [OIDC](https://docs.paloaltonetworks.com/prisma/prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/settings/pcf_get.md b/openapi-specs/compute/34-00/desc/settings/pcf_get.md index 5dc21eb17..c5e42a823 100644 --- a/openapi-specs/compute/34-00/desc/settings/pcf_get.md +++ b/openapi-specs/compute/34-00/desc/settings/pcf_get.md @@ -3,7 +3,7 @@ This endpoint will return settings for PCF (Pivotal Cloud Foundry)Blobstore scan The following example curl command uses basic auth to retrieve the current PCF Blobstore scanning settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/settings/pcf_post.md b/openapi-specs/compute/34-00/desc/settings/pcf_post.md index 139e947cb..657e14f27 100644 --- a/openapi-specs/compute/34-00/desc/settings/pcf_post.md +++ b/openapi-specs/compute/34-00/desc/settings/pcf_post.md @@ -3,7 +3,7 @@ This endpoint will allow for updating settings for PCF (Pivotal Cloud Foundry) B The following example curl command uses basic auth to set up a PCF Blobstore scanner that scans the last `5` droplets for every droplet in the PCF Blobstore: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/settings/projects_get.md b/openapi-specs/compute/34-00/desc/settings/projects_get.md index f5dd20395..bc95414a1 100644 --- a/openapi-specs/compute/34-00/desc/settings/projects_get.md +++ b/openapi-specs/compute/34-00/desc/settings/projects_get.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command retrieves the state of the Projects feature from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ All API calls must be proxied through Central Console, where the request is auto To retrieve the Projects settings from a supervisor Console, append the `project` query parameter to your request. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/settings/projects_post.md b/openapi-specs/compute/34-00/desc/settings/projects_post.md index d29f8e9d5..b3472e6b9 100644 --- a/openapi-specs/compute/34-00/desc/settings/projects_post.md +++ b/openapi-specs/compute/34-00/desc/settings/projects_post.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command designates `` as master. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/settings/proxy_get.md b/openapi-specs/compute/34-00/desc/settings/proxy_get.md index 9a4922d59..477563069 100644 --- a/openapi-specs/compute/34-00/desc/settings/proxy_get.md +++ b/openapi-specs/compute/34-00/desc/settings/proxy_get.md @@ -5,7 +5,7 @@ Returns the proxy settings for Prisma Cloud Compute containers to access the Int Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/settings/proxy_post.md b/openapi-specs/compute/34-00/desc/settings/proxy_post.md index a1bdc07ed..df926524e 100644 --- a/openapi-specs/compute/34-00/desc/settings/proxy_post.md +++ b/openapi-specs/compute/34-00/desc/settings/proxy_post.md @@ -7,7 +7,7 @@ For more information, see [Proxy Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that specifies the proxy to use to access the Internet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/settings/registry_get.md b/openapi-specs/compute/34-00/desc/settings/registry_get.md index 12745005d..64e70b698 100644 --- a/openapi-specs/compute/34-00/desc/settings/registry_get.md +++ b/openapi-specs/compute/34-00/desc/settings/registry_get.md @@ -17,7 +17,7 @@ Construct the full webhook using the publicly accessible DNS name or IP address, The following cURL command retrieves all the registries to scan and the URL suffix for the registry's webhook URL suffix. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/settings/registry_post.md b/openapi-specs/compute/34-00/desc/settings/registry_post.md index efabf4e67..decf80a65 100644 --- a/openapi-specs/compute/34-00/desc/settings/registry_post.md +++ b/openapi-specs/compute/34-00/desc/settings/registry_post.md @@ -30,7 +30,7 @@ The API response returns an HTTP 400 error if the number of registry specificati Refer to the following example cURL command that configures Prisma Cloud Compute to scan the Ubuntu 16.04 repository on Docker Hub: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -64,7 +64,7 @@ To add settings for a GitLab Container Registry, you must specify the following Refer to the following example cURL command: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/settings/registry_put.md b/openapi-specs/compute/34-00/desc/settings/registry_put.md index 3768914f6..75d6c79a2 100644 --- a/openapi-specs/compute/34-00/desc/settings/registry_put.md +++ b/openapi-specs/compute/34-00/desc/settings/registry_put.md @@ -127,7 +127,7 @@ To remove a registry from the list: To delete all entries, submit an empty `specifications` array. For example: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-00/desc/settings/saml_get.md b/openapi-specs/compute/34-00/desc/settings/saml_get.md index f2228a440..4fb940e80 100644 --- a/openapi-specs/compute/34-00/desc/settings/saml_get.md +++ b/openapi-specs/compute/34-00/desc/settings/saml_get.md @@ -5,7 +5,7 @@ Returns the configured SAML settings that is used to authenticate to the Prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/settings/saml_post.md b/openapi-specs/compute/34-00/desc/settings/saml_post.md index 0bd9c4a25..dfe8d380f 100644 --- a/openapi-specs/compute/34-00/desc/settings/saml_post.md +++ b/openapi-specs/compute/34-00/desc/settings/saml_post.md @@ -7,7 +7,7 @@ For more information, see [Okta via SAML 2.0](https://docs.paloaltonetworks.com/ Refer to the following example cURL request that uses the basic auth to set up and enable the SAML integration with Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/settings/scan_get.md b/openapi-specs/compute/34-00/desc/settings/scan_get.md index 5c1df30a2..543ea7662 100644 --- a/openapi-specs/compute/34-00/desc/settings/scan_get.md +++ b/openapi-specs/compute/34-00/desc/settings/scan_get.md @@ -5,7 +5,7 @@ Returns the global settings for image, host, container, and registry scanning. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/settings/scan_post.md b/openapi-specs/compute/34-00/desc/settings/scan_post.md index f043d1c9f..9ddb521a2 100644 --- a/openapi-specs/compute/34-00/desc/settings/scan_post.md +++ b/openapi-specs/compute/34-00/desc/settings/scan_post.md @@ -9,7 +9,7 @@ Refer to the following example cURL request that configures the following scan i * Scan images, containers, and hosts once per day. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/settings/secrets_get.md b/openapi-specs/compute/34-00/desc/settings/secrets_get.md index 75e2b32c7..339009641 100644 --- a/openapi-specs/compute/34-00/desc/settings/secrets_get.md +++ b/openapi-specs/compute/34-00/desc/settings/secrets_get.md @@ -3,7 +3,7 @@ This endpoint will return configured secret store already configured in the cons The following example curl command retrieves any configured secret stores, as well as the refresh period in hours: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/settings/secrets_post.md b/openapi-specs/compute/34-00/desc/settings/secrets_post.md index d302ecdf8..730d031bf 100644 --- a/openapi-specs/compute/34-00/desc/settings/secrets_post.md +++ b/openapi-specs/compute/34-00/desc/settings/secrets_post.md @@ -5,7 +5,7 @@ Please note the data structure returned from endpoint /settings/secrets GET to s Refer to the following example curl command that adds a CyberArk secret store to the console with the appID set to `Prisma_Cloud_Compute_Console` and set the URL to `https://services-myca.twistlock.com:10882`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/settings/serverless-scan_get.md b/openapi-specs/compute/34-00/desc/settings/serverless-scan_get.md index bb8ce06ba..eb42e4a12 100644 --- a/openapi-specs/compute/34-00/desc/settings/serverless-scan_get.md +++ b/openapi-specs/compute/34-00/desc/settings/serverless-scan_get.md @@ -8,7 +8,7 @@ This endpoint maps to the **Function scope** table data in the **Defend > Vulner Refer to the following example cURL command that retrieves a list of serverless scan scopes: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/settings/serverless_get.md b/openapi-specs/compute/34-00/desc/settings/serverless_get.md index b6122c460..8c654807c 100644 --- a/openapi-specs/compute/34-00/desc/settings/serverless_get.md +++ b/openapi-specs/compute/34-00/desc/settings/serverless_get.md @@ -3,7 +3,7 @@ This endpoint will return any configured serverless function scanners found in * The following example curl command uses basic auth to retrieve serverless settings in an array, sorted by Cloud Provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/settings/serverless_post.md b/openapi-specs/compute/34-00/desc/settings/serverless_post.md index 6e26ea1d3..c0e0f3225 100644 --- a/openapi-specs/compute/34-00/desc/settings/serverless_post.md +++ b/openapi-specs/compute/34-00/desc/settings/serverless_post.md @@ -3,7 +3,7 @@ This endpoint will add serverless function providers to scan for vulnerabilities The following example curl command uses basic auth to add a serverless account to scan for serverless functions. This is assuming that you already have the [credential](https://docs.twistlock.com/docs/latest/configure/credentials_store.html) added to the console that is needed to scan that provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/settings/system_get.md b/openapi-specs/compute/34-00/desc/settings/system_get.md index 6f893abf0..0e8a3cba3 100644 --- a/openapi-specs/compute/34-00/desc/settings/system_get.md +++ b/openapi-specs/compute/34-00/desc/settings/system_get.md @@ -3,7 +3,7 @@ This endpoint will return all system settings in JSON format. The following example curl command does exactly that: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/settings/tas_get.md b/openapi-specs/compute/34-00/desc/settings/tas_get.md index 52f392433..d2d0017f0 100644 --- a/openapi-specs/compute/34-00/desc/settings/tas_get.md +++ b/openapi-specs/compute/34-00/desc/settings/tas_get.md @@ -5,7 +5,7 @@ Retrieves Tanzu Application Service (TAS) settings. Refer to the following example cURL command that retrieves all TAS settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/settings/telemetry_get.md b/openapi-specs/compute/34-00/desc/settings/telemetry_get.md index 6460c3fc3..46a807e77 100644 --- a/openapi-specs/compute/34-00/desc/settings/telemetry_get.md +++ b/openapi-specs/compute/34-00/desc/settings/telemetry_get.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that retrieves the settings if telemetry is enabled or not: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/settings/telemetry_post.md b/openapi-specs/compute/34-00/desc/settings/telemetry_post.md index bc97a6d0f..662846f33 100644 --- a/openapi-specs/compute/34-00/desc/settings/telemetry_post.md +++ b/openapi-specs/compute/34-00/desc/settings/telemetry_post.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to turn off telemetry: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/settings/trusted_certificate_post.md b/openapi-specs/compute/34-00/desc/settings/trusted_certificate_post.md index 5a2a30bda..c54b96fa5 100644 --- a/openapi-specs/compute/34-00/desc/settings/trusted_certificate_post.md +++ b/openapi-specs/compute/34-00/desc/settings/trusted_certificate_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/trusted-certificates` endpoint. Refer to the following example cURL request that uses basic auth to add a certificate to the list: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/34-00/desc/settings/trusted_certificates_post.md b/openapi-specs/compute/34-00/desc/settings/trusted_certificates_post.md index 78c07982b..e9bdc72a1 100644 --- a/openapi-specs/compute/34-00/desc/settings/trusted_certificates_post.md +++ b/openapi-specs/compute/34-00/desc/settings/trusted_certificates_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/certificates` endpoint. Refer to the following example cURL request that uses basic auth to enable this feature: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/34-00/desc/settings/vm_get.md b/openapi-specs/compute/34-00/desc/settings/vm_get.md index 8043742f5..b98b94240 100644 --- a/openapi-specs/compute/34-00/desc/settings/vm_get.md +++ b/openapi-specs/compute/34-00/desc/settings/vm_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **VM images scope** table data in the **Defend > Vulne Refer to the following example cURL command that retrieves all the scopes used for pattern matching on VM functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/signup/post.md b/openapi-specs/compute/34-00/desc/signup/post.md index 1db21df29..67344a0b1 100644 --- a/openapi-specs/compute/34-00/desc/signup/post.md +++ b/openapi-specs/compute/34-00/desc/signup/post.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i The following cURL command creates the initial admin user with the username `admin` and password `password`. ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -X POST \ -d '{"username": "admin", "password": "password"}' \ diff --git a/openapi-specs/compute/34-00/desc/static/capabilities_get.md b/openapi-specs/compute/34-00/desc/static/capabilities_get.md index ea119d2a9..f9b60278c 100644 --- a/openapi-specs/compute/34-00/desc/static/capabilities_get.md +++ b/openapi-specs/compute/34-00/desc/static/capabilities_get.md @@ -1,7 +1,7 @@ Returns a list of capabilities used in host models. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/static/regions_get.md b/openapi-specs/compute/34-00/desc/static/regions_get.md index 4a07097ee..3b1adb5f1 100644 --- a/openapi-specs/compute/34-00/desc/static/regions_get.md +++ b/openapi-specs/compute/34-00/desc/static/regions_get.md @@ -1,7 +1,7 @@ Returns a list of regions used in cloud radar. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/static/syscalls_get.md b/openapi-specs/compute/34-00/desc/static/syscalls_get.md index 9e2ddcde7..09505ba39 100644 --- a/openapi-specs/compute/34-00/desc/static/syscalls_get.md +++ b/openapi-specs/compute/34-00/desc/static/syscalls_get.md @@ -2,7 +2,7 @@ Returns a list of the Linux kernel system calls. Runtime rules for containers can allow-list and deny-list specific system calls. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/static/vulnerabilities_get.md b/openapi-specs/compute/34-00/desc/static/vulnerabilities_get.md index cb6acab28..19809472b 100644 --- a/openapi-specs/compute/34-00/desc/static/vulnerabilities_get.md +++ b/openapi-specs/compute/34-00/desc/static/vulnerabilities_get.md @@ -3,7 +3,7 @@ This data can be used for building out reports with the API. This data can be correlated with the `/api/v1/images` endpoint, specifically the the `complianceVulnerabilities` and `cveVulnerabilities` objects, to generate more thorough reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/stats/compliance.md b/openapi-specs/compute/34-00/desc/stats/compliance.md index 5c5be3991..4f4c90071 100644 --- a/openapi-specs/compute/34-00/desc/stats/compliance.md +++ b/openapi-specs/compute/34-00/desc/stats/compliance.md @@ -5,7 +5,7 @@ For the current day, the response will also include detailed compliance stats fo The following example command that uses curl and basic auth to retrieve compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/stats/compliance_get.md b/openapi-specs/compute/34-00/desc/stats/compliance_get.md index 314f6a179..2ef2f9f75 100644 --- a/openapi-specs/compute/34-00/desc/stats/compliance_get.md +++ b/openapi-specs/compute/34-00/desc/stats/compliance_get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Compliance > Compliance explorer* Refer to the following example cURL command that retrieves compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/stats/compliance_refresh.md b/openapi-specs/compute/34-00/desc/stats/compliance_refresh.md index b75491a69..d8ce211a8 100644 --- a/openapi-specs/compute/34-00/desc/stats/compliance_refresh.md +++ b/openapi-specs/compute/34-00/desc/stats/compliance_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/compliance endpoint return The following example command that uses curl and basic auth to refresh compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/stats/compliance_refresh_post.md b/openapi-specs/compute/34-00/desc/stats/compliance_refresh_post.md index 541a54d16..0f329d1db 100644 --- a/openapi-specs/compute/34-00/desc/stats/compliance_refresh_post.md +++ b/openapi-specs/compute/34-00/desc/stats/compliance_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/compliance`, b Refer to the following example cURL command that refreshes compliance statistics for the current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/stats/daily.md b/openapi-specs/compute/34-00/desc/stats/daily.md index 082f58a27..9fd4c6138 100644 --- a/openapi-specs/compute/34-00/desc/stats/daily.md +++ b/openapi-specs/compute/34-00/desc/stats/daily.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/stats/daily_get.md b/openapi-specs/compute/34-00/desc/stats/daily_get.md index 0db89bdc3..fe852126c 100644 --- a/openapi-specs/compute/34-00/desc/stats/daily_get.md +++ b/openapi-specs/compute/34-00/desc/stats/daily_get.md @@ -3,7 +3,7 @@ Returns a historical list of per-day statistics for the resources protected by P The following example command uses curl and basic auth to retrieve the daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/stats/dashboard.md b/openapi-specs/compute/34-00/desc/stats/dashboard.md index be90a2d32..1e5fabf08 100644 --- a/openapi-specs/compute/34-00/desc/stats/dashboard.md +++ b/openapi-specs/compute/34-00/desc/stats/dashboard.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/stats/dashboard_get.md b/openapi-specs/compute/34-00/desc/stats/dashboard_get.md index 601769645..8f0bc827c 100644 --- a/openapi-specs/compute/34-00/desc/stats/dashboard_get.md +++ b/openapi-specs/compute/34-00/desc/stats/dashboard_get.md @@ -5,7 +5,7 @@ Returns statistics about the resources protected by Prisma Cloud Compute, includ Refer to the following example cURL command that retrieves dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/stats/events_get.md b/openapi-specs/compute/34-00/desc/stats/events_get.md index 3be5eb4e7..e64f98e57 100644 --- a/openapi-specs/compute/34-00/desc/stats/events_get.md +++ b/openapi-specs/compute/34-00/desc/stats/events_get.md @@ -5,7 +5,7 @@ Returns events statistics for your environment. Refer to the following example cURL command retrieves event stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/stats/vulnerabilities.md b/openapi-specs/compute/34-00/desc/stats/vulnerabilities.md index 40c4dd1f1..199cfab62 100644 --- a/openapi-specs/compute/34-00/desc/stats/vulnerabilities.md +++ b/openapi-specs/compute/34-00/desc/stats/vulnerabilities.md @@ -5,7 +5,7 @@ For the current day, the response will also include descriptions of the CVEs cur The following example command that uses curl and basic auth to retrieve vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/stats/vulnerabilities_download_get.md b/openapi-specs/compute/34-00/desc/stats/vulnerabilities_download_get.md index 753af8c7f..9930a636b 100644 --- a/openapi-specs/compute/34-00/desc/stats/vulnerabilities_download_get.md +++ b/openapi-specs/compute/34-00/desc/stats/vulnerabilities_download_get.md @@ -17,7 +17,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a summary count of the CVEs and detailed descriptions for each CVE in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/stats/vulnerabilities_get.md b/openapi-specs/compute/34-00/desc/stats/vulnerabilities_get.md index 2fe5d4e18..978e96cfe 100644 --- a/openapi-specs/compute/34-00/desc/stats/vulnerabilities_get.md +++ b/openapi-specs/compute/34-00/desc/stats/vulnerabilities_get.md @@ -20,7 +20,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a summary count of the CVEs and detailed descriptions for each CVE: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/stats/vulnerabilities_impacted_resources_download_get.md b/openapi-specs/compute/34-00/desc/stats/vulnerabilities_impacted_resources_download_get.md index 0821d6a9f..502c09a6c 100644 --- a/openapi-specs/compute/34-00/desc/stats/vulnerabilities_impacted_resources_download_get.md +++ b/openapi-specs/compute/34-00/desc/stats/vulnerabilities_impacted_resources_download_get.md @@ -15,7 +15,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a list of impacted resources for `CVE-2015-0313` in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/stats/vulnerabilities_impacted_resources_get.md b/openapi-specs/compute/34-00/desc/stats/vulnerabilities_impacted_resources_get.md index c1e6d0ba2..014a5f4a2 100644 --- a/openapi-specs/compute/34-00/desc/stats/vulnerabilities_impacted_resources_get.md +++ b/openapi-specs/compute/34-00/desc/stats/vulnerabilities_impacted_resources_get.md @@ -18,7 +18,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a list of impacted resources for `CVE-2022-28391`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -95,7 +95,7 @@ Refer to the following example JSON response that shows the risk tree for the im Refer to the following example cURL command that retrieves a the impacted registry images `CVE-2015-0313` by using an optional query parameter `resourceType`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -108,7 +108,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a paginated list of impacted resources for `CVE-2015-0313` by using optional query parameters `limit` and `offset`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/stats/vulnerabilities_refresh.md b/openapi-specs/compute/34-00/desc/stats/vulnerabilities_refresh.md index 505a99d98..2aa7da8a1 100644 --- a/openapi-specs/compute/34-00/desc/stats/vulnerabilities_refresh.md +++ b/openapi-specs/compute/34-00/desc/stats/vulnerabilities_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/vulnerabilities endpoint r The following example command that uses curl and basic auth to refresh vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/stats/vulnerabilities_refresh_post.md b/openapi-specs/compute/34-00/desc/stats/vulnerabilities_refresh_post.md index 1e3210e18..85e3ddd7a 100644 --- a/openapi-specs/compute/34-00/desc/stats/vulnerabilities_refresh_post.md +++ b/openapi-specs/compute/34-00/desc/stats/vulnerabilities_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/vulnerabilitie Refer to the following example cURL command that refreshes the vulnerability statistics for current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/stats/workload_get.md b/openapi-specs/compute/34-00/desc/stats/workload_get.md index a25deed5c..940a835ee 100644 --- a/openapi-specs/compute/34-00/desc/stats/workload_get.md +++ b/openapi-specs/compute/34-00/desc/stats/workload_get.md @@ -1,7 +1,7 @@ Returns the workload statistics from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/statuses/intelligence.md b/openapi-specs/compute/34-00/desc/statuses/intelligence.md index 74da8c7ff..ac102e81f 100644 --- a/openapi-specs/compute/34-00/desc/statuses/intelligence.md +++ b/openapi-specs/compute/34-00/desc/statuses/intelligence.md @@ -3,7 +3,7 @@ Returns the connection status of the intelligence stream and the last intelligen The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/statuses/intelligence_get.md b/openapi-specs/compute/34-00/desc/statuses/intelligence_get.md index c18dd9611..b5f620ad9 100644 --- a/openapi-specs/compute/34-00/desc/statuses/intelligence_get.md +++ b/openapi-specs/compute/34-00/desc/statuses/intelligence_get.md @@ -3,7 +3,7 @@ Returns the connection status for the Intelligence Stream, along with the time o The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/statuses/registry_get.md b/openapi-specs/compute/34-00/desc/statuses/registry_get.md index 427c4915c..e4fd09fe9 100644 --- a/openapi-specs/compute/34-00/desc/statuses/registry_get.md +++ b/openapi-specs/compute/34-00/desc/statuses/registry_get.md @@ -13,7 +13,7 @@ To view the more details about the progress of a regular or on-demand registry s Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/statuses/secrets_get.md b/openapi-specs/compute/34-00/desc/statuses/secrets_get.md index 510f15161..e77c5ed70 100644 --- a/openapi-specs/compute/34-00/desc/statuses/secrets_get.md +++ b/openapi-specs/compute/34-00/desc/statuses/secrets_get.md @@ -3,7 +3,7 @@ Returns the connection status of any secret stores you have configured, as well The following is an example curl using basic auth to find the secret store status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/statuses/serverless-radar_get.md b/openapi-specs/compute/34-00/desc/statuses/serverless-radar_get.md index 3bfdbb5bf..4ab5d0c1d 100644 --- a/openapi-specs/compute/34-00/desc/statuses/serverless-radar_get.md +++ b/openapi-specs/compute/34-00/desc/statuses/serverless-radar_get.md @@ -1,7 +1,7 @@ Returns the status of the serverless scans. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/tags/get.md b/openapi-specs/compute/34-00/desc/tags/get.md index 6da7ad135..604eee98e 100644 --- a/openapi-specs/compute/34-00/desc/tags/get.md +++ b/openapi-specs/compute/34-00/desc/tags/get.md @@ -5,7 +5,7 @@ Retrieves a list of tags. Refer to the following example cURL command that retrieves a list of tags: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/tags/name_delete.md b/openapi-specs/compute/34-00/desc/tags/name_delete.md index 2ed010e57..6dedfce8f 100644 --- a/openapi-specs/compute/34-00/desc/tags/name_delete.md +++ b/openapi-specs/compute/34-00/desc/tags/name_delete.md @@ -5,7 +5,7 @@ Deletes a tag from the system. Refer to the following example cURL command that deletes a tag named *my tag*: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-00/desc/tags/name_put.md b/openapi-specs/compute/34-00/desc/tags/name_put.md index cbaea40d3..a5923b8ef 100644 --- a/openapi-specs/compute/34-00/desc/tags/name_put.md +++ b/openapi-specs/compute/34-00/desc/tags/name_put.md @@ -9,7 +9,7 @@ You must define all parameters in your PUT request. Refer to the following example cURL command that updates the parameters in a tag named `my_tag`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-00/desc/tags/post.md b/openapi-specs/compute/34-00/desc/tags/post.md index d55ae8b96..8e1a493d6 100644 --- a/openapi-specs/compute/34-00/desc/tags/post.md +++ b/openapi-specs/compute/34-00/desc/tags/post.md @@ -8,7 +8,7 @@ You can use tags as policy exceptions or assign them to vulnerabilities for acti Refer to the following example cURL command that creates a tag named "my-tag": ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/tags/tag_cve_delete.md b/openapi-specs/compute/34-00/desc/tags/tag_cve_delete.md index 8caed79cf..3031029b9 100644 --- a/openapi-specs/compute/34-00/desc/tags/tag_cve_delete.md +++ b/openapi-specs/compute/34-00/desc/tags/tag_cve_delete.md @@ -6,7 +6,7 @@ When you delete a tag, the tag is deleted from a wider scope. All the packages a Refer to the following example cURL command that removes the tag named `ignored` from the CVE `CVE-2017-15088`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-00/desc/tags/tag_cve_post.md b/openapi-specs/compute/34-00/desc/tags/tag_cve_post.md index 966a80bd8..1b4ead89b 100644 --- a/openapi-specs/compute/34-00/desc/tags/tag_cve_post.md +++ b/openapi-specs/compute/34-00/desc/tags/tag_cve_post.md @@ -45,7 +45,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the source package `perl`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -72,7 +72,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2021-20305` on the binary package `gnutls`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -98,7 +98,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -120,7 +120,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `image` and to all the packages and resources. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -140,7 +140,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `host`, resource `servo-vmware71`, and to all the packages. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/tas-droplets/download_get.md b/openapi-specs/compute/34-00/desc/tas-droplets/download_get.md index db92ec66a..7fdd6e259 100644 --- a/openapi-specs/compute/34-00/desc/tas-droplets/download_get.md +++ b/openapi-specs/compute/34-00/desc/tas-droplets/download_get.md @@ -9,7 +9,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo The following cURL command downloads all TAS droplets to a CSV file called `tas_droplets.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/tas-droplets/get.md b/openapi-specs/compute/34-00/desc/tas-droplets/get.md index d820517c2..ce07f8527 100644 --- a/openapi-specs/compute/34-00/desc/tas-droplets/get.md +++ b/openapi-specs/compute/34-00/desc/tas-droplets/get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > VMware Tanzu bl The following cURL command retrieves all TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/tas-droplets/get_tas_addresses.md b/openapi-specs/compute/34-00/desc/tas-droplets/get_tas_addresses.md index 528281613..8333cd24f 100644 --- a/openapi-specs/compute/34-00/desc/tas-droplets/get_tas_addresses.md +++ b/openapi-specs/compute/34-00/desc/tas-droplets/get_tas_addresses.md @@ -9,7 +9,7 @@ Gets the Cloud Controller Addresses of scanned Tanzu Application Service (TAS) d The following cURL command retrieves the Cloud Controller Addresses of scanned TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/tas-droplets/progress_get.md b/openapi-specs/compute/34-00/desc/tas-droplets/progress_get.md index 504a21e84..507d001bf 100644 --- a/openapi-specs/compute/34-00/desc/tas-droplets/progress_get.md +++ b/openapi-specs/compute/34-00/desc/tas-droplets/progress_get.md @@ -5,7 +5,7 @@ Returns the details of the TAS Droplets ongoing scan. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/tas-droplets/scan_post.md b/openapi-specs/compute/34-00/desc/tas-droplets/scan_post.md index aad2174af..13c4eeeb9 100644 --- a/openapi-specs/compute/34-00/desc/tas-droplets/scan_post.md +++ b/openapi-specs/compute/34-00/desc/tas-droplets/scan_post.md @@ -5,7 +5,7 @@ Scans the TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/tas-droplets/stop_post.md b/openapi-specs/compute/34-00/desc/tas-droplets/stop_post.md index 5f5a019b1..53d709ec7 100644 --- a/openapi-specs/compute/34-00/desc/tas-droplets/stop_post.md +++ b/openapi-specs/compute/34-00/desc/tas-droplets/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing scan of TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/trust/data_get.md b/openapi-specs/compute/34-00/desc/trust/data_get.md index dd55d47a3..88983f139 100644 --- a/openapi-specs/compute/34-00/desc/trust/data_get.md +++ b/openapi-specs/compute/34-00/desc/trust/data_get.md @@ -5,7 +5,7 @@ Returns the trusted registries, repositories, and images. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/trust/data_put.md b/openapi-specs/compute/34-00/desc/trust/data_put.md index 0e6a0ba49..733514505 100644 --- a/openapi-specs/compute/34-00/desc/trust/data_put.md +++ b/openapi-specs/compute/34-00/desc/trust/data_put.md @@ -6,7 +6,7 @@ Specify trusted images using either the image name or layers properties. Refer to the following example cURL command that uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -19,7 +19,7 @@ To edit a trust group based on image base layers, use PUT to specify a list of S Refer to the following example that specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-00/desc/trust/get.md b/openapi-specs/compute/34-00/desc/trust/get.md index 1226cd0a3..57ff5bdb5 100644 --- a/openapi-specs/compute/34-00/desc/trust/get.md +++ b/openapi-specs/compute/34-00/desc/trust/get.md @@ -3,7 +3,7 @@ Retrieves a list of all trusted images. The following example curl command uses basic auth to retrieve all trusted images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/trust/id_delete.md b/openapi-specs/compute/34-00/desc/trust/id_delete.md index b3114775f..d63cdf71a 100644 --- a/openapi-specs/compute/34-00/desc/trust/id_delete.md +++ b/openapi-specs/compute/34-00/desc/trust/id_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to specify a image trust grou ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-00/desc/trust/id_put.md b/openapi-specs/compute/34-00/desc/trust/id_put.md index 44d2c8b8b..c98617bcd 100644 --- a/openapi-specs/compute/34-00/desc/trust/id_put.md +++ b/openapi-specs/compute/34-00/desc/trust/id_put.md @@ -9,7 +9,7 @@ For more information about handles, see the `_id` in the response body for the G The following example curl command uses basic auth to modify the image property for an existing trusted image entry, where the handle for the entry is `docker-ubuntu-group`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-00/desc/trust/learn_get.md b/openapi-specs/compute/34-00/desc/trust/learn_get.md index d8a3414d0..004b16b02 100644 --- a/openapi-specs/compute/34-00/desc/trust/learn_get.md +++ b/openapi-specs/compute/34-00/desc/trust/learn_get.md @@ -1,7 +1,7 @@ Returns the state of the trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/trust/learn_post.md b/openapi-specs/compute/34-00/desc/trust/learn_post.md index 094817738..008657fa2 100644 --- a/openapi-specs/compute/34-00/desc/trust/learn_post.md +++ b/openapi-specs/compute/34-00/desc/trust/learn_post.md @@ -1,7 +1,7 @@ Sets the state of trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/trust/post.md b/openapi-specs/compute/34-00/desc/trust/post.md index 1072275a1..23a324c6c 100644 --- a/openapi-specs/compute/34-00/desc/trust/post.md +++ b/openapi-specs/compute/34-00/desc/trust/post.md @@ -7,7 +7,7 @@ For more information about handles, see the `_id` key in the response body for t The following example curl command uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ To create a trust group based on image base layers, POST a list of SHA256 hashes The following example specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/users/get.md b/openapi-specs/compute/34-00/desc/users/get.md index e4e6966ec..cd5a661ba 100644 --- a/openapi-specs/compute/34-00/desc/users/get.md +++ b/openapi-specs/compute/34-00/desc/users/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Manage > Authentication > Users** in the Console UI. The following cURL command retrieves all users. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/users/id_delete.md b/openapi-specs/compute/34-00/desc/users/id_delete.md index 1cfa5642d..66a1102f9 100644 --- a/openapi-specs/compute/34-00/desc/users/id_delete.md +++ b/openapi-specs/compute/34-00/desc/users/id_delete.md @@ -17,7 +17,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes user `ID` from the system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-00/desc/util/osx_twistcli_arm64_get.md b/openapi-specs/compute/34-00/desc/util/osx_twistcli_arm64_get.md index b385d0d3b..a30686374 100644 --- a/openapi-specs/compute/34-00/desc/util/osx_twistcli_arm64_get.md +++ b/openapi-specs/compute/34-00/desc/util/osx_twistcli_arm64_get.md @@ -7,7 +7,7 @@ Downloads the twistcli binary executable for MacOS platforms based on ARM64 arch Refer to the following example cURL command that downloads and saves the “twistcli” binary executable for ARM64 bit MacOS platforms to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/compute/34-00/desc/util/osx_twistcli_get.md b/openapi-specs/compute/34-00/desc/util/osx_twistcli_get.md index c49f96c41..2353ea338 100644 --- a/openapi-specs/compute/34-00/desc/util/osx_twistcli_get.md +++ b/openapi-specs/compute/34-00/desc/util/osx_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **MacOS platform** hyperlink in **Manage > System > Ut The following cURL command downloads the twistcli binary executable for MacOS platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli \ diff --git a/openapi-specs/compute/34-00/desc/util/twistcli_arm64_get.md b/openapi-specs/compute/34-00/desc/util/twistcli_arm64_get.md index 7ec36d3f5..a3d7318ab 100644 --- a/openapi-specs/compute/34-00/desc/util/twistcli_arm64_get.md +++ b/openapi-specs/compute/34-00/desc/util/twistcli_arm64_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/compute/34-00/desc/util/twistcli_get.md b/openapi-specs/compute/34-00/desc/util/twistcli_get.md index f9d2d295c..08a3ae8aa 100644 --- a/openapi-specs/compute/34-00/desc/util/twistcli_get.md +++ b/openapi-specs/compute/34-00/desc/util/twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -X GET -o \ 'https:///api/v/util/twistcli' diff --git a/openapi-specs/compute/34-00/desc/util/twistlock_jenkins_plugin_get.md b/openapi-specs/compute/34-00/desc/util/twistlock_jenkins_plugin_get.md index 9fb8d4a02..c9f180e5e 100644 --- a/openapi-specs/compute/34-00/desc/util/twistlock_jenkins_plugin_get.md +++ b/openapi-specs/compute/34-00/desc/util/twistlock_jenkins_plugin_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-jenkins-plugin.hpi \ diff --git a/openapi-specs/compute/34-00/desc/util/twistlock_tas_tile_get.md b/openapi-specs/compute/34-00/desc/util/twistlock_tas_tile_get.md index fea28aaad..3fd114e2d 100644 --- a/openapi-specs/compute/34-00/desc/util/twistlock_tas_tile_get.md +++ b/openapi-specs/compute/34-00/desc/util/twistlock_tas_tile_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-tile.pivotal \ diff --git a/openapi-specs/compute/34-00/desc/util/windows_twistcli_get.md b/openapi-specs/compute/34-00/desc/util/windows_twistcli_get.md index 1c545dbbb..38c609b08 100644 --- a/openapi-specs/compute/34-00/desc/util/windows_twistcli_get.md +++ b/openapi-specs/compute/34-00/desc/util/windows_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Windows platform** hyperlink in **Manage > System > The following cURL command downloads the twistcli binary executable for Windows platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli.exe \ diff --git a/openapi-specs/compute/34-00/desc/version/get.md b/openapi-specs/compute/34-00/desc/version/get.md index 28be315e0..5787e90fd 100644 --- a/openapi-specs/compute/34-00/desc/version/get.md +++ b/openapi-specs/compute/34-00/desc/version/get.md @@ -5,7 +5,7 @@ Retrieves the version number for Console. The following cURL command retrieves the version number for Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/vms/download_get.md b/openapi-specs/compute/34-00/desc/vms/download_get.md index e65e4efc9..3cc813bc5 100644 --- a/openapi-specs/compute/34-00/desc/vms/download_get.md +++ b/openapi-specs/compute/34-00/desc/vms/download_get.md @@ -7,7 +7,7 @@ Returns all VM image scan reports in CSV format. Refer to the following example cURL command that retrieves all VM image scan reports and saves the results in a CSV file called `vm_images_scan.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/vms/get.md b/openapi-specs/compute/34-00/desc/vms/get.md index e78a28c76..03ed8deb3 100644 --- a/openapi-specs/compute/34-00/desc/vms/get.md +++ b/openapi-specs/compute/34-00/desc/vms/get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > Hosts > VM imag Refer to the following example cURL command that retrieves all VM image scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/vms/labels_get.md b/openapi-specs/compute/34-00/desc/vms/labels_get.md index 0aed1a217..f509da479 100644 --- a/openapi-specs/compute/34-00/desc/vms/labels_get.md +++ b/openapi-specs/compute/34-00/desc/vms/labels_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-00/desc/vms/names_get.md b/openapi-specs/compute/34-00/desc/vms/names_get.md index 1145cfa0d..9f92e0156 100644 --- a/openapi-specs/compute/34-00/desc/vms/names_get.md +++ b/openapi-specs/compute/34-00/desc/vms/names_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/34-00/desc/vms/scan_post.md b/openapi-specs/compute/34-00/desc/vms/scan_post.md index 1caa2dcaf..4d4de3ab1 100644 --- a/openapi-specs/compute/34-00/desc/vms/scan_post.md +++ b/openapi-specs/compute/34-00/desc/vms/scan_post.md @@ -5,7 +5,7 @@ Re-scans all VM images immediately. This endpoint returns the time that the scan Refer to the following example cURL command that forces Prisma Cloud to re-scan all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-00/desc/vms/stop_post.md b/openapi-specs/compute/34-00/desc/vms/stop_post.md index 4a74743eb..49b2b26f9 100644 --- a/openapi-specs/compute/34-00/desc/vms/stop_post.md +++ b/openapi-specs/compute/34-00/desc/vms/stop_post.md @@ -7,7 +7,7 @@ Note: It might take a few minutes for the scan to stop completely. Refer to the following example cURL command that forces Prisma Cloud to stop scanning all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/SCAP/get.md b/openapi-specs/compute/34-01/desc/SCAP/get.md index a25abe94e..f5870d822 100644 --- a/openapi-specs/compute/34-01/desc/SCAP/get.md +++ b/openapi-specs/compute/34-01/desc/SCAP/get.md @@ -3,7 +3,7 @@ This endpoint will return any SCAP datastreams uploaded to the console. This end The following is an example curl command that uses basic auth to retrieve any uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/SCAP/id_delete.md b/openapi-specs/compute/34-01/desc/SCAP/id_delete.md index 39f1b0132..52923f20a 100644 --- a/openapi-specs/compute/34-01/desc/SCAP/id_delete.md +++ b/openapi-specs/compute/34-01/desc/SCAP/id_delete.md @@ -3,7 +3,7 @@ This endpoint will delete any SCAP datastreams uploaded to the console. You can The following is an example curl command that uses basic auth to delete an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-01/desc/SCAP/post.md b/openapi-specs/compute/34-01/desc/SCAP/post.md index d459a0e97..c45fd6b4e 100644 --- a/openapi-specs/compute/34-01/desc/SCAP/post.md +++ b/openapi-specs/compute/34-01/desc/SCAP/post.md @@ -3,7 +3,7 @@ This endpoint will allow you to add a SCAP datastream to the console. The following is an example curl command that uses basic auth to add an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/_ping/get.md b/openapi-specs/compute/34-01/desc/_ping/get.md index 8e143ef67..b7ffdc653 100644 --- a/openapi-specs/compute/34-01/desc/_ping/get.md +++ b/openapi-specs/compute/34-01/desc/_ping/get.md @@ -5,7 +5,7 @@ Checks if Console is reachable from your network host. Refer to the following cURL example command that pings Console and prints the HTTP response code: ```bash -$ curl -k \ +$ curl \ -s \ -o /dev/null \ -w "%{http_code}\n" \ diff --git a/openapi-specs/compute/34-01/desc/agentless/get_agentless_progress.md b/openapi-specs/compute/34-01/desc/agentless/get_agentless_progress.md index b98ed9da5..78396eec6 100644 --- a/openapi-specs/compute/34-01/desc/agentless/get_agentless_progress.md +++ b/openapi-specs/compute/34-01/desc/agentless/get_agentless_progress.md @@ -5,7 +5,7 @@ Shows the progress of an ongoing scan on hosts or containers for vulnerabilities Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/agentless/post_agentless_scan.md b/openapi-specs/compute/34-01/desc/agentless/post_agentless_scan.md index f1295cdc4..e2f8a4e11 100644 --- a/openapi-specs/compute/34-01/desc/agentless/post_agentless_scan.md +++ b/openapi-specs/compute/34-01/desc/agentless/post_agentless_scan.md @@ -9,7 +9,7 @@ Make sure that you download (use the agentless/templates API) and apply the perm Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/agentless/post_agentless_stop.md b/openapi-specs/compute/34-01/desc/agentless/post_agentless_stop.md index ab83960cc..ddee6ec7a 100644 --- a/openapi-specs/compute/34-01/desc/agentless/post_agentless_stop.md +++ b/openapi-specs/compute/34-01/desc/agentless/post_agentless_stop.md @@ -5,7 +5,7 @@ Stops an ongoing scan on hosts or containers for vulnerabilities and compliance. Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/agentless/post_agentless_templates.md b/openapi-specs/compute/34-01/desc/agentless/post_agentless_templates.md index 96be32555..5159c439a 100644 --- a/openapi-specs/compute/34-01/desc/agentless/post_agentless_templates.md +++ b/openapi-specs/compute/34-01/desc/agentless/post_agentless_templates.md @@ -31,7 +31,7 @@ Add the supported cloud accounts (AWS, Azure, GCP, and OCI) in Prisma Cloud Comp Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/alert-profiles/get.md b/openapi-specs/compute/34-01/desc/alert-profiles/get.md index 82647e248..f17191ac4 100644 --- a/openapi-specs/compute/34-01/desc/alert-profiles/get.md +++ b/openapi-specs/compute/34-01/desc/alert-profiles/get.md @@ -3,7 +3,7 @@ Retrieve a list of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/alert-profiles/id_delete.md b/openapi-specs/compute/34-01/desc/alert-profiles/id_delete.md index 1a67fe20e..2cf21b57e 100644 --- a/openapi-specs/compute/34-01/desc/alert-profiles/id_delete.md +++ b/openapi-specs/compute/34-01/desc/alert-profiles/id_delete.md @@ -5,7 +5,7 @@ This method has no response data. The following example curl command deletes an existing alert profile named `PROFILE-NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-01/desc/alert-profiles/names_get.md b/openapi-specs/compute/34-01/desc/alert-profiles/names_get.md index cac14437b..38a1f78ca 100644 --- a/openapi-specs/compute/34-01/desc/alert-profiles/names_get.md +++ b/openapi-specs/compute/34-01/desc/alert-profiles/names_get.md @@ -3,7 +3,7 @@ Retrieve a list of only the names of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles' names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/alert-profiles/post.md b/openapi-specs/compute/34-01/desc/alert-profiles/post.md index 9fa643429..19db863d5 100644 --- a/openapi-specs/compute/34-01/desc/alert-profiles/post.md +++ b/openapi-specs/compute/34-01/desc/alert-profiles/post.md @@ -3,7 +3,7 @@ Update an existing alert profile created in the system. The following example curl command uses basic auth to add a Jira Alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/alert-profiles/test_post.md b/openapi-specs/compute/34-01/desc/alert-profiles/test_post.md index 1fc745efa..2205a6e73 100644 --- a/openapi-specs/compute/34-01/desc/alert-profiles/test_post.md +++ b/openapi-specs/compute/34-01/desc/alert-profiles/test_post.md @@ -3,7 +3,7 @@ Sends a test alert to verify successful configuration of the alert profile setti The following example curl command uses basic auth to send test alert for an email alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/application-control/get.md b/openapi-specs/compute/34-01/desc/application-control/get.md index 5bd600beb..535584284 100644 --- a/openapi-specs/compute/34-01/desc/application-control/get.md +++ b/openapi-specs/compute/34-01/desc/application-control/get.md @@ -3,7 +3,7 @@ Retrieves the host application control rules. The following example curl command uses basic auth to retrieve the control rules: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/access_delete.md b/openapi-specs/compute/34-01/desc/audits/access_delete.md index 37f33ca64..0450b534c 100644 --- a/openapi-specs/compute/34-01/desc/audits/access_delete.md +++ b/openapi-specs/compute/34-01/desc/audits/access_delete.md @@ -2,7 +2,7 @@ Deletes **all** access audits. This deletion cannot be undone. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-01/desc/audits/access_download_get.md b/openapi-specs/compute/34-01/desc/audits/access_download_get.md index 1700deb8d..8d8fee259 100644 --- a/openapi-specs/compute/34-01/desc/audits/access_download_get.md +++ b/openapi-specs/compute/34-01/desc/audits/access_download_get.md @@ -3,7 +3,7 @@ Returns the docker access audit events data in CSV format that are logged and ag **Note**: You can download the access events from Console under **Monitor > Events > Docker audits > Download CSV**. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/access_filters_get.md b/openapi-specs/compute/34-01/desc/audits/access_filters_get.md index 00ac061c1..4b8e9cd9b 100644 --- a/openapi-specs/compute/34-01/desc/audits/access_filters_get.md +++ b/openapi-specs/compute/34-01/desc/audits/access_filters_get.md @@ -5,7 +5,7 @@ The following example uses basic auth to list history of commands that are run o ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ The following command gives list of sudo events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -27,7 +27,7 @@ $ curl -k \ The following command gives list of SSHD events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/access_get.md b/openapi-specs/compute/34-01/desc/audits/access_get.md index 2401391c7..56e53fe12 100644 --- a/openapi-specs/compute/34-01/desc/audits/access_get.md +++ b/openapi-specs/compute/34-01/desc/audits/access_get.md @@ -8,7 +8,7 @@ You can configure Prisma Cloud Compute to log and aggregate events such as sudo Refer to the following example cURL command that gives a list of all access audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/admission_download_get.md b/openapi-specs/compute/34-01/desc/audits/admission_download_get.md index 9571c483f..d45f47c4e 100644 --- a/openapi-specs/compute/34-01/desc/audits/admission_download_get.md +++ b/openapi-specs/compute/34-01/desc/audits/admission_download_get.md @@ -4,7 +4,7 @@ Returns the access admission events data in CSV format that were alerted or bloc Refer to the following example cURL command that downloads the admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/admission_get.md b/openapi-specs/compute/34-01/desc/audits/admission_get.md index 84414496c..3640c737c 100644 --- a/openapi-specs/compute/34-01/desc/audits/admission_get.md +++ b/openapi-specs/compute/34-01/desc/audits/admission_get.md @@ -4,7 +4,7 @@ Returns all activities that were alerted or blocked by Defender functioning as O Refer to the following example cURL command that gives a list of all admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/firewall_network_container_download_get.md b/openapi-specs/compute/34-01/desc/audits/firewall_network_container_download_get.md index 29029ac6d..434e09acd 100644 --- a/openapi-specs/compute/34-01/desc/audits/firewall_network_container_download_get.md +++ b/openapi-specs/compute/34-01/desc/audits/firewall_network_container_download_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/firewall_network_container_get.md b/openapi-specs/compute/34-01/desc/audits/firewall_network_container_get.md index 454558a44..be03b2c45 100644 --- a/openapi-specs/compute/34-01/desc/audits/firewall_network_container_get.md +++ b/openapi-specs/compute/34-01/desc/audits/firewall_network_container_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/firewall_network_host_download_get.md b/openapi-specs/compute/34-01/desc/audits/firewall_network_host_download_get.md index 768dd00d7..e83e8e1c3 100644 --- a/openapi-specs/compute/34-01/desc/audits/firewall_network_host_download_get.md +++ b/openapi-specs/compute/34-01/desc/audits/firewall_network_host_download_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/firewall_network_host_get.md b/openapi-specs/compute/34-01/desc/audits/firewall_network_host_get.md index e5dc4c399..6cbda0d4b 100644 --- a/openapi-specs/compute/34-01/desc/audits/firewall_network_host_get.md +++ b/openapi-specs/compute/34-01/desc/audits/firewall_network_host_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/incidents_archive_patch.md b/openapi-specs/compute/34-01/desc/audits/incidents_archive_patch.md index a1127a001..d1f42eedd 100644 --- a/openapi-specs/compute/34-01/desc/audits/incidents_archive_patch.md +++ b/openapi-specs/compute/34-01/desc/audits/incidents_archive_patch.md @@ -7,7 +7,7 @@ You can get an incident ID from the list of incidents using the endpoint GET /ap Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/compute/34-01/desc/audits/incidents_download_get.md b/openapi-specs/compute/34-01/desc/audits/incidents_download_get.md index 2266c3471..5958756bf 100644 --- a/openapi-specs/compute/34-01/desc/audits/incidents_download_get.md +++ b/openapi-specs/compute/34-01/desc/audits/incidents_download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the **CSV** hyperlink in **Monitor > Runtime > Incident ex The following cURL command downloads all incidents and saves the result in a CSV file called `incidents.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/incidents_filters_get.md b/openapi-specs/compute/34-01/desc/audits/incidents_filters_get.md index 7d1c6f303..856881c90 100644 --- a/openapi-specs/compute/34-01/desc/audits/incidents_filters_get.md +++ b/openapi-specs/compute/34-01/desc/audits/incidents_filters_get.md @@ -3,7 +3,7 @@ This endpoint lists the incident categories found in your environment. The following example lists incident filters. ```bash -$ curl -k \ +$ curl \ -u \ https://console:8083/api/v1/audits/incidents/filters ``` diff --git a/openapi-specs/compute/34-01/desc/audits/incidents_get.md b/openapi-specs/compute/34-01/desc/audits/incidents_get.md index 7724a08c1..9b9451821 100644 --- a/openapi-specs/compute/34-01/desc/audits/incidents_get.md +++ b/openapi-specs/compute/34-01/desc/audits/incidents_get.md @@ -9,7 +9,7 @@ This endpoint maps to the table in **Monitor > Runtime > Incident explorer** in Refer to the following example cURL command that retrieves a list of unacknowledged incidents (not in the archived state): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/kubernetes_download_get.md b/openapi-specs/compute/34-01/desc/audits/kubernetes_download_get.md index 6008bd92a..62992095c 100644 --- a/openapi-specs/compute/34-01/desc/audits/kubernetes_download_get.md +++ b/openapi-specs/compute/34-01/desc/audits/kubernetes_download_get.md @@ -7,7 +7,7 @@ Returns the audit events data that occur in an integrated Kubernetes cluster tha Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/kubernetes_get.md b/openapi-specs/compute/34-01/desc/audits/kubernetes_get.md index e1ecb8a88..2e3f51b71 100644 --- a/openapi-specs/compute/34-01/desc/audits/kubernetes_get.md +++ b/openapi-specs/compute/34-01/desc/audits/kubernetes_get.md @@ -7,7 +7,7 @@ Retrieves events that occur in an integrated Kubernetes cluster that you configu Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/mgmt_download_get.md b/openapi-specs/compute/34-01/desc/audits/mgmt_download_get.md index ae3ef45b6..bcee17342 100644 --- a/openapi-specs/compute/34-01/desc/audits/mgmt_download_get.md +++ b/openapi-specs/compute/34-01/desc/audits/mgmt_download_get.md @@ -10,7 +10,7 @@ Management audits are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/mgmt_filters_get.md b/openapi-specs/compute/34-01/desc/audits/mgmt_filters_get.md index 854977b99..f910a4c2a 100644 --- a/openapi-specs/compute/34-01/desc/audits/mgmt_filters_get.md +++ b/openapi-specs/compute/34-01/desc/audits/mgmt_filters_get.md @@ -6,7 +6,7 @@ Use these filters to query management audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/mgmt_get.md b/openapi-specs/compute/34-01/desc/audits/mgmt_get.md index 5b586cb5e..abe802348 100644 --- a/openapi-specs/compute/34-01/desc/audits/mgmt_get.md +++ b/openapi-specs/compute/34-01/desc/audits/mgmt_get.md @@ -10,7 +10,7 @@ Management audit events are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/runtime_app_embedded_download_get.md b/openapi-specs/compute/34-01/desc/audits/runtime_app_embedded_download_get.md index f3d844ead..ec5ae0f2a 100644 --- a/openapi-specs/compute/34-01/desc/audits/runtime_app_embedded_download_get.md +++ b/openapi-specs/compute/34-01/desc/audits/runtime_app_embedded_download_get.md @@ -5,7 +5,7 @@ Returns the app-embedded runtime audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/runtime_app_embedded_get.md b/openapi-specs/compute/34-01/desc/audits/runtime_app_embedded_get.md index c1d72acfa..51a43b7f5 100644 --- a/openapi-specs/compute/34-01/desc/audits/runtime_app_embedded_get.md +++ b/openapi-specs/compute/34-01/desc/audits/runtime_app_embedded_get.md @@ -5,7 +5,7 @@ Retrieves all app-embedded runtime audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/runtime_container_delete.md b/openapi-specs/compute/34-01/desc/audits/runtime_container_delete.md index ddc8e82d6..62050c71f 100644 --- a/openapi-specs/compute/34-01/desc/audits/runtime_container_delete.md +++ b/openapi-specs/compute/34-01/desc/audits/runtime_container_delete.md @@ -3,7 +3,7 @@ Deletes all container runtime audits. The following example curl command uses basic auth to delete all the audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-01/desc/audits/runtime_container_download_get.md b/openapi-specs/compute/34-01/desc/audits/runtime_container_download_get.md index 20e673b5e..81286d929 100644 --- a/openapi-specs/compute/34-01/desc/audits/runtime_container_download_get.md +++ b/openapi-specs/compute/34-01/desc/audits/runtime_container_download_get.md @@ -6,7 +6,7 @@ Returns the container audit events data in CSV format when a runtime sensor such Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o \ diff --git a/openapi-specs/compute/34-01/desc/audits/runtime_container_get.md b/openapi-specs/compute/34-01/desc/audits/runtime_container_get.md index 11beffb24..a6b6ba484 100644 --- a/openapi-specs/compute/34-01/desc/audits/runtime_container_get.md +++ b/openapi-specs/compute/34-01/desc/audits/runtime_container_get.md @@ -7,7 +7,7 @@ Retrieves all container audit events when a runtime sensor such as process, netw Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/runtime_container_timeslice_get.md b/openapi-specs/compute/34-01/desc/audits/runtime_container_timeslice_get.md index f65d477af..01df48f28 100644 --- a/openapi-specs/compute/34-01/desc/audits/runtime_container_timeslice_get.md +++ b/openapi-specs/compute/34-01/desc/audits/runtime_container_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/runtime_file-integrity_download_get.md b/openapi-specs/compute/34-01/desc/audits/runtime_file-integrity_download_get.md index 99ec70c52..234c3ce32 100644 --- a/openapi-specs/compute/34-01/desc/audits/runtime_file-integrity_download_get.md +++ b/openapi-specs/compute/34-01/desc/audits/runtime_file-integrity_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for file-integrity checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/runtime_file-integrity_get.md b/openapi-specs/compute/34-01/desc/audits/runtime_file-integrity_get.md index 53fec9f9f..c31904422 100644 --- a/openapi-specs/compute/34-01/desc/audits/runtime_file-integrity_get.md +++ b/openapi-specs/compute/34-01/desc/audits/runtime_file-integrity_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for file-integrity checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/runtime_host_delete.md b/openapi-specs/compute/34-01/desc/audits/runtime_host_delete.md index 0ab1c877e..2ada9b15a 100644 --- a/openapi-specs/compute/34-01/desc/audits/runtime_host_delete.md +++ b/openapi-specs/compute/34-01/desc/audits/runtime_host_delete.md @@ -3,7 +3,7 @@ Deletes all host audits from the database. The following example curl command uses basic auth to delete all host audits: ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/audits/runtime/host diff --git a/openapi-specs/compute/34-01/desc/audits/runtime_host_download_get.md b/openapi-specs/compute/34-01/desc/audits/runtime_host_download_get.md index 4d0454f56..d85cc39d0 100644 --- a/openapi-specs/compute/34-01/desc/audits/runtime_host_download_get.md +++ b/openapi-specs/compute/34-01/desc/audits/runtime_host_download_get.md @@ -5,7 +5,7 @@ Returns the runtime host audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/runtime_host_get.md b/openapi-specs/compute/34-01/desc/audits/runtime_host_get.md index 044b8b42d..e063550d6 100644 --- a/openapi-specs/compute/34-01/desc/audits/runtime_host_get.md +++ b/openapi-specs/compute/34-01/desc/audits/runtime_host_get.md @@ -5,7 +5,7 @@ Retrieves the runtime host audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/runtime_host_timeslice_get.md b/openapi-specs/compute/34-01/desc/audits/runtime_host_timeslice_get.md index 8933efa74..aafd869b8 100644 --- a/openapi-specs/compute/34-01/desc/audits/runtime_host_timeslice_get.md +++ b/openapi-specs/compute/34-01/desc/audits/runtime_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/runtime_log-inspection_download_get.md b/openapi-specs/compute/34-01/desc/audits/runtime_log-inspection_download_get.md index f047ed96f..0aa1a5710 100644 --- a/openapi-specs/compute/34-01/desc/audits/runtime_log-inspection_download_get.md +++ b/openapi-specs/compute/34-01/desc/audits/runtime_log-inspection_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for log inspection checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/runtime_log-inspection_get.md b/openapi-specs/compute/34-01/desc/audits/runtime_log-inspection_get.md index 49f0d7be4..8292b623e 100644 --- a/openapi-specs/compute/34-01/desc/audits/runtime_log-inspection_get.md +++ b/openapi-specs/compute/34-01/desc/audits/runtime_log-inspection_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for log inspection checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/runtime_rasp_delete.md b/openapi-specs/compute/34-01/desc/audits/runtime_rasp_delete.md index 688e04038..14315c55b 100644 --- a/openapi-specs/compute/34-01/desc/audits/runtime_rasp_delete.md +++ b/openapi-specs/compute/34-01/desc/audits/runtime_rasp_delete.md @@ -1,7 +1,7 @@ Deletes all RASP Defender runtime audits. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-01/desc/audits/runtime_rasp_download_get.md b/openapi-specs/compute/34-01/desc/audits/runtime_rasp_download_get.md index 303c75858..11a85100d 100644 --- a/openapi-specs/compute/34-01/desc/audits/runtime_rasp_download_get.md +++ b/openapi-specs/compute/34-01/desc/audits/runtime_rasp_download_get.md @@ -1,7 +1,7 @@ Returns CSV data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/runtime_rasp_get.md b/openapi-specs/compute/34-01/desc/audits/runtime_rasp_get.md index 229d908b1..0475cb149 100644 --- a/openapi-specs/compute/34-01/desc/audits/runtime_rasp_get.md +++ b/openapi-specs/compute/34-01/desc/audits/runtime_rasp_get.md @@ -1,7 +1,7 @@ Returns JSON data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/runtime_serverless_delete.md b/openapi-specs/compute/34-01/desc/audits/runtime_serverless_delete.md index 99ada0515..e27ebe858 100644 --- a/openapi-specs/compute/34-01/desc/audits/runtime_serverless_delete.md +++ b/openapi-specs/compute/34-01/desc/audits/runtime_serverless_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to delete the current audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-01/desc/audits/runtime_serverless_download_get.md b/openapi-specs/compute/34-01/desc/audits/runtime_serverless_download_get.md index f829d2342..91693c145 100644 --- a/openapi-specs/compute/34-01/desc/audits/runtime_serverless_download_get.md +++ b/openapi-specs/compute/34-01/desc/audits/runtime_serverless_download_get.md @@ -5,7 +5,7 @@ Returns the scan audit events data in CSV format for any configured serverless f Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/runtime_serverless_filters_get.md b/openapi-specs/compute/34-01/desc/audits/runtime_serverless_filters_get.md index b9bf38610..babda78dd 100644 --- a/openapi-specs/compute/34-01/desc/audits/runtime_serverless_filters_get.md +++ b/openapi-specs/compute/34-01/desc/audits/runtime_serverless_filters_get.md @@ -2,7 +2,7 @@ Returns all serverless filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/runtime_serverless_get.md b/openapi-specs/compute/34-01/desc/audits/runtime_serverless_get.md index 045946886..f6aeb748e 100644 --- a/openapi-specs/compute/34-01/desc/audits/runtime_serverless_get.md +++ b/openapi-specs/compute/34-01/desc/audits/runtime_serverless_get.md @@ -5,7 +5,7 @@ Retrieves all scan events for any configured serverless functions in Prisma Clou Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/runtime_serverless_timeslice_get.md b/openapi-specs/compute/34-01/desc/audits/runtime_serverless_timeslice_get.md index 863890174..a2456cec0 100644 --- a/openapi-specs/compute/34-01/desc/audits/runtime_serverless_timeslice_get.md +++ b/openapi-specs/compute/34-01/desc/audits/runtime_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/trust_delete.md b/openapi-specs/compute/34-01/desc/audits/trust_delete.md index 0bfb2bd81..4aaeef3fe 100644 --- a/openapi-specs/compute/34-01/desc/audits/trust_delete.md +++ b/openapi-specs/compute/34-01/desc/audits/trust_delete.md @@ -1,7 +1,7 @@ Deletes all the trust audits from the events page in Console. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-01/desc/audits/trust_download_get.md b/openapi-specs/compute/34-01/desc/audits/trust_download_get.md index 21c0e55a2..234089449 100644 --- a/openapi-specs/compute/34-01/desc/audits/trust_download_get.md +++ b/openapi-specs/compute/34-01/desc/audits/trust_download_get.md @@ -5,7 +5,7 @@ Returns the trust audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/trust_get.md b/openapi-specs/compute/34-01/desc/audits/trust_get.md index 8fb3a341d..de7d47e96 100644 --- a/openapi-specs/compute/34-01/desc/audits/trust_get.md +++ b/openapi-specs/compute/34-01/desc/audits/trust_get.md @@ -4,7 +4,7 @@ Retrieves all the trust audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/waas_agentless_download_get.md b/openapi-specs/compute/34-01/desc/audits/waas_agentless_download_get.md index bbfcd12f5..f930ef6b3 100644 --- a/openapi-specs/compute/34-01/desc/audits/waas_agentless_download_get.md +++ b/openapi-specs/compute/34-01/desc/audits/waas_agentless_download_get.md @@ -7,7 +7,7 @@ Returns the agentless Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/waas_agentless_get.md b/openapi-specs/compute/34-01/desc/audits/waas_agentless_get.md index ad40ae497..b257b0385 100644 --- a/openapi-specs/compute/34-01/desc/audits/waas_agentless_get.md +++ b/openapi-specs/compute/34-01/desc/audits/waas_agentless_get.md @@ -7,7 +7,7 @@ Retrieves all agentless Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/waas_agentless_timeslice_get.md b/openapi-specs/compute/34-01/desc/audits/waas_agentless_timeslice_get.md index 007c6dba3..3eaf34b25 100644 --- a/openapi-specs/compute/34-01/desc/audits/waas_agentless_timeslice_get.md +++ b/openapi-specs/compute/34-01/desc/audits/waas_agentless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/waas_app_embedded_download_get.md b/openapi-specs/compute/34-01/desc/audits/waas_app_embedded_download_get.md index 149c10376..c94aa87b0 100644 --- a/openapi-specs/compute/34-01/desc/audits/waas_app_embedded_download_get.md +++ b/openapi-specs/compute/34-01/desc/audits/waas_app_embedded_download_get.md @@ -6,7 +6,7 @@ Returns the app-embedded WAAS audit events data in CSV format for the specified Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/waas_app_embedded_get.md b/openapi-specs/compute/34-01/desc/audits/waas_app_embedded_get.md index 400fa447d..6318fb299 100644 --- a/openapi-specs/compute/34-01/desc/audits/waas_app_embedded_get.md +++ b/openapi-specs/compute/34-01/desc/audits/waas_app_embedded_get.md @@ -6,7 +6,7 @@ Returns all app-embedded WAAS audit events for the specified query parameters. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/waas_app_embedded_timeslice_get.md b/openapi-specs/compute/34-01/desc/audits/waas_app_embedded_timeslice_get.md index 79a60038e..42a76d08c 100644 --- a/openapi-specs/compute/34-01/desc/audits/waas_app_embedded_timeslice_get.md +++ b/openapi-specs/compute/34-01/desc/audits/waas_app_embedded_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the app-embedded WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/waas_container_download_get.md b/openapi-specs/compute/34-01/desc/audits/waas_container_download_get.md index 9a5e04fad..7d26c34f4 100644 --- a/openapi-specs/compute/34-01/desc/audits/waas_container_download_get.md +++ b/openapi-specs/compute/34-01/desc/audits/waas_container_download_get.md @@ -6,7 +6,7 @@ Returns the container Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that downloads the WAAS container audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/waas_container_get.md b/openapi-specs/compute/34-01/desc/audits/waas_container_get.md index ac0df80fd..c1ad08f3c 100644 --- a/openapi-specs/compute/34-01/desc/audits/waas_container_get.md +++ b/openapi-specs/compute/34-01/desc/audits/waas_container_get.md @@ -6,7 +6,7 @@ Retrieves all container Web-Application and API Security (WAAS) audits. Refer to the following example cURL command that retrieves all container WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/waas_container_timeslice_get.md b/openapi-specs/compute/34-01/desc/audits/waas_container_timeslice_get.md index a56b4c48f..be56260d6 100644 --- a/openapi-specs/compute/34-01/desc/audits/waas_container_timeslice_get.md +++ b/openapi-specs/compute/34-01/desc/audits/waas_container_timeslice_get.md @@ -11,7 +11,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the container WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s):: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/waas_host_download_get.md b/openapi-specs/compute/34-01/desc/audits/waas_host_download_get.md index 4bc66202b..71692e682 100644 --- a/openapi-specs/compute/34-01/desc/audits/waas_host_download_get.md +++ b/openapi-specs/compute/34-01/desc/audits/waas_host_download_get.md @@ -7,7 +7,7 @@ Returns the host Web-Application and API Security (WAAS) audit events data in CS Refer to the following example cURL command that downloads the host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/waas_host_get.md b/openapi-specs/compute/34-01/desc/audits/waas_host_get.md index 14c967594..f6e3df050 100644 --- a/openapi-specs/compute/34-01/desc/audits/waas_host_get.md +++ b/openapi-specs/compute/34-01/desc/audits/waas_host_get.md @@ -7,7 +7,7 @@ Retrieves all host Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/waas_host_timeslice_get.md b/openapi-specs/compute/34-01/desc/audits/waas_host_timeslice_get.md index e28ed7b7a..67b3a54c3 100644 --- a/openapi-specs/compute/34-01/desc/audits/waas_host_timeslice_get.md +++ b/openapi-specs/compute/34-01/desc/audits/waas_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves host WAAS audit events for a specific time frame: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/waas_serverless_download_get.md b/openapi-specs/compute/34-01/desc/audits/waas_serverless_download_get.md index da05504df..0c0dbe698 100644 --- a/openapi-specs/compute/34-01/desc/audits/waas_serverless_download_get.md +++ b/openapi-specs/compute/34-01/desc/audits/waas_serverless_download_get.md @@ -7,7 +7,7 @@ Returns the serverless function Web-Application and API Security (WAAS) audit ev Refer to the following example cURL command that downloads the serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/waas_serverless_get.md b/openapi-specs/compute/34-01/desc/audits/waas_serverless_get.md index fe482a3f3..82488f7ee 100644 --- a/openapi-specs/compute/34-01/desc/audits/waas_serverless_get.md +++ b/openapi-specs/compute/34-01/desc/audits/waas_serverless_get.md @@ -7,7 +7,7 @@ Retrieves all serverless function Web-Application and API Security (WAAS) audit Refer to the following example cURL command that retrieves all serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/audits/waas_serverless_timeslice_get.md b/openapi-specs/compute/34-01/desc/audits/waas_serverless_timeslice_get.md index ec9ff3df1..a0a9a1368 100644 --- a/openapi-specs/compute/34-01/desc/audits/waas_serverless_timeslice_get.md +++ b/openapi-specs/compute/34-01/desc/audits/waas_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the serverless WAAS audit events for a : ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/authenticate-client/post.md b/openapi-specs/compute/34-01/desc/authenticate-client/post.md index bc493d04e..ce6f00afe 100644 --- a/openapi-specs/compute/34-01/desc/authenticate-client/post.md +++ b/openapi-specs/compute/34-01/desc/authenticate-client/post.md @@ -8,7 +8,7 @@ This endpoint checks the supplied client certificate and authorizes the user bas Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X POST \ --cert \ https:///api/v/authenticate-client diff --git a/openapi-specs/compute/34-01/desc/authenticate/post.md b/openapi-specs/compute/34-01/desc/authenticate/post.md index cb018de64..4f85c5d34 100644 --- a/openapi-specs/compute/34-01/desc/authenticate/post.md +++ b/openapi-specs/compute/34-01/desc/authenticate/post.md @@ -9,7 +9,7 @@ You can set the validity period in Console under **Manage > Authentication > Log Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H "Content-Type: application/json" \ -X POST \ -d \ diff --git a/openapi-specs/compute/34-01/desc/authenticate/renew_get.md b/openapi-specs/compute/34-01/desc/authenticate/renew_get.md index 6040d58e1..3458b500a 100644 --- a/openapi-specs/compute/34-01/desc/authenticate/renew_get.md +++ b/openapi-specs/compute/34-01/desc/authenticate/renew_get.md @@ -5,7 +5,7 @@ Renews an old (unexpired) access token and returns a new token. The following cURL command retrieves a new access token using an old access token. ```bash -$ curl -k \ +$ curl \ -H "Authorization: Bearer " \ https:///api/v1/authenticate/renew ``` diff --git a/openapi-specs/compute/34-01/desc/certs/capem_get.md b/openapi-specs/compute/34-01/desc/certs/capem_get.md index f0f0f1bf3..945476c9b 100644 --- a/openapi-specs/compute/34-01/desc/certs/capem_get.md +++ b/openapi-specs/compute/34-01/desc/certs/capem_get.md @@ -5,7 +5,7 @@ Retrieves the Base64-encoded SSL root certificate self-signed by primary certifi Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/certs/client-certs_get.md b/openapi-specs/compute/34-01/desc/certs/client-certs_get.md index d099b3e3d..279d196b1 100644 --- a/openapi-specs/compute/34-01/desc/certs/client-certs_get.md +++ b/openapi-specs/compute/34-01/desc/certs/client-certs_get.md @@ -3,7 +3,7 @@ Downloads a script that installs a client certificate, client private key, and c The following example curl command uses basic auth to download and run the install script for your client certs: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/certs/client-certs.sh | sh diff --git a/openapi-specs/compute/34-01/desc/certs/server-certs_get.md b/openapi-specs/compute/34-01/desc/certs/server-certs_get.md index 0bb13f51d..118a4d9b0 100644 --- a/openapi-specs/compute/34-01/desc/certs/server-certs_get.md +++ b/openapi-specs/compute/34-01/desc/certs/server-certs_get.md @@ -12,7 +12,7 @@ Retrieves the server certificate bundle from Prisma Cloud Compute that contains Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -u \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/cloud/compliance_download_get.md b/openapi-specs/compute/34-01/desc/cloud/compliance_download_get.md index 7b1ec9fea..14f2725b1 100644 --- a/openapi-specs/compute/34-01/desc/cloud/compliance_download_get.md +++ b/openapi-specs/compute/34-01/desc/cloud/compliance_download_get.md @@ -2,7 +2,7 @@ Download all cloud scan data in CSV format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/cloud/compliance_get.md b/openapi-specs/compute/34-01/desc/cloud/compliance_get.md index 48c2fe5bb..ad47e0998 100644 --- a/openapi-specs/compute/34-01/desc/cloud/compliance_get.md +++ b/openapi-specs/compute/34-01/desc/cloud/compliance_get.md @@ -2,7 +2,7 @@ Returns a list of all cloud compliance scan results. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/cloud/compliance_scan_post.md b/openapi-specs/compute/34-01/desc/cloud/compliance_scan_post.md index 7f87bf1f4..7321c3b9d 100644 --- a/openapi-specs/compute/34-01/desc/cloud/compliance_scan_post.md +++ b/openapi-specs/compute/34-01/desc/cloud/compliance_scan_post.md @@ -2,7 +2,7 @@ Initiates a new cloud compliance scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/cloud/compliance_stop_post.md b/openapi-specs/compute/34-01/desc/cloud/compliance_stop_post.md index df0febb56..60c31dc51 100644 --- a/openapi-specs/compute/34-01/desc/cloud/compliance_stop_post.md +++ b/openapi-specs/compute/34-01/desc/cloud/compliance_stop_post.md @@ -2,7 +2,7 @@ Terminates a cloud compliance scan that's in progress.. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/cloud/discovery_download_get.md b/openapi-specs/compute/34-01/desc/cloud/discovery_download_get.md index 44d60a113..a667c8471 100644 --- a/openapi-specs/compute/34-01/desc/cloud/discovery_download_get.md +++ b/openapi-specs/compute/34-01/desc/cloud/discovery_download_get.md @@ -5,7 +5,7 @@ Downloads all cloud scan data in a CSV file. Refer to the following cURL example command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/cloud/discovery_entities_get.md b/openapi-specs/compute/34-01/desc/cloud/discovery_entities_get.md index a7abbdfb6..85f1be971 100644 --- a/openapi-specs/compute/34-01/desc/cloud/discovery_entities_get.md +++ b/openapi-specs/compute/34-01/desc/cloud/discovery_entities_get.md @@ -7,7 +7,7 @@ Use this API endpoint along with the `GET, api/vVERSION/cloud/discovery` to get Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/cloud/discovery_get.md b/openapi-specs/compute/34-01/desc/cloud/discovery_get.md index 28025f140..c2b4c6e3c 100644 --- a/openapi-specs/compute/34-01/desc/cloud/discovery_get.md +++ b/openapi-specs/compute/34-01/desc/cloud/discovery_get.md @@ -8,7 +8,7 @@ Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/cloud/discovery_scan_post.md b/openapi-specs/compute/34-01/desc/cloud/discovery_scan_post.md index 51799ebdb..0717096f8 100644 --- a/openapi-specs/compute/34-01/desc/cloud/discovery_scan_post.md +++ b/openapi-specs/compute/34-01/desc/cloud/discovery_scan_post.md @@ -5,7 +5,7 @@ Initiates a new cloud discovery scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/cloud/discovery_stop_post.md b/openapi-specs/compute/34-01/desc/cloud/discovery_stop_post.md index 6a6c7a5a5..73dbf46e7 100644 --- a/openapi-specs/compute/34-01/desc/cloud/discovery_stop_post.md +++ b/openapi-specs/compute/34-01/desc/cloud/discovery_stop_post.md @@ -5,7 +5,7 @@ Terminates a cloud discovery scan that's in progress. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/cloud/discovery_vms_get.md b/openapi-specs/compute/34-01/desc/cloud/discovery_vms_get.md index 6766f4e5a..2264a27fe 100644 --- a/openapi-specs/compute/34-01/desc/cloud/discovery_vms_get.md +++ b/openapi-specs/compute/34-01/desc/cloud/discovery_vms_get.md @@ -5,7 +5,7 @@ Returns the discovered cloud VM instances. Refer to the following example cURL command that retrieves all the discovered cloud VM instances: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/coderepos/download_get.md b/openapi-specs/compute/34-01/desc/coderepos/download_get.md index 4ec0197bb..b06dd9f17 100644 --- a/openapi-specs/compute/34-01/desc/coderepos/download_get.md +++ b/openapi-specs/compute/34-01/desc/coderepos/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Code re The following cURL command generates a CSV file containing the reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/coderepos/get.md b/openapi-specs/compute/34-01/desc/coderepos/get.md index 54c4e99bf..42dc16fb6 100644 --- a/openapi-specs/compute/34-01/desc/coderepos/get.md +++ b/openapi-specs/compute/34-01/desc/coderepos/get.md @@ -10,7 +10,7 @@ This endpoint maps to the **Code repositories** table in **Monitor > Vulnerabili The following cURL command retrieves all code repository scan reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/collections/get.md b/openapi-specs/compute/34-01/desc/collections/get.md index 99120d17d..5a9e8a50c 100755 --- a/openapi-specs/compute/34-01/desc/collections/get.md +++ b/openapi-specs/compute/34-01/desc/collections/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table in **Manage > Collections and Tags > Collections Refer to the following example cURL command that returns a list of collections: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/collections/name_delete.md b/openapi-specs/compute/34-01/desc/collections/name_delete.md index 3e2debd01..033358000 100755 --- a/openapi-specs/compute/34-01/desc/collections/name_delete.md +++ b/openapi-specs/compute/34-01/desc/collections/name_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that deletes a collection with the name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-01/desc/collections/name_usages_get.md b/openapi-specs/compute/34-01/desc/collections/name_usages_get.md index 5c9c40424..89e383cce 100755 --- a/openapi-specs/compute/34-01/desc/collections/name_usages_get.md +++ b/openapi-specs/compute/34-01/desc/collections/name_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that retrieves all policies with name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/containers/count_get.md b/openapi-specs/compute/34-01/desc/containers/count_get.md index 4c6ecdcb4..aca59a913 100644 --- a/openapi-specs/compute/34-01/desc/containers/count_get.md +++ b/openapi-specs/compute/34-01/desc/containers/count_get.md @@ -5,7 +5,7 @@ Returns an integer representing the number of containers in your environment. Refer to the following example cURL command that returns the number of containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/containers/download_get.md b/openapi-specs/compute/34-01/desc/containers/download_get.md index 5c0811d7c..5ed3fec35 100644 --- a/openapi-specs/compute/34-01/desc/containers/download_get.md +++ b/openapi-specs/compute/34-01/desc/containers/download_get.md @@ -9,7 +9,7 @@ You can download the container scan reports in CSV format in Console under **Mon Refer to the following example cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/containers/filters_get.md b/openapi-specs/compute/34-01/desc/containers/filters_get.md index c8a1dfca4..6c2777819 100644 --- a/openapi-specs/compute/34-01/desc/containers/filters_get.md +++ b/openapi-specs/compute/34-01/desc/containers/filters_get.md @@ -1,7 +1,7 @@ Returns all container filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/containers/get.md b/openapi-specs/compute/34-01/desc/containers/get.md index 4cacdde60..3de9dd4af 100644 --- a/openapi-specs/compute/34-01/desc/containers/get.md +++ b/openapi-specs/compute/34-01/desc/containers/get.md @@ -16,7 +16,7 @@ Refer to the following available options for the `fields` query parameters: Refer to the following example cURL command that retrieves a scan report for all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -26,7 +26,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a scan report for a container with the collection ``: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/containers/labels_get.md b/openapi-specs/compute/34-01/desc/containers/labels_get.md index eb40a748d..7a63ab6fb 100644 --- a/openapi-specs/compute/34-01/desc/containers/labels_get.md +++ b/openapi-specs/compute/34-01/desc/containers/labels_get.md @@ -1,7 +1,7 @@ Returns an array of strings containing all of the labels. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/containers/names_get.md b/openapi-specs/compute/34-01/desc/containers/names_get.md index 8b32465d5..9025e2e10 100644 --- a/openapi-specs/compute/34-01/desc/containers/names_get.md +++ b/openapi-specs/compute/34-01/desc/containers/names_get.md @@ -5,7 +5,7 @@ Returns an array of strings containing all container names. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/containers/scan_post.md b/openapi-specs/compute/34-01/desc/containers/scan_post.md index 6b2bdaaba..56137cf64 100644 --- a/openapi-specs/compute/34-01/desc/containers/scan_post.md +++ b/openapi-specs/compute/34-01/desc/containers/scan_post.md @@ -4,7 +4,7 @@ This endpoint returns the time that the scans were initiated. The following example command uses curl and basic auth to force Prisma Cloud Compute to re-scan all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/credentials/get.md b/openapi-specs/compute/34-01/desc/credentials/get.md index ee4309dee..b807ce8f3 100644 --- a/openapi-specs/compute/34-01/desc/credentials/get.md +++ b/openapi-specs/compute/34-01/desc/credentials/get.md @@ -6,7 +6,7 @@ This endpoint maps to **Manage > Authentication > Credentials store** in the Con Refer to the following example cURL command that retrieves all credentials: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/credentials/id_delete.md b/openapi-specs/compute/34-01/desc/credentials/id_delete.md index e5c70259e..27f090158 100644 --- a/openapi-specs/compute/34-01/desc/credentials/id_delete.md +++ b/openapi-specs/compute/34-01/desc/credentials/id_delete.md @@ -14,7 +14,7 @@ To invoke this endpoint in the Prisma Cloud Compute user interface: Refer to the following example cURL command that deletes an existing credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-01/desc/credentials/id_usages_get.md b/openapi-specs/compute/34-01/desc/credentials/id_usages_get.md index 76c1099aa..ca2ce6216 100644 --- a/openapi-specs/compute/34-01/desc/credentials/id_usages_get.md +++ b/openapi-specs/compute/34-01/desc/credentials/id_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following cURL command that retrieves all usages for a credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/curl_examples.md b/openapi-specs/compute/34-01/desc/curl_examples.md index 3d4fcd468..745d21db3 100644 --- a/openapi-specs/compute/34-01/desc/curl_examples.md +++ b/openapi-specs/compute/34-01/desc/curl_examples.md @@ -6,7 +6,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -17,7 +17,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -29,7 +29,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/compute/34-01/desc/custom-compliance/get.md b/openapi-specs/compute/34-01/desc/custom-compliance/get.md index 9022a87b7..9dddcff4e 100644 --- a/openapi-specs/compute/34-01/desc/custom-compliance/get.md +++ b/openapi-specs/compute/34-01/desc/custom-compliance/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example curl command that gets the list of custom compliance checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/custom-compliance/id_delete.md b/openapi-specs/compute/34-01/desc/custom-compliance/id_delete.md index 72c7183ee..f6536e51d 100644 --- a/openapi-specs/compute/34-01/desc/custom-compliance/id_delete.md +++ b/openapi-specs/compute/34-01/desc/custom-compliance/id_delete.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example cURL command that uses basic auth to delete the compliance check with id 9000: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-01/desc/custom-compliance/put.md b/openapi-specs/compute/34-01/desc/custom-compliance/put.md index 480e41b54..b8760a11f 100644 --- a/openapi-specs/compute/34-01/desc/custom-compliance/put.md +++ b/openapi-specs/compute/34-01/desc/custom-compliance/put.md @@ -21,7 +21,7 @@ Create `custom_check.json` file (example): Refer to the following example curl command that uses basic auth to update the checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-01/desc/custom-rules/get.md b/openapi-specs/compute/34-01/desc/custom-rules/get.md index f0385f81a..f77924be8 100644 --- a/openapi-specs/compute/34-01/desc/custom-rules/get.md +++ b/openapi-specs/compute/34-01/desc/custom-rules/get.md @@ -7,7 +7,7 @@ This endpoint maps to the policy table in **Defend > Custom rules** in the Conso Refer to the following example cURL command that retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/custom-rules/id_delete.md b/openapi-specs/compute/34-01/desc/custom-rules/id_delete.md index c0d6dc8b0..01412abf3 100644 --- a/openapi-specs/compute/34-01/desc/custom-rules/id_delete.md +++ b/openapi-specs/compute/34-01/desc/custom-rules/id_delete.md @@ -5,7 +5,7 @@ Deletes a custom rule. Refer to the following example cURL command that deletes a custom rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-01/desc/cves/distribution_get.md b/openapi-specs/compute/34-01/desc/cves/distribution_get.md index aecddce23..7365e1a5e 100644 --- a/openapi-specs/compute/34-01/desc/cves/distribution_get.md +++ b/openapi-specs/compute/34-01/desc/cves/distribution_get.md @@ -3,7 +3,7 @@ Retrieves CVEs from the vulnerability database grouped into distribution where y The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/cves/get.md b/openapi-specs/compute/34-01/desc/cves/get.md index 469ea4b28..f81223298 100644 --- a/openapi-specs/compute/34-01/desc/cves/get.md +++ b/openapi-specs/compute/34-01/desc/cves/get.md @@ -6,7 +6,7 @@ A null response indicates that the CVE is not in our database. The following example curl command queries the Prisma Cloud Compute database for `CVE-2018-1102`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/defenders/app_embedded_post.md b/openapi-specs/compute/34-01/desc/defenders/app_embedded_post.md index 9167469d0..7999cbadb 100644 --- a/openapi-specs/compute/34-01/desc/defenders/app_embedded_post.md +++ b/openapi-specs/compute/34-01/desc/defenders/app_embedded_post.md @@ -5,7 +5,7 @@ Creates an augmented Dockerfile with Defender and dependencies included as a ZIP Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/defenders/daemonset_yaml_get.md b/openapi-specs/compute/34-01/desc/defenders/daemonset_yaml_get.md index 678901a8a..b68869081 100644 --- a/openapi-specs/compute/34-01/desc/defenders/daemonset_yaml_get.md +++ b/openapi-specs/compute/34-01/desc/defenders/daemonset_yaml_get.md @@ -10,7 +10,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https://:8083/api/v1/defenders/daemonset.yaml?consoleaddr=&listener=none&namespace=twistlock&orchestration=kubernetes' diff --git a/openapi-specs/compute/34-01/desc/defenders/daemonset_yaml_post.md b/openapi-specs/compute/34-01/desc/defenders/daemonset_yaml_post.md index 268e3ba81..af006122b 100644 --- a/openapi-specs/compute/34-01/desc/defenders/daemonset_yaml_post.md +++ b/openapi-specs/compute/34-01/desc/defenders/daemonset_yaml_post.md @@ -5,7 +5,7 @@ Creates a DaemonSet deployment file in YAML format that you can use to deploy De Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/defenders/download_get.md b/openapi-specs/compute/34-01/desc/defenders/download_get.md index 2d9435506..67f08c0e5 100644 --- a/openapi-specs/compute/34-01/desc/defenders/download_get.md +++ b/openapi-specs/compute/34-01/desc/defenders/download_get.md @@ -8,7 +8,7 @@ Use the query parameters to filter what data is returned. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o \ diff --git a/openapi-specs/compute/34-01/desc/defenders/fargate_json_post.md b/openapi-specs/compute/34-01/desc/defenders/fargate_json_post.md index 5128e90a1..e2e4e85ab 100644 --- a/openapi-specs/compute/34-01/desc/defenders/fargate_json_post.md +++ b/openapi-specs/compute/34-01/desc/defenders/fargate_json_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command: Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -23,7 +23,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/defenders/fargate_yaml_post.md b/openapi-specs/compute/34-01/desc/defenders/fargate_yaml_post.md index 9a8306a1b..95560526a 100644 --- a/openapi-specs/compute/34-01/desc/defenders/fargate_yaml_post.md +++ b/openapi-specs/compute/34-01/desc/defenders/fargate_yaml_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.yaml` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/yaml' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/defenders/get.md b/openapi-specs/compute/34-01/desc/defenders/get.md index 471e7ef9d..8d2f5cd4c 100644 --- a/openapi-specs/compute/34-01/desc/defenders/get.md +++ b/openapi-specs/compute/34-01/desc/defenders/get.md @@ -7,7 +7,7 @@ This endpoint maps to the UI Console page in **Manage > Defenders > Defenders**. Refer to the following example cURL command that retrieves all deployed Defenders. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/defenders/helm_get.md b/openapi-specs/compute/34-01/desc/defenders/helm_get.md index b11f9c4b9..487c8b7e8 100644 --- a/openapi-specs/compute/34-01/desc/defenders/helm_get.md +++ b/openapi-specs/compute/34-01/desc/defenders/helm_get.md @@ -13,7 +13,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o twistlock-defender-helm.tar.gz \ diff --git a/openapi-specs/compute/34-01/desc/defenders/helm_post.md b/openapi-specs/compute/34-01/desc/defenders/helm_post.md index 2046e63eb..fb76807ae 100644 --- a/openapi-specs/compute/34-01/desc/defenders/helm_post.md +++ b/openapi-specs/compute/34-01/desc/defenders/helm_post.md @@ -5,7 +5,7 @@ Creates a Helm deployment file that you can use to deploy Defenders to your clus Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/defenders/id_delete.md b/openapi-specs/compute/34-01/desc/defenders/id_delete.md index f637ef850..e3ac52daf 100644 --- a/openapi-specs/compute/34-01/desc/defenders/id_delete.md +++ b/openapi-specs/compute/34-01/desc/defenders/id_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes an existing Defender on a host. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-01/desc/defenders/id_features_post.md b/openapi-specs/compute/34-01/desc/defenders/id_features_post.md index ec8e4c5f3..9b42f5fa0 100644 --- a/openapi-specs/compute/34-01/desc/defenders/id_features_post.md +++ b/openapi-specs/compute/34-01/desc/defenders/id_features_post.md @@ -3,7 +3,7 @@ Updates a deployed Defender's configuration. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/defenders/id_restart_post.md b/openapi-specs/compute/34-01/desc/defenders/id_restart_post.md index da0cc7811..7296a186b 100644 --- a/openapi-specs/compute/34-01/desc/defenders/id_restart_post.md +++ b/openapi-specs/compute/34-01/desc/defenders/id_restart_post.md @@ -3,7 +3,7 @@ Restarts Defender on a given host. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/defenders/id_upgrade_post.md b/openapi-specs/compute/34-01/desc/defenders/id_upgrade_post.md index f0d30d1e9..3e63c6414 100644 --- a/openapi-specs/compute/34-01/desc/defenders/id_upgrade_post.md +++ b/openapi-specs/compute/34-01/desc/defenders/id_upgrade_post.md @@ -7,7 +7,7 @@ Upgrades Defender on ``. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/defenders/image-name_get.md b/openapi-specs/compute/34-01/desc/defenders/image-name_get.md index e81ba3e19..19f360c07 100644 --- a/openapi-specs/compute/34-01/desc/defenders/image-name_get.md +++ b/openapi-specs/compute/34-01/desc/defenders/image-name_get.md @@ -5,7 +5,7 @@ Returns the full Docker image name for Defender. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/defenders/install-bundle_get.md b/openapi-specs/compute/34-01/desc/defenders/install-bundle_get.md index 882d0cd53..9b09e733f 100644 --- a/openapi-specs/compute/34-01/desc/defenders/install-bundle_get.md +++ b/openapi-specs/compute/34-01/desc/defenders/install-bundle_get.md @@ -5,7 +5,7 @@ Returns the certificate bundle that Defender needs to securely connect to Consol Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/defenders/names_get.md b/openapi-specs/compute/34-01/desc/defenders/names_get.md index 728eb6364..6339c1483 100644 --- a/openapi-specs/compute/34-01/desc/defenders/names_get.md +++ b/openapi-specs/compute/34-01/desc/defenders/names_get.md @@ -5,7 +5,7 @@ Retrieves a list of Defender hostnames that can be used as the `{id}` query para Refer to the following example cURL command that retrieves a list of all Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -15,7 +15,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of connected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -25,7 +25,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of disconnected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -37,7 +37,7 @@ The endpoint enlists all the connected and disconnected Defenders if do not spec Refer to the following example cURL command that retrieves a list of Defenders by type: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/defenders/rasp_post.md b/openapi-specs/compute/34-01/desc/defenders/rasp_post.md index 526a9e112..e110044dd 100644 --- a/openapi-specs/compute/34-01/desc/defenders/rasp_post.md +++ b/openapi-specs/compute/34-01/desc/defenders/rasp_post.md @@ -7,7 +7,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o rasp-defender.zip diff --git a/openapi-specs/compute/34-01/desc/defenders/serverless-bundle_post.md b/openapi-specs/compute/34-01/desc/defenders/serverless-bundle_post.md index df4f13e6a..7533e436b 100644 --- a/openapi-specs/compute/34-01/desc/defenders/serverless-bundle_post.md +++ b/openapi-specs/compute/34-01/desc/defenders/serverless-bundle_post.md @@ -5,7 +5,7 @@ Downloads a ZIP file with serverless Defender bundle. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/octet-stream' \ -o serverless_bundle.zip \ diff --git a/openapi-specs/compute/34-01/desc/defenders/summary_get.md b/openapi-specs/compute/34-01/desc/defenders/summary_get.md index 08be4ebc4..e308ef64b 100644 --- a/openapi-specs/compute/34-01/desc/defenders/summary_get.md +++ b/openapi-specs/compute/34-01/desc/defenders/summary_get.md @@ -6,7 +6,7 @@ Lists the number of Defenders in each defender category. Refer to the following example cURL command that retrieves a summary of Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/defenders/upgrade_post.md b/openapi-specs/compute/34-01/desc/defenders/upgrade_post.md index 2f0b4d39e..eacd6b779 100644 --- a/openapi-specs/compute/34-01/desc/defenders/upgrade_post.md +++ b/openapi-specs/compute/34-01/desc/defenders/upgrade_post.md @@ -9,7 +9,7 @@ To upgrade Serverless and Fargate Defenders, re-embed them. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/deployment/daemonsets_deploy_post.md b/openapi-specs/compute/34-01/desc/deployment/daemonsets_deploy_post.md index 94ec9386b..b60f28346 100644 --- a/openapi-specs/compute/34-01/desc/deployment/daemonsets_deploy_post.md +++ b/openapi-specs/compute/34-01/desc/deployment/daemonsets_deploy_post.md @@ -5,7 +5,7 @@ It identifies the cluster's API server, user, and credentials. Use the various request parameters to control the properties of the deployed DaemonSet. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/deployment/daemonsets_get.md b/openapi-specs/compute/34-01/desc/deployment/daemonsets_get.md index a0b7f3798..0385acf75 100644 --- a/openapi-specs/compute/34-01/desc/deployment/daemonsets_get.md +++ b/openapi-specs/compute/34-01/desc/deployment/daemonsets_get.md @@ -3,7 +3,7 @@ You must specify a `credentialID`, of type `kubeconfig`, which identifies your c Credentials are managed in Console's credentials store (`/api/v1/credentials`). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/feeds/custom-vulnerabilities_get.md b/openapi-specs/compute/34-01/desc/feeds/custom-vulnerabilities_get.md index 71834f19d..d661acf55 100644 --- a/openapi-specs/compute/34-01/desc/feeds/custom-vulnerabilities_get.md +++ b/openapi-specs/compute/34-01/desc/feeds/custom-vulnerabilities_get.md @@ -11,7 +11,7 @@ Vulnerability rules can be created using the Prisma Cloud Compute. Refer to the following cURL command that retrieves a list of all the custom vulnerabilities and associated rules. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/feeds/custom-vulnerabilities_put.md b/openapi-specs/compute/34-01/desc/feeds/custom-vulnerabilities_put.md index 4fe1c1898..149ada978 100644 --- a/openapi-specs/compute/34-01/desc/feeds/custom-vulnerabilities_put.md +++ b/openapi-specs/compute/34-01/desc/feeds/custom-vulnerabilities_put.md @@ -5,7 +5,7 @@ Updates all the custom vulnerabilities and associated rules simultaneously for h Refer to the following cURL command that updates a vulnerability for a library named `internal-lib`, and specifies that its versions `1.1` to `1.8` are known to be vulnerable. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -37,7 +37,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: **Note:** You will need `jq` to execute this command. ``` - $ curl -k \ + $ curl \ -u \ https:///api/v/feeds/custom/custom-vulnerabilities \ | jq '.' > custom_vulnerability_rules.json @@ -66,7 +66,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 3. Update the rules by pushing the new JSON payload. **Note:** Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -77,7 +77,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 4. Run the cURL command for the `GET /api/vVERSION/feeds/custom/custom-vulnerabilities` endpoint and you can see that the previously installed rules are now overwritten with your new rules. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/feeds/custom_vulnerabilities_digest_get.md b/openapi-specs/compute/34-01/desc/feeds/custom_vulnerabilities_digest_get.md index 0eb501d9b..02af9a3ab 100644 --- a/openapi-specs/compute/34-01/desc/feeds/custom_vulnerabilities_digest_get.md +++ b/openapi-specs/compute/34-01/desc/feeds/custom_vulnerabilities_digest_get.md @@ -5,7 +5,7 @@ Returns the unique digest for the custom vulnerabilities and associated rules fo The following cURL command retrieves the digest for the configured custom vulnerabilities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/feeds/cve_allow_list_digest_get.md b/openapi-specs/compute/34-01/desc/feeds/cve_allow_list_digest_get.md index e27f21251..911a07fd9 100644 --- a/openapi-specs/compute/34-01/desc/feeds/cve_allow_list_digest_get.md +++ b/openapi-specs/compute/34-01/desc/feeds/cve_allow_list_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the Common Vulnerabilities and Exposures (CVE) a The following cURL command retrieves the digest for the configured CVE allow list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/feeds/cve_allow_list_get.md b/openapi-specs/compute/34-01/desc/feeds/cve_allow_list_get.md index 34fb2c7f8..d73ce17c2 100644 --- a/openapi-specs/compute/34-01/desc/feeds/cve_allow_list_get.md +++ b/openapi-specs/compute/34-01/desc/feeds/cve_allow_list_get.md @@ -5,7 +5,7 @@ Retrieves the globally allow-listed Common Vulnerabilities and Exposures (CVE). The following cURL command retrieves the globally allow-listed CVEs. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/feeds/cve_allow_list_put.md b/openapi-specs/compute/34-01/desc/feeds/cve_allow_list_put.md index 850016965..c4e2ce0af 100644 --- a/openapi-specs/compute/34-01/desc/feeds/cve_allow_list_put.md +++ b/openapi-specs/compute/34-01/desc/feeds/cve_allow_list_put.md @@ -7,7 +7,7 @@ Globally allow-lists a set of Common Vulnerabilities and Exposures (CVE). The following cURL command installs a global CVE allow-list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-01/desc/feeds/ips_digest_get.md b/openapi-specs/compute/34-01/desc/feeds/ips_digest_get.md index d059271ea..ae2a09915 100644 --- a/openapi-specs/compute/34-01/desc/feeds/ips_digest_get.md +++ b/openapi-specs/compute/34-01/desc/feeds/ips_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the list of suspicious or high risk IP endpoints The following cURL command retrieves the digest for the banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/feeds/ips_get.md b/openapi-specs/compute/34-01/desc/feeds/ips_get.md index 381257d47..f51c577a7 100644 --- a/openapi-specs/compute/34-01/desc/feeds/ips_get.md +++ b/openapi-specs/compute/34-01/desc/feeds/ips_get.md @@ -5,7 +5,7 @@ Retrieves the customized list of block-listed suspicious or high-risk IP address The following cURL command retrieves the list of globally block-listed suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/feeds/ips_put.md b/openapi-specs/compute/34-01/desc/feeds/ips_put.md index 6f8fc2419..5bf791044 100644 --- a/openapi-specs/compute/34-01/desc/feeds/ips_put.md +++ b/openapi-specs/compute/34-01/desc/feeds/ips_put.md @@ -7,7 +7,7 @@ Bans a custom list of suspicious or high-risk IP addresses. The following cURL command installs a custom list of banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-01/desc/feeds/malware_digest_get.md b/openapi-specs/compute/34-01/desc/feeds/malware_digest_get.md index 005c476a2..522a59aef 100644 --- a/openapi-specs/compute/34-01/desc/feeds/malware_digest_get.md +++ b/openapi-specs/compute/34-01/desc/feeds/malware_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for all the MD5 signatures of malicious executables The following cURL command retrieves the digest for the configured list for the MD5 signatures of malicious executables. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/feeds/malware_get.md b/openapi-specs/compute/34-01/desc/feeds/malware_get.md index 2a7aa128b..72bee6594 100644 --- a/openapi-specs/compute/34-01/desc/feeds/malware_get.md +++ b/openapi-specs/compute/34-01/desc/feeds/malware_get.md @@ -5,7 +5,7 @@ Returns the customized list of MD5 signatures of malicious executables. Refer to the following cURL command that retrieves the list of MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/feeds/malware_put.md b/openapi-specs/compute/34-01/desc/feeds/malware_put.md index 7e6ec5da0..176304cb9 100644 --- a/openapi-specs/compute/34-01/desc/feeds/malware_put.md +++ b/openapi-specs/compute/34-01/desc/feeds/malware_put.md @@ -7,7 +7,7 @@ Creates a custom list of malware MD5 signatures of malicious executables. Refer to the following cURL command that installs a custom list of malware MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-01/desc/feeds/refresh_post.md b/openapi-specs/compute/34-01/desc/feeds/refresh_post.md index a83c40d10..1c756edae 100644 --- a/openapi-specs/compute/34-01/desc/feeds/refresh_post.md +++ b/openapi-specs/compute/34-01/desc/feeds/refresh_post.md @@ -1,7 +1,7 @@ Triggers Console to refresh its data from the **Intelligence Stream** ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/forensic/activities_download_get.md b/openapi-specs/compute/34-01/desc/forensic/activities_download_get.md index 8a2dbd926..1918e3790 100644 --- a/openapi-specs/compute/34-01/desc/forensic/activities_download_get.md +++ b/openapi-specs/compute/34-01/desc/forensic/activities_download_get.md @@ -3,7 +3,7 @@ Downloads all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/forensic/activities_get.md b/openapi-specs/compute/34-01/desc/forensic/activities_get.md index c8fb1d0cd..c0761aa60 100644 --- a/openapi-specs/compute/34-01/desc/forensic/activities_get.md +++ b/openapi-specs/compute/34-01/desc/forensic/activities_get.md @@ -3,7 +3,7 @@ Retrieves all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/groups/get.md b/openapi-specs/compute/34-01/desc/groups/get.md index 6a0daa2eb..34a2711e0 100644 --- a/openapi-specs/compute/34-01/desc/groups/get.md +++ b/openapi-specs/compute/34-01/desc/groups/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups. ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/34-01/desc/groups/id_delete.md b/openapi-specs/compute/34-01/desc/groups/id_delete.md index 5962a1135..0c3cfa1cd 100644 --- a/openapi-specs/compute/34-01/desc/groups/id_delete.md +++ b/openapi-specs/compute/34-01/desc/groups/id_delete.md @@ -13,7 +13,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes a collection with the name `{id}`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-01/desc/groups/names.md b/openapi-specs/compute/34-01/desc/groups/names.md index 80f34f536..9c2dd1089 100644 --- a/openapi-specs/compute/34-01/desc/groups/names.md +++ b/openapi-specs/compute/34-01/desc/groups/names.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/34-01/desc/groups/post.md b/openapi-specs/compute/34-01/desc/groups/post.md index d0fc23a6d..ebad011f4 100644 --- a/openapi-specs/compute/34-01/desc/groups/post.md +++ b/openapi-specs/compute/34-01/desc/groups/post.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that creates a new group named `my-group`: ```bash -$ curl -k \ +$ curl \ -X POST \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/34-01/desc/high-availability/get.md b/openapi-specs/compute/34-01/desc/high-availability/get.md index a988d47ef..83d5d9b46 100644 --- a/openapi-specs/compute/34-01/desc/high-availability/get.md +++ b/openapi-specs/compute/34-01/desc/high-availability/get.md @@ -3,7 +3,7 @@ Returns the status of high high availability. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/34-01/desc/hosts/download_get.md b/openapi-specs/compute/34-01/desc/hosts/download_get.md index ab691fb49..34e546573 100644 --- a/openapi-specs/compute/34-01/desc/hosts/download_get.md +++ b/openapi-specs/compute/34-01/desc/hosts/download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Hosts > Refer to the following example cURL command that downloads all host scan reports to a CSV file called `hosts_report.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o hosts_report.csv \ diff --git a/openapi-specs/compute/34-01/desc/hosts/filters_get.md b/openapi-specs/compute/34-01/desc/hosts/filters_get.md index 4bf6df5e6..a39ec8a97 100644 --- a/openapi-specs/compute/34-01/desc/hosts/filters_get.md +++ b/openapi-specs/compute/34-01/desc/hosts/filters_get.md @@ -3,7 +3,7 @@ Returns host filters such as distribution and host name. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/hosts/get.md b/openapi-specs/compute/34-01/desc/hosts/get.md index 43020558a..9bdf69c6c 100644 --- a/openapi-specs/compute/34-01/desc/hosts/get.md +++ b/openapi-specs/compute/34-01/desc/hosts/get.md @@ -37,7 +37,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following cURL command that retrieves all host scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/hosts/info_get.md b/openapi-specs/compute/34-01/desc/hosts/info_get.md index 5b3903b7e..523024735 100644 --- a/openapi-specs/compute/34-01/desc/hosts/info_get.md +++ b/openapi-specs/compute/34-01/desc/hosts/info_get.md @@ -5,7 +5,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/hosts/scan_post.md b/openapi-specs/compute/34-01/desc/hosts/scan_post.md index 6b72cbfa3..0e0e7b074 100644 --- a/openapi-specs/compute/34-01/desc/hosts/scan_post.md +++ b/openapi-specs/compute/34-01/desc/hosts/scan_post.md @@ -3,7 +3,7 @@ Re-scan all hosts immediately. Refer to the following example command that forces Prisma Cloud Compute to re-scan all hosts: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/hosts/scan diff --git a/openapi-specs/compute/34-01/desc/images/defender_layer_get.md b/openapi-specs/compute/34-01/desc/images/defender_layer_get.md index 1dfe3633d..4bb88d62c 100644 --- a/openapi-specs/compute/34-01/desc/images/defender_layer_get.md +++ b/openapi-specs/compute/34-01/desc/images/defender_layer_get.md @@ -5,7 +5,7 @@ Returns the the Prisma Cloud Compute Defender in as a layer that can be used in Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/compute/34-01/desc/images/defender_rasp_get.md b/openapi-specs/compute/34-01/desc/images/defender_rasp_get.md index a8e145ff7..260e271a1 100644 --- a/openapi-specs/compute/34-01/desc/images/defender_rasp_get.md +++ b/openapi-specs/compute/34-01/desc/images/defender_rasp_get.md @@ -3,7 +3,7 @@ Returns the the Prisma Cloud Compute Defender as the RASP Defender A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/compute/34-01/desc/images/download_get.md b/openapi-specs/compute/34-01/desc/images/download_get.md index c7b987aeb..9b8011af9 100644 --- a/openapi-specs/compute/34-01/desc/images/download_get.md +++ b/openapi-specs/compute/34-01/desc/images/download_get.md @@ -16,7 +16,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -27,7 +27,7 @@ $ curl -k \ Refer to the following example cURL command that might be useful for developers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/images/get.md b/openapi-specs/compute/34-01/desc/images/get.md index 3f594c6c8..dcef1b0a4 100644 --- a/openapi-specs/compute/34-01/desc/images/get.md +++ b/openapi-specs/compute/34-01/desc/images/get.md @@ -26,7 +26,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following cURL command that retrieves a compact scan report for all images: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -36,7 +36,7 @@ $ curl -k \ Refer to the following cURL command that retrieves a compact scan report for an Ubuntu image: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -47,7 +47,7 @@ The name query is synonymous with the filter images text field in the Console UI Refer to the following cURL command that retrieves the scan report for an image with the matching SHA-256 hash: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/images/names_get.md b/openapi-specs/compute/34-01/desc/images/names_get.md index 3a234df98..311b33574 100644 --- a/openapi-specs/compute/34-01/desc/images/names_get.md +++ b/openapi-specs/compute/34-01/desc/images/names_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/34-01/desc/images/scan_post.md b/openapi-specs/compute/34-01/desc/images/scan_post.md index 8d802727a..36278249b 100644 --- a/openapi-specs/compute/34-01/desc/images/scan_post.md +++ b/openapi-specs/compute/34-01/desc/images/scan_post.md @@ -5,7 +5,7 @@ Re-scan all images immediately. This endpoint returns the time that the scans we Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all images: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/images/scan diff --git a/openapi-specs/compute/34-01/desc/images/twistlock_defender_tar_gz_get.md b/openapi-specs/compute/34-01/desc/images/twistlock_defender_tar_gz_get.md index 7852e12ba..36fb66ae8 100644 --- a/openapi-specs/compute/34-01/desc/images/twistlock_defender_tar_gz_get.md +++ b/openapi-specs/compute/34-01/desc/images/twistlock_defender_tar_gz_get.md @@ -1,7 +1,7 @@ Download the Container Defender image for Linux platforms. ```bash -$ curl -k \ +$ curl \ -u \ -H "Content-Type: application/octet-stream" \ -o twistlock_defender.tar.gz \ diff --git a/openapi-specs/compute/34-01/desc/intro.md b/openapi-specs/compute/34-01/desc/intro.md index 9038a3734..5b4ed5864 100644 --- a/openapi-specs/compute/34-01/desc/intro.md +++ b/openapi-specs/compute/34-01/desc/intro.md @@ -47,7 +47,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -58,7 +58,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -70,7 +70,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/compute/34-01/desc/kubernetes/scan_post.md b/openapi-specs/compute/34-01/desc/kubernetes/scan_post.md index 15d614c1a..ab74d5d96 100644 --- a/openapi-specs/compute/34-01/desc/kubernetes/scan_post.md +++ b/openapi-specs/compute/34-01/desc/kubernetes/scan_post.md @@ -3,7 +3,7 @@ This endpoint will trigger a Kubernetes scan. The following example curl command uses basic auth to initiate this scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/logs/console_get.md b/openapi-specs/compute/34-01/desc/logs/console_get.md index 80ece6611..113543540 100644 --- a/openapi-specs/compute/34-01/desc/logs/console_get.md +++ b/openapi-specs/compute/34-01/desc/logs/console_get.md @@ -3,7 +3,7 @@ Retrieves the latest Console log messages. The following example curl command retrieves the 10 latest Console log messages: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/logs/defender_download_get.md b/openapi-specs/compute/34-01/desc/logs/defender_download_get.md index 5d6718db0..05bbc6a75 100644 --- a/openapi-specs/compute/34-01/desc/logs/defender_download_get.md +++ b/openapi-specs/compute/34-01/desc/logs/defender_download_get.md @@ -5,7 +5,7 @@ The hostname can be returned from the endpoint `/defenders/names` The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/logs/defender_get.md b/openapi-specs/compute/34-01/desc/logs/defender_get.md index 1e733a746..f2e3b25df 100644 --- a/openapi-specs/compute/34-01/desc/logs/defender_get.md +++ b/openapi-specs/compute/34-01/desc/logs/defender_get.md @@ -7,7 +7,7 @@ Note that you must quote the URL when running the following command. Otherwise the shell misinterprets the ampersand (`&`) as the end of the command, and puts the curl command in the background. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/logs/system_download_get.md b/openapi-specs/compute/34-01/desc/logs/system_download_get.md index 1e5b5b873..43bb0abce 100644 --- a/openapi-specs/compute/34-01/desc/logs/system_download_get.md +++ b/openapi-specs/compute/34-01/desc/logs/system_download_get.md @@ -4,7 +4,7 @@ This endpoint will return the system debug logs with `tar.gz` file extension. The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/pcf-droplets/addresses_get.md b/openapi-specs/compute/34-01/desc/pcf-droplets/addresses_get.md index 257a47455..bb3365015 100644 --- a/openapi-specs/compute/34-01/desc/pcf-droplets/addresses_get.md +++ b/openapi-specs/compute/34-01/desc/pcf-droplets/addresses_get.md @@ -5,7 +5,7 @@ You can also add optional query parameters to this API call, in this example `cl The following example curl command retrieves the list of addresses: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/pcf-droplets/download_get.md b/openapi-specs/compute/34-01/desc/pcf-droplets/download_get.md index ad761e744..ac8546a25 100644 --- a/openapi-specs/compute/34-01/desc/pcf-droplets/download_get.md +++ b/openapi-specs/compute/34-01/desc/pcf-droplets/download_get.md @@ -3,7 +3,7 @@ This endpoint will download the list of configured cloud controller addresses co The following example curl command retrieves the list of addresses and outputs it to a file call `PCF_blobstores.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/pcf-droplets/get.md b/openapi-specs/compute/34-01/desc/pcf-droplets/get.md index 930d16948..aad607cba 100644 --- a/openapi-specs/compute/34-01/desc/pcf-droplets/get.md +++ b/openapi-specs/compute/34-01/desc/pcf-droplets/get.md @@ -3,7 +3,7 @@ This endpoint will return the full metadata of PCF blobstore from page **Monitor The following example curl command will retrieve this: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/pcf-droplets/scan_post.md b/openapi-specs/compute/34-01/desc/pcf-droplets/scan_post.md index 34e75b26c..d9c9df4dd 100644 --- a/openapi-specs/compute/34-01/desc/pcf-droplets/scan_post.md +++ b/openapi-specs/compute/34-01/desc/pcf-droplets/scan_post.md @@ -3,7 +3,7 @@ This endpoint will kick off a scan of the any PCF Blobstores you have configured Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/pcf-droplets/stop_post.md b/openapi-specs/compute/34-01/desc/pcf-droplets/stop_post.md index 94c376972..2c4d5264a 100644 --- a/openapi-specs/compute/34-01/desc/pcf-droplets/stop_post.md +++ b/openapi-specs/compute/34-01/desc/pcf-droplets/stop_post.md @@ -3,7 +3,7 @@ This endpoint will instruct the PFC Defenders to stop scanning. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/policies/compliance_ci_images_get.md b/openapi-specs/compute/34-01/desc/policies/compliance_ci_images_get.md index f97130a97..9a2b2abf5 100644 --- a/openapi-specs/compute/34-01/desc/policies/compliance_ci_images_get.md +++ b/openapi-specs/compute/34-01/desc/policies/compliance_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > CI** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/policies/compliance_ci_serverless_get.md b/openapi-specs/compute/34-01/desc/policies/compliance_ci_serverless_get.md index 59195f070..2f30e2d74 100644 --- a/openapi-specs/compute/34-01/desc/policies/compliance_ci_serverless_get.md +++ b/openapi-specs/compute/34-01/desc/policies/compliance_ci_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Functions > CI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/policies/compliance_container_get.md b/openapi-specs/compute/34-01/desc/policies/compliance_container_get.md index 7f10245ea..657d4f2dd 100644 --- a/openapi-specs/compute/34-01/desc/policies/compliance_container_get.md +++ b/openapi-specs/compute/34-01/desc/policies/compliance_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > Deployed** Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/policies/compliance_container_impacted_get.md b/openapi-specs/compute/34-01/desc/policies/compliance_container_impacted_get.md index 607bfa3c8..de9e0ee77 100644 --- a/openapi-specs/compute/34-01/desc/policies/compliance_container_impacted_get.md +++ b/openapi-specs/compute/34-01/desc/policies/compliance_container_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of containers captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/compliance/container/impacted?ruleName=' diff --git a/openapi-specs/compute/34-01/desc/policies/compliance_host_get.md b/openapi-specs/compute/34-01/desc/policies/compliance_host_get.md index c029ecf7f..a5e429af5 100755 --- a/openapi-specs/compute/34-01/desc/policies/compliance_host_get.md +++ b/openapi-specs/compute/34-01/desc/policies/compliance_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Hosts > Running hosts** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/policies/compliance_serverless_get.md b/openapi-specs/compute/34-01/desc/policies/compliance_serverless_get.md index c7de886c1..f559179f6 100755 --- a/openapi-specs/compute/34-01/desc/policies/compliance_serverless_get.md +++ b/openapi-specs/compute/34-01/desc/policies/compliance_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Functions > Functions** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/policies/compliance_vms_get.md b/openapi-specs/compute/34-01/desc/policies/compliance_vms_get.md index f7d7e1a49..b61d20d9d 100755 --- a/openapi-specs/compute/34-01/desc/policies/compliance_vms_get.md +++ b/openapi-specs/compute/34-01/desc/policies/compliance_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Hosts > VM ima The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/policies/compliance_vms_impacted_get.md b/openapi-specs/compute/34-01/desc/policies/compliance_vms_impacted_get.md index 9cf5b9d03..4ac3f2832 100644 --- a/openapi-specs/compute/34-01/desc/policies/compliance_vms_impacted_get.md +++ b/openapi-specs/compute/34-01/desc/policies/compliance_vms_impacted_get.md @@ -8,7 +8,7 @@ Use query parameters to retrieve the list of impacted resources by *account ID*, Refer to the following example cURL command, which retrieves a list of impacted resources: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/policies/docker_get.md b/openapi-specs/compute/34-01/desc/policies/docker_get.md index f56872c67..e8ab3d5bb 100644 --- a/openapi-specs/compute/34-01/desc/policies/docker_get.md +++ b/openapi-specs/compute/34-01/desc/policies/docker_get.md @@ -3,7 +3,7 @@ Retrieves a list of all access control rules for Docker Engine commands. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/policies/docker_put.md b/openapi-specs/compute/34-01/desc/policies/docker_put.md index 860e2bb1e..a5d0c0230 100644 --- a/openapi-specs/compute/34-01/desc/policies/docker_put.md +++ b/openapi-specs/compute/34-01/desc/policies/docker_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove Docker access control rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/docker \ | jq '.' > docker_access_control_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove Docker access control rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/34-01/desc/policies/firewall_app-embedded_get.md b/openapi-specs/compute/34-01/desc/policies/firewall_app-embedded_get.md index 3da2a7cd6..4e59c4c21 100644 --- a/openapi-specs/compute/34-01/desc/policies/firewall_app-embedded_get.md +++ b/openapi-specs/compute/34-01/desc/policies/firewall_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > App-Embedded** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/policies/firewall_app_container_get.md b/openapi-specs/compute/34-01/desc/policies/firewall_app_container_get.md index 3b8c157fa..f0486aa4c 100644 --- a/openapi-specs/compute/34-01/desc/policies/firewall_app_container_get.md +++ b/openapi-specs/compute/34-01/desc/policies/firewall_app_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Container** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/container' diff --git a/openapi-specs/compute/34-01/desc/policies/firewall_app_host_get.md b/openapi-specs/compute/34-01/desc/policies/firewall_app_host_get.md index adb90128a..75c22add4 100644 --- a/openapi-specs/compute/34-01/desc/policies/firewall_app_host_get.md +++ b/openapi-specs/compute/34-01/desc/policies/firewall_app_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Host** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/policies/firewall_app_network_list_get.md b/openapi-specs/compute/34-01/desc/policies/firewall_app_network_list_get.md index 13f7fb450..5a1f87d85 100644 --- a/openapi-specs/compute/34-01/desc/policies/firewall_app_network_list_get.md +++ b/openapi-specs/compute/34-01/desc/policies/firewall_app_network_list_get.md @@ -11,7 +11,7 @@ This endpoint maps to **Defend > WAAS > Network lists** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/network-list' diff --git a/openapi-specs/compute/34-01/desc/policies/firewall_app_out-of-band_get.md b/openapi-specs/compute/34-01/desc/policies/firewall_app_out-of-band_get.md index d4f72d041..9ae662687 100644 --- a/openapi-specs/compute/34-01/desc/policies/firewall_app_out-of-band_get.md +++ b/openapi-specs/compute/34-01/desc/policies/firewall_app_out-of-band_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/policies/firewall_app_out-of-band_impacted_get.md b/openapi-specs/compute/34-01/desc/policies/firewall_app_out-of-band_impacted_get.md index 25d2c6691..96a427f94 100644 --- a/openapi-specs/compute/34-01/desc/policies/firewall_app_out-of-band_impacted_get.md +++ b/openapi-specs/compute/34-01/desc/policies/firewall_app_out-of-band_impacted_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/policies/firewall_app_rasp_get.md b/openapi-specs/compute/34-01/desc/policies/firewall_app_rasp_get.md index 15d481cf3..a201d3beb 100644 --- a/openapi-specs/compute/34-01/desc/policies/firewall_app_rasp_get.md +++ b/openapi-specs/compute/34-01/desc/policies/firewall_app_rasp_get.md @@ -1,7 +1,7 @@ Retrieves a list of all application firewall (CNAF) rules for RASP. ``` -$ curl -k \ +$ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp ``` diff --git a/openapi-specs/compute/34-01/desc/policies/firewall_app_rasp_put.md b/openapi-specs/compute/34-01/desc/policies/firewall_app_rasp_put.md index 04ba86483..1101c7690 100644 --- a/openapi-specs/compute/34-01/desc/policies/firewall_app_rasp_put.md +++ b/openapi-specs/compute/34-01/desc/policies/firewall_app_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp \ | jq '.' > app_firewall_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/34-01/desc/policies/firewall_app_serverless_get.md b/openapi-specs/compute/34-01/desc/policies/firewall_app_serverless_get.md index d19e909f3..90cac0015 100644 --- a/openapi-specs/compute/34-01/desc/policies/firewall_app_serverless_get.md +++ b/openapi-specs/compute/34-01/desc/policies/firewall_app_serverless_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Serverless** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/serverless' diff --git a/openapi-specs/compute/34-01/desc/policies/firewall_network_container_get.md b/openapi-specs/compute/34-01/desc/policies/firewall_network_container_get.md index 3f1343b53..82e656818 100644 --- a/openapi-specs/compute/34-01/desc/policies/firewall_network_container_get.md +++ b/openapi-specs/compute/34-01/desc/policies/firewall_network_container_get.md @@ -4,7 +4,7 @@ Retrieves a list of all CNNS container and host rules. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/policies/firewall_network_container_put.md b/openapi-specs/compute/34-01/desc/policies/firewall_network_container_put.md index fd9263430..cffb3f1c4 100644 --- a/openapi-specs/compute/34-01/desc/policies/firewall_network_container_put.md +++ b/openapi-specs/compute/34-01/desc/policies/firewall_network_container_put.md @@ -9,7 +9,7 @@ The procedure to add, edit, or remove rules is: Refer to the following example cURL command that retrieves a list of all rules, pretty-print the JSON response, and save the results to a file: ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -26,7 +26,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/34-01/desc/policies/firewall_network_entities_get.md b/openapi-specs/compute/34-01/desc/policies/firewall_network_entities_get.md index 757121f70..28ed8dbcb 100644 --- a/openapi-specs/compute/34-01/desc/policies/firewall_network_entities_get.md +++ b/openapi-specs/compute/34-01/desc/policies/firewall_network_entities_get.md @@ -1,7 +1,7 @@ Retrieves a list of all CNNF network objects. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/policies/firewall_network_entities_put.md b/openapi-specs/compute/34-01/desc/policies/firewall_network_entities_put.md index 83c023286..39044ee10 100644 --- a/openapi-specs/compute/34-01/desc/policies/firewall_network_entities_put.md +++ b/openapi-specs/compute/34-01/desc/policies/firewall_network_entities_put.md @@ -3,7 +3,7 @@ Updates the list of CNNF network objects. The following example curl command updates the network objects. There is an example of all three types (images,subnets, and applications ): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-01/desc/policies/policies.md b/openapi-specs/compute/34-01/desc/policies/policies.md index 69768c03d..97be7b616 100644 --- a/openapi-specs/compute/34-01/desc/policies/policies.md +++ b/openapi-specs/compute/34-01/desc/policies/policies.md @@ -21,7 +21,7 @@ To add, edit, or remove vulnerability rules from a policy: For example, the following cURL command uses basic auth to retrieve a list of all image vulnerability rules, pretty-prints the JSON response, and saves the results to a `vulnerability_rules.json` file. ```bash - $ curl -k \ + $ curl \ -u \ https:///api/v1/policies/runtime/host \ | jq '.' > vulnerability_rules.json @@ -36,7 +36,7 @@ To add, edit, or remove vulnerability rules from a policy: **Note:** Remember to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -107,7 +107,7 @@ Use the `PUT` method to delete all rules by submitting an empty JSON object. For example, to delete all host runtime rules: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-01/desc/policies/runtime_app-embedded_get.md b/openapi-specs/compute/34-01/desc/policies/runtime_app-embedded_get.md index fcf0ba8b9..517b741bb 100755 --- a/openapi-specs/compute/34-01/desc/policies/runtime_app-embedded_get.md +++ b/openapi-specs/compute/34-01/desc/policies/runtime_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > App-Embedded policy** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/policies/runtime_container_get.md b/openapi-specs/compute/34-01/desc/policies/runtime_container_get.md index f1b50b727..65cd10660 100644 --- a/openapi-specs/compute/34-01/desc/policies/runtime_container_get.md +++ b/openapi-specs/compute/34-01/desc/policies/runtime_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Container policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/policies/runtime_container_impacted_get.md b/openapi-specs/compute/34-01/desc/policies/runtime_container_impacted_get.md index 195f75547..e026d33b9 100644 --- a/openapi-specs/compute/34-01/desc/policies/runtime_container_impacted_get.md +++ b/openapi-specs/compute/34-01/desc/policies/runtime_container_impacted_get.md @@ -6,7 +6,7 @@ In the Console UI, you can see how it works by going to the **Defend > Runtime > Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ $ curl -k \ For additional help with your `ruleName`: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/policies/runtime_host_get.md b/openapi-specs/compute/34-01/desc/policies/runtime_host_get.md index 38800596c..559ef690a 100644 --- a/openapi-specs/compute/34-01/desc/policies/runtime_host_get.md +++ b/openapi-specs/compute/34-01/desc/policies/runtime_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Host policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/policies/runtime_rasp_get.md b/openapi-specs/compute/34-01/desc/policies/runtime_rasp_get.md index 5b7a76457..55a6ff05b 100644 --- a/openapi-specs/compute/34-01/desc/policies/runtime_rasp_get.md +++ b/openapi-specs/compute/34-01/desc/policies/runtime_rasp_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your RASP runtime policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/policies/runtime_rasp_put.md b/openapi-specs/compute/34-01/desc/policies/runtime_rasp_put.md index bba60ba81..f71fb4b93 100644 --- a/openapi-specs/compute/34-01/desc/policies/runtime_rasp_put.md +++ b/openapi-specs/compute/34-01/desc/policies/runtime_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve the rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET @@ -24,7 +24,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -H "Content-Type:application/json" \ -X PUT \ diff --git a/openapi-specs/compute/34-01/desc/policies/runtime_serverless_get.md b/openapi-specs/compute/34-01/desc/policies/runtime_serverless_get.md index 44326bbf6..c98489e16 100644 --- a/openapi-specs/compute/34-01/desc/policies/runtime_serverless_get.md +++ b/openapi-specs/compute/34-01/desc/policies/runtime_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Serverless policy** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/policies/secrets_get.md b/openapi-specs/compute/34-01/desc/policies/secrets_get.md index 89e6b9c0e..cb4ecb37c 100644 --- a/openapi-specs/compute/34-01/desc/policies/secrets_get.md +++ b/openapi-specs/compute/34-01/desc/policies/secrets_get.md @@ -3,7 +3,7 @@ Retrieves a list of all secrets rules. The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/policies/secrets diff --git a/openapi-specs/compute/34-01/desc/policies/secrets_put.md b/openapi-specs/compute/34-01/desc/policies/secrets_put.md index 1e8877ca1..04fd41f24 100644 --- a/openapi-specs/compute/34-01/desc/policies/secrets_put.md +++ b/openapi-specs/compute/34-01/desc/policies/secrets_put.md @@ -10,7 +10,7 @@ The procedure to add, edit, or remove secrets rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/secrets \ | jq '.' > secrets_rules.json @@ -24,7 +24,7 @@ The procedure to add, edit, or remove secrets rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/34-01/desc/policies/trust_get.md b/openapi-specs/compute/34-01/desc/policies/trust_get.md index 8de1ba409..0805d6777 100644 --- a/openapi-specs/compute/34-01/desc/policies/trust_get.md +++ b/openapi-specs/compute/34-01/desc/policies/trust_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/policies/trust_put.md b/openapi-specs/compute/34-01/desc/policies/trust_put.md index fccd4b91e..7fec72031 100644 --- a/openapi-specs/compute/34-01/desc/policies/trust_put.md +++ b/openapi-specs/compute/34-01/desc/policies/trust_put.md @@ -1,7 +1,7 @@ Updates the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-01/desc/policies/vulnerability_ci_images_get.md b/openapi-specs/compute/34-01/desc/policies/vulnerability_ci_images_get.md index abc3da8fa..ce0d50a29 100644 --- a/openapi-specs/compute/34-01/desc/policies/vulnerability_ci_images_get.md +++ b/openapi-specs/compute/34-01/desc/policies/vulnerability_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/policies/vulnerability_ci_serverless_get.md b/openapi-specs/compute/34-01/desc/policies/vulnerability_ci_serverless_get.md index 958c86495..6fb5f93ce 100644 --- a/openapi-specs/compute/34-01/desc/policies/vulnerability_ci_serverless_get.md +++ b/openapi-specs/compute/34-01/desc/policies/vulnerability_ci_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/policies/vulnerability_coderepos_get.md b/openapi-specs/compute/34-01/desc/policies/vulnerability_coderepos_get.md index 08dfed8e1..a4ac62f33 100644 --- a/openapi-specs/compute/34-01/desc/policies/vulnerability_coderepos_get.md +++ b/openapi-specs/compute/34-01/desc/policies/vulnerability_coderepos_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Code repositories** in the Co Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/vulnerability/coderepos' diff --git a/openapi-specs/compute/34-01/desc/policies/vulnerability_coderepos_impacted_get.md b/openapi-specs/compute/34-01/desc/policies/vulnerability_coderepos_impacted_get.md index a401a12c4..e64ef768e 100644 --- a/openapi-specs/compute/34-01/desc/policies/vulnerability_coderepos_impacted_get.md +++ b/openapi-specs/compute/34-01/desc/policies/vulnerability_coderepos_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/coderepos/impacted?project=&ruleName=' ``` diff --git a/openapi-specs/compute/34-01/desc/policies/vulnerability_coderepos_put.md b/openapi-specs/compute/34-01/desc/policies/vulnerability_coderepos_put.md index 514eec136..a002415b9 100644 --- a/openapi-specs/compute/34-01/desc/policies/vulnerability_coderepos_put.md +++ b/openapi-specs/compute/34-01/desc/policies/vulnerability_coderepos_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Code repo Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT 'https:///api/v/policies/vulnerability/coderepos' \ diff --git a/openapi-specs/compute/34-01/desc/policies/vulnerability_host_get.md b/openapi-specs/compute/34-01/desc/policies/vulnerability_host_get.md index 3b9b14b9c..260da7675 100644 --- a/openapi-specs/compute/34-01/desc/policies/vulnerability_host_get.md +++ b/openapi-specs/compute/34-01/desc/policies/vulnerability_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Hosts > Running hosts** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/policies/vulnerability_host_impacted_get.md b/openapi-specs/compute/34-01/desc/policies/vulnerability_host_impacted_get.md index 346368518..f44592830 100644 --- a/openapi-specs/compute/34-01/desc/policies/vulnerability_host_impacted_get.md +++ b/openapi-specs/compute/34-01/desc/policies/vulnerability_host_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by `RULE_NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/host/impacted?project={PROJECT_NAME}&ruleName={RULE_NAME}' ``` diff --git a/openapi-specs/compute/34-01/desc/policies/vulnerability_images_get.md b/openapi-specs/compute/34-01/desc/policies/vulnerability_images_get.md index 33581be37..57359bb8f 100644 --- a/openapi-specs/compute/34-01/desc/policies/vulnerability_images_get.md +++ b/openapi-specs/compute/34-01/desc/policies/vulnerability_images_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images?project=" diff --git a/openapi-specs/compute/34-01/desc/policies/vulnerability_images_impacted_get.md b/openapi-specs/compute/34-01/desc/policies/vulnerability_images_impacted_get.md index ae1d5e396..e2a4efa23 100644 --- a/openapi-specs/compute/34-01/desc/policies/vulnerability_images_impacted_get.md +++ b/openapi-specs/compute/34-01/desc/policies/vulnerability_images_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of images caught by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images/impacted?project=&ruleName=" diff --git a/openapi-specs/compute/34-01/desc/policies/vulnerability_images_put.md b/openapi-specs/compute/34-01/desc/policies/vulnerability_images_put.md index b3330dab7..8c3cc8af2 100644 --- a/openapi-specs/compute/34-01/desc/policies/vulnerability_images_put.md +++ b/openapi-specs/compute/34-01/desc/policies/vulnerability_images_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -X PUT 'https:///api/v/policies/vulnerability/images' \ --data '{ diff --git a/openapi-specs/compute/34-01/desc/policies/vulnerability_serverless_get.md b/openapi-specs/compute/34-01/desc/policies/vulnerability_serverless_get.md index c7a8e2ef5..41c7e75d8 100644 --- a/openapi-specs/compute/34-01/desc/policies/vulnerability_serverless_get.md +++ b/openapi-specs/compute/34-01/desc/policies/vulnerability_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Functions** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/policies/vulnerability_serverless_put.md b/openapi-specs/compute/34-01/desc/policies/vulnerability_serverless_put.md index 2b567b5b1..5199f0997 100644 --- a/openapi-specs/compute/34-01/desc/policies/vulnerability_serverless_put.md +++ b/openapi-specs/compute/34-01/desc/policies/vulnerability_serverless_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k 'https:///api/v/policies/vulnerability/serverless' \ +$ curl 'https:///api/v/policies/vulnerability/serverless' \ -X PUT \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/34-01/desc/policies/vulnerability_vms_get.md b/openapi-specs/compute/34-01/desc/policies/vulnerability_vms_get.md index 117d2cc4a..e37c1520f 100644 --- a/openapi-specs/compute/34-01/desc/policies/vulnerability_vms_get.md +++ b/openapi-specs/compute/34-01/desc/policies/vulnerability_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Hosts > V The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/policies/vulnerability_vms_impacted_get.md b/openapi-specs/compute/34-01/desc/policies/vulnerability_vms_impacted_get.md index 29d9621ea..f1a7f7ef5 100644 --- a/openapi-specs/compute/34-01/desc/policies/vulnerability_vms_impacted_get.md +++ b/openapi-specs/compute/34-01/desc/policies/vulnerability_vms_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/vms?project=&ruleName=' ``` diff --git a/openapi-specs/compute/34-01/desc/profiles/app-embedded_download_get.md b/openapi-specs/compute/34-01/desc/profiles/app-embedded_download_get.md index 4b3f7ff8a..2e8cac56d 100644 --- a/openapi-specs/compute/34-01/desc/profiles/app-embedded_download_get.md +++ b/openapi-specs/compute/34-01/desc/profiles/app-embedded_download_get.md @@ -5,7 +5,7 @@ Downloads the app-embedded observations in a CSV format. Refer to the following example cURL command that downloads all the app-embedded runtime profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/profiles/app-embedded_get.md b/openapi-specs/compute/34-01/desc/profiles/app-embedded_get.md index f3ddb3125..c332061e5 100644 --- a/openapi-specs/compute/34-01/desc/profiles/app-embedded_get.md +++ b/openapi-specs/compute/34-01/desc/profiles/app-embedded_get.md @@ -5,7 +5,7 @@ Retrieves the app-embedded observations. Refer to the following example cURL command that lists all the app-embedded runtime: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/profiles/container_download_get.md b/openapi-specs/compute/34-01/desc/profiles/container_download_get.md index ad7a86101..ee9d5e9e4 100644 --- a/openapi-specs/compute/34-01/desc/profiles/container_download_get.md +++ b/openapi-specs/compute/34-01/desc/profiles/container_download_get.md @@ -6,7 +6,7 @@ Retrieves the details and state of all runtime models in CSV format. Refer to the following example cURL command that downloads a complete list in CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/profiles/container_filters_get.md b/openapi-specs/compute/34-01/desc/profiles/container_filters_get.md index 8b6122b80..13535b520 100644 --- a/openapi-specs/compute/34-01/desc/profiles/container_filters_get.md +++ b/openapi-specs/compute/34-01/desc/profiles/container_filters_get.md @@ -4,7 +4,7 @@ Returns a list of os and images from page monitor/runtime/container-models in Co Example curl command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/profiles/container_get.md b/openapi-specs/compute/34-01/desc/profiles/container_get.md index cdbc24c3e..59a3764fb 100644 --- a/openapi-specs/compute/34-01/desc/profiles/container_get.md +++ b/openapi-specs/compute/34-01/desc/profiles/container_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of all runtime models. Refer to the following example cURL command that lists all runtime models in a system: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/profiles/container_learn_post.md b/openapi-specs/compute/34-01/desc/profiles/container_learn_post.md index 5fef2e31e..2c1d08af1 100644 --- a/openapi-specs/compute/34-01/desc/profiles/container_learn_post.md +++ b/openapi-specs/compute/34-01/desc/profiles/container_learn_post.md @@ -7,7 +7,7 @@ For more information, refer to [Learning mode](https://docs.prismacloud.io/en/cl Refer to the following example cURL command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/profiles/host_download_get.md b/openapi-specs/compute/34-01/desc/profiles/host_download_get.md index ace270a32..2dfb51ec0 100644 --- a/openapi-specs/compute/34-01/desc/profiles/host_download_get.md +++ b/openapi-specs/compute/34-01/desc/profiles/host_download_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of each host service runtime model in CSV format Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/profiles/host_get.md b/openapi-specs/compute/34-01/desc/profiles/host_get.md index 208a24de3..55d8bf8ff 100644 --- a/openapi-specs/compute/34-01/desc/profiles/host_get.md +++ b/openapi-specs/compute/34-01/desc/profiles/host_get.md @@ -15,7 +15,7 @@ The returned JSON object has the following structure: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/profiles/host_id_rule_get.md b/openapi-specs/compute/34-01/desc/profiles/host_id_rule_get.md index 672cb4c62..8be668fca 100644 --- a/openapi-specs/compute/34-01/desc/profiles/host_id_rule_get.md +++ b/openapi-specs/compute/34-01/desc/profiles/host_id_rule_get.md @@ -10,7 +10,7 @@ This is the `PROFILE_ID`. The following example command uses curl and basic auth to specify the learning mode for a profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/profiles/service_download_get.md b/openapi-specs/compute/34-01/desc/profiles/service_download_get.md index 63dff3354..4c1c431c1 100644 --- a/openapi-specs/compute/34-01/desc/profiles/service_download_get.md +++ b/openapi-specs/compute/34-01/desc/profiles/service_download_get.md @@ -1,7 +1,7 @@ Retrieves the details and state of all host service runtime models in CSV format ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/profiles/service_get.md b/openapi-specs/compute/34-01/desc/profiles/service_get.md index a4f8c348d..5d786d919 100644 --- a/openapi-specs/compute/34-01/desc/profiles/service_get.md +++ b/openapi-specs/compute/34-01/desc/profiles/service_get.md @@ -10,7 +10,7 @@ The returned JSON object has the following structure: Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/profiles/service_id_learn_post.md b/openapi-specs/compute/34-01/desc/profiles/service_id_learn_post.md index fb338b80d..fa85fc3a2 100644 --- a/openapi-specs/compute/34-01/desc/profiles/service_id_learn_post.md +++ b/openapi-specs/compute/34-01/desc/profiles/service_id_learn_post.md @@ -11,7 +11,7 @@ The `PROFILE_ID` is typically the service's name, such as `sshd` or `ntpd`. The following example command uses curl and basic auth to specify the learning mode for a host service profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/profiles/service_learn_post.md b/openapi-specs/compute/34-01/desc/profiles/service_learn_post.md index 02a1f299e..ceff8e5a5 100644 --- a/openapi-specs/compute/34-01/desc/profiles/service_learn_post.md +++ b/openapi-specs/compute/34-01/desc/profiles/service_learn_post.md @@ -3,7 +3,7 @@ Specify the learning mode for all host service profiles. The following example command uses curl and basic auth to specify the learning mode for all host service profiles. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/profiles/service_names_get.md b/openapi-specs/compute/34-01/desc/profiles/service_names_get.md index 7da863545..afae56f0d 100644 --- a/openapi-specs/compute/34-01/desc/profiles/service_names_get.md +++ b/openapi-specs/compute/34-01/desc/profiles/service_names_get.md @@ -3,7 +3,7 @@ Retrieves the name of all host service runtime models from within the app at **M The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/projects/get.md b/openapi-specs/compute/34-01/desc/projects/get.md index 05485c24c..1ac04d2c0 100644 --- a/openapi-specs/compute/34-01/desc/projects/get.md +++ b/openapi-specs/compute/34-01/desc/projects/get.md @@ -3,7 +3,7 @@ Lists all projects visible to the given user. Assuming the given user is an admin, the following example curl command would list all projects: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/projects/name_delete.md b/openapi-specs/compute/34-01/desc/projects/name_delete.md index fba889f7e..0a34e72a2 100644 --- a/openapi-specs/compute/34-01/desc/projects/name_delete.md +++ b/openapi-specs/compute/34-01/desc/projects/name_delete.md @@ -6,7 +6,7 @@ The value for `` can be retrieved from the `_id` field in the resp The DELETE method returns the decommissioned supervisor's admin username and password. ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/compute/34-01/desc/projects/name_put.md b/openapi-specs/compute/34-01/desc/projects/name_put.md index b5a83a67d..1bde9b0c7 100644 --- a/openapi-specs/compute/34-01/desc/projects/name_put.md +++ b/openapi-specs/compute/34-01/desc/projects/name_put.md @@ -4,7 +4,7 @@ The following example curl command updates a project named ``. The value for `` can be retrieved from the `_id` field in the response object from `GET /api/v1/projects`. ```bash -$ curl -k \ +$ curl \ -u \ -X PUT \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/compute/34-01/desc/projects/post.md b/openapi-specs/compute/34-01/desc/projects/post.md index 8862c0fd4..38c574173 100644 --- a/openapi-specs/compute/34-01/desc/projects/post.md +++ b/openapi-specs/compute/34-01/desc/projects/post.md @@ -3,7 +3,7 @@ Provisions a new project. The following example curl command provisions a new project named `my-project`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ $ curl -k \ If you have installed a new instance of Console, and you have already created an initial admin user for it, then you can specify the admin username name and password when you provision the project. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/projects/projects.md b/openapi-specs/compute/34-01/desc/projects/projects.md index 7e7dcff66..19c904e9e 100644 --- a/openapi-specs/compute/34-01/desc/projects/projects.md +++ b/openapi-specs/compute/34-01/desc/projects/projects.md @@ -20,7 +20,7 @@ If `project` is not specified, it is set to `Central+Console`. For example, to retrieve the compliance policies for a tenant project named `mobile_payments_division`, use the following curl command: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/radar/container_clean_post.md b/openapi-specs/compute/34-01/desc/radar/container_clean_post.md index 662b6d53f..d4f87e91e 100644 --- a/openapi-specs/compute/34-01/desc/radar/container_clean_post.md +++ b/openapi-specs/compute/34-01/desc/radar/container_clean_post.md @@ -1,7 +1,7 @@ Cleans the container runtime profiles and Radar entities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/radar/container_delete.md b/openapi-specs/compute/34-01/desc/radar/container_delete.md index 4eabe337f..b6cc69cf2 100644 --- a/openapi-specs/compute/34-01/desc/radar/container_delete.md +++ b/openapi-specs/compute/34-01/desc/radar/container_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-01/desc/radar/container_export_get.md b/openapi-specs/compute/34-01/desc/radar/container_export_get.md index 7f577568f..f776c7e6c 100644 --- a/openapi-specs/compute/34-01/desc/radar/container_export_get.md +++ b/openapi-specs/compute/34-01/desc/radar/container_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for containers) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/radar/container_filters_get.md b/openapi-specs/compute/34-01/desc/radar/container_filters_get.md index f66463da1..8d7cd6df3 100644 --- a/openapi-specs/compute/34-01/desc/radar/container_filters_get.md +++ b/openapi-specs/compute/34-01/desc/radar/container_filters_get.md @@ -1,7 +1,7 @@ Returns the namespaces from the container view on the Radar page. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/radar/container_get.md b/openapi-specs/compute/34-01/desc/radar/container_get.md index 280d683d9..404629a25 100644 --- a/openapi-specs/compute/34-01/desc/radar/container_get.md +++ b/openapi-specs/compute/34-01/desc/radar/container_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (container view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/radar/host_delete.md b/openapi-specs/compute/34-01/desc/radar/host_delete.md index 738fa7a7c..b4910a8b7 100644 --- a/openapi-specs/compute/34-01/desc/radar/host_delete.md +++ b/openapi-specs/compute/34-01/desc/radar/host_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two apps in CNNF for hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-01/desc/radar/host_export_get.md b/openapi-specs/compute/34-01/desc/radar/host_export_get.md index dd91b5335..851d6f40f 100644 --- a/openapi-specs/compute/34-01/desc/radar/host_export_get.md +++ b/openapi-specs/compute/34-01/desc/radar/host_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for hosts) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/radar/host_get.md b/openapi-specs/compute/34-01/desc/radar/host_get.md index a12025856..222d075aa 100644 --- a/openapi-specs/compute/34-01/desc/radar/host_get.md +++ b/openapi-specs/compute/34-01/desc/radar/host_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (host view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/radar/serverless_get.md b/openapi-specs/compute/34-01/desc/radar/serverless_get.md index b2f329149..170cfb48d 100644 --- a/openapi-specs/compute/34-01/desc/radar/serverless_get.md +++ b/openapi-specs/compute/34-01/desc/radar/serverless_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/radar/serverless_progress_get.md b/openapi-specs/compute/34-01/desc/radar/serverless_progress_get.md index a11c1ae20..0808dfbf4 100644 --- a/openapi-specs/compute/34-01/desc/radar/serverless_progress_get.md +++ b/openapi-specs/compute/34-01/desc/radar/serverless_progress_get.md @@ -1,7 +1,7 @@ Returns the scan progress from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/radar/serverless_scan_post.md b/openapi-specs/compute/34-01/desc/radar/serverless_scan_post.md index 0d519ba88..2d444ac88 100644 --- a/openapi-specs/compute/34-01/desc/radar/serverless_scan_post.md +++ b/openapi-specs/compute/34-01/desc/radar/serverless_scan_post.md @@ -1,7 +1,7 @@ Initiates a serverless scan of your environments. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/radar/serverless_stop_post.md b/openapi-specs/compute/34-01/desc/radar/serverless_stop_post.md index 5c0bdf186..f15bef34d 100644 --- a/openapi-specs/compute/34-01/desc/radar/serverless_stop_post.md +++ b/openapi-specs/compute/34-01/desc/radar/serverless_stop_post.md @@ -1,7 +1,7 @@ Stops an in-progress serverless scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/rbac/role_delete.md b/openapi-specs/compute/34-01/desc/rbac/role_delete.md index 87015b6e8..46efcf9c9 100644 --- a/openapi-specs/compute/34-01/desc/rbac/role_delete.md +++ b/openapi-specs/compute/34-01/desc/rbac/role_delete.md @@ -4,7 +4,7 @@ System roles and roles assigned to users/groups cannot be deleted. The following example curl command uses basic auth to delete role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-01/desc/rbac/roles_get.md b/openapi-specs/compute/34-01/desc/rbac/roles_get.md index 4cd1d9bc7..112026937 100644 --- a/openapi-specs/compute/34-01/desc/rbac/roles_get.md +++ b/openapi-specs/compute/34-01/desc/rbac/roles_get.md @@ -3,7 +3,7 @@ This endpoint will return a list in JSON format of the roles can be found under The following example curl command uses basic auth to return: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/rbac/roles_post.md b/openapi-specs/compute/34-01/desc/rbac/roles_post.md index 1f20772ce..6988766e8 100644 --- a/openapi-specs/compute/34-01/desc/rbac/roles_post.md +++ b/openapi-specs/compute/34-01/desc/rbac/roles_post.md @@ -37,7 +37,7 @@ The added role must contain the "user" permission with read-write access. This p The following example curl command uses basic auth to create the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/rbac/roles_put.md b/openapi-specs/compute/34-01/desc/rbac/roles_put.md index 34d7b41a7..f62e34ccb 100644 --- a/openapi-specs/compute/34-01/desc/rbac/roles_put.md +++ b/openapi-specs/compute/34-01/desc/rbac/roles_put.md @@ -38,7 +38,7 @@ The updated role must contain the "user" permission with read-write access. This The following example curl command uses basic auth to update the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-01/desc/recovery/backup_get.md b/openapi-specs/compute/34-01/desc/recovery/backup_get.md index 4da46f356..bf735905a 100644 --- a/openapi-specs/compute/34-01/desc/recovery/backup_get.md +++ b/openapi-specs/compute/34-01/desc/recovery/backup_get.md @@ -3,7 +3,7 @@ Returns a list of available backups. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/recovery/backup_id_delete.md b/openapi-specs/compute/34-01/desc/recovery/backup_id_delete.md index ae9c33e90..80cd4c3f6 100644 --- a/openapi-specs/compute/34-01/desc/recovery/backup_id_delete.md +++ b/openapi-specs/compute/34-01/desc/recovery/backup_id_delete.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-01/desc/recovery/backup_id_patch.md b/openapi-specs/compute/34-01/desc/recovery/backup_id_patch.md index 4a78cd67d..b3699972f 100644 --- a/openapi-specs/compute/34-01/desc/recovery/backup_id_patch.md +++ b/openapi-specs/compute/34-01/desc/recovery/backup_id_patch.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/compute/34-01/desc/recovery/backup_post.md b/openapi-specs/compute/34-01/desc/recovery/backup_post.md index f45161712..41436fe5f 100644 --- a/openapi-specs/compute/34-01/desc/recovery/backup_post.md +++ b/openapi-specs/compute/34-01/desc/recovery/backup_post.md @@ -3,7 +3,7 @@ Creates a backup named `backup_name` by invoking the MongoDB dump process. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/recovery/restore_id_post.md b/openapi-specs/compute/34-01/desc/recovery/restore_id_post.md index 850fceeaa..e424641cc 100644 --- a/openapi-specs/compute/34-01/desc/recovery/restore_id_post.md +++ b/openapi-specs/compute/34-01/desc/recovery/restore_id_post.md @@ -5,7 +5,7 @@ Restores Prisma Cloud Compute from the given backup. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/registry/download_get.md b/openapi-specs/compute/34-01/desc/registry/download_get.md index 5a3eb0141..3eef8d50e 100644 --- a/openapi-specs/compute/34-01/desc/registry/download_get.md +++ b/openapi-specs/compute/34-01/desc/registry/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Compliance > Images > Reg Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/registry/get.md b/openapi-specs/compute/34-01/desc/registry/get.md index e8b87080e..208b2f1e3 100644 --- a/openapi-specs/compute/34-01/desc/registry/get.md +++ b/openapi-specs/compute/34-01/desc/registry/get.md @@ -21,7 +21,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that retrieves a scan report for all images in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -33,7 +33,7 @@ The compact query can be used to get a general overview of the number of Vulnera Refer to the following cURL command that retrieves a compact scan report for the Ubuntu image in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -44,7 +44,7 @@ The name query is synonymous with the filter registry text field in the Console Refer to the following cURL that retrieves the scan report for the image in the registry with the matching **sha256** hash: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -54,7 +54,7 @@ $ curl -k \ Refer to the following cURL command that retrieves the images in the first 10 registries: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/registry/get_registry_progress.md b/openapi-specs/compute/34-01/desc/registry/get_registry_progress.md index ddc319c1b..cc6feac3d 100644 --- a/openapi-specs/compute/34-01/desc/registry/get_registry_progress.md +++ b/openapi-specs/compute/34-01/desc/registry/get_registry_progress.md @@ -11,7 +11,7 @@ For a regular scan, use the API path only without any query parameters. Refer to the following example cURL request that retrieves the ongoing scan details for a regular registry scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -61,7 +61,7 @@ For an on-demand scan that is started using the `/registry/scan` endpoint with t Refer to the following example cURL request that retrieves the ongoing scan details for an on-demand registry scan that is started using the `/registry/scan` endpoint for the repository `alpine` with tag `3.16`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/registry/names_get.md b/openapi-specs/compute/34-01/desc/registry/names_get.md index 6933a570c..25afb48b8 100644 --- a/openapi-specs/compute/34-01/desc/registry/names_get.md +++ b/openapi-specs/compute/34-01/desc/registry/names_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command that retrieves a list of image names from your scanned registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/registry/scan_post.md b/openapi-specs/compute/34-01/desc/registry/scan_post.md index ce7e19533..96bfd5f16 100644 --- a/openapi-specs/compute/34-01/desc/registry/scan_post.md +++ b/openapi-specs/compute/34-01/desc/registry/scan_post.md @@ -17,7 +17,7 @@ For information on scan result, see [Get Registry Scan Report](https://prisma.pa Refer to the following example cURL command that forces Prisma Cloud Compute to rescan all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -27,7 +27,7 @@ $ curl -k \ Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan a specific image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -52,7 +52,7 @@ For information on scan result, see [Get Registry Scan Report](https://pan.dev/p Refer to the following example cURL command to trigger an on-demand scan for an image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/registry/stop_post.md b/openapi-specs/compute/34-01/desc/registry/stop_post.md index 29e103ac1..05ac2f436 100644 --- a/openapi-specs/compute/34-01/desc/registry/stop_post.md +++ b/openapi-specs/compute/34-01/desc/registry/stop_post.md @@ -5,7 +5,7 @@ Stops current registry scan immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to stop scanning all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/scans/download_get.md b/openapi-specs/compute/34-01/desc/scans/download_get.md index 61a0ccc2d..3785bf562 100644 --- a/openapi-specs/compute/34-01/desc/scans/download_get.md +++ b/openapi-specs/compute/34-01/desc/scans/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Images The following cURL command retrieves and saves your Jenkins and twistcli scan reports to a CSV file called `scans_report.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/scans/filter_get.md b/openapi-specs/compute/34-01/desc/scans/filter_get.md index 58550ad35..df3e9cdb0 100644 --- a/openapi-specs/compute/34-01/desc/scans/filter_get.md +++ b/openapi-specs/compute/34-01/desc/scans/filter_get.md @@ -3,7 +3,7 @@ Retrieves the list of Jenkins projects that have been scanned by the Jenkins plu The following example curl command uses basic auth to retrieve the list of Jenkins project names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/scans/get.md b/openapi-specs/compute/34-01/desc/scans/get.md index e28506972..107b733bd 100644 --- a/openapi-specs/compute/34-01/desc/scans/get.md +++ b/openapi-specs/compute/34-01/desc/scans/get.md @@ -11,7 +11,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command that retrieves the scan reports for all images scanned using the Jenkins CI plugin or the twistcli tool: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -23,7 +23,7 @@ To get the report of a specific scan, add query parameters to narrow the scope o The following cURL command retrieves the scan report for an image with a SHA256 ID of `sha256:f756e84300d8e53006090573dd33abe5b8cfac3e42d104fc4be37f435fe512f3`. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/scans/id_get.md b/openapi-specs/compute/34-01/desc/scans/id_get.md index 7a342ef60..1557b1905 100644 --- a/openapi-specs/compute/34-01/desc/scans/id_get.md +++ b/openapi-specs/compute/34-01/desc/scans/id_get.md @@ -3,7 +3,7 @@ Retrieves all scan reports for images scanned by the Jenkins plugin or twistcli The following example curl command uses basic auth to retrieve the scan report for just an image with a SHA256 ID of `5c3385fd2e76c5c16124c077`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/scripts/console_sh_get.md b/openapi-specs/compute/34-01/desc/scripts/console_sh_get.md index d8f02038f..1622321ca 100644 --- a/openapi-specs/compute/34-01/desc/scripts/console_sh_get.md +++ b/openapi-specs/compute/34-01/desc/scripts/console_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/scripts/defender_ps1_get.md b/openapi-specs/compute/34-01/desc/scripts/defender_ps1_get.md index a47616983..45e4a6133 100644 --- a/openapi-specs/compute/34-01/desc/scripts/defender_ps1_get.md +++ b/openapi-specs/compute/34-01/desc/scripts/defender_ps1_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/scripts/defender_sh_get.md b/openapi-specs/compute/34-01/desc/scripts/defender_sh_get.md index 98ad6cf62..a8a302426 100644 --- a/openapi-specs/compute/34-01/desc/scripts/defender_sh_get.md +++ b/openapi-specs/compute/34-01/desc/scripts/defender_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/serverless/download_get.md b/openapi-specs/compute/34-01/desc/serverless/download_get.md index a8e49ff25..4d7d3adc1 100644 --- a/openapi-specs/compute/34-01/desc/serverless/download_get.md +++ b/openapi-specs/compute/34-01/desc/serverless/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Functio The following cURL command retrieves a list of all serverless resources monitored by Prisma Cloud Compute and saves the results in a CSV file called `serverless.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/serverless/download' \ diff --git a/openapi-specs/compute/34-01/desc/serverless/embed_post.md b/openapi-specs/compute/34-01/desc/serverless/embed_post.md index 6cce784b8..353b5721c 100644 --- a/openapi-specs/compute/34-01/desc/serverless/embed_post.md +++ b/openapi-specs/compute/34-01/desc/serverless/embed_post.md @@ -1,7 +1,7 @@ The following curl command uses basic auth to retrieve a list of all Serverless resources that monitored by Prisma Cloud Compute, and save the results to a CSV file: ```bash -$ curl -k \ +$ curl \ -X POST \ -H "Content-Type: application/octet-stream" \ -u \ diff --git a/openapi-specs/compute/34-01/desc/serverless/get.md b/openapi-specs/compute/34-01/desc/serverless/get.md index aee50492f..430ee065a 100644 --- a/openapi-specs/compute/34-01/desc/serverless/get.md +++ b/openapi-specs/compute/34-01/desc/serverless/get.md @@ -11,7 +11,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Functions > Scanned function Refer to the following example cURL command that retrieves the scan reports for serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/serverless/names_get.md b/openapi-specs/compute/34-01/desc/serverless/names_get.md index 3cab17092..90285574a 100644 --- a/openapi-specs/compute/34-01/desc/serverless/names_get.md +++ b/openapi-specs/compute/34-01/desc/serverless/names_get.md @@ -5,7 +5,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo The following curl command uses basic auth to retrieve a list of names of all Serverless resources monitored by Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -X GET \ -H "Content-Type: application/json" \ -u \ diff --git a/openapi-specs/compute/34-01/desc/serverless/scan_post.md b/openapi-specs/compute/34-01/desc/serverless/scan_post.md index 159285349..70a3a3b4e 100644 --- a/openapi-specs/compute/34-01/desc/serverless/scan_post.md +++ b/openapi-specs/compute/34-01/desc/serverless/scan_post.md @@ -5,7 +5,7 @@ Re-scan all serverless functions immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/scan diff --git a/openapi-specs/compute/34-01/desc/serverless/stop_post.md b/openapi-specs/compute/34-01/desc/serverless/stop_post.md index 763710842..67c0d2239 100644 --- a/openapi-specs/compute/34-01/desc/serverless/stop_post.md +++ b/openapi-specs/compute/34-01/desc/serverless/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing serverless scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/stop diff --git a/openapi-specs/compute/34-01/desc/settings/alerts_get.md b/openapi-specs/compute/34-01/desc/settings/alerts_get.md index 060114c39..2b25dc6c9 100644 --- a/openapi-specs/compute/34-01/desc/settings/alerts_get.md +++ b/openapi-specs/compute/34-01/desc/settings/alerts_get.md @@ -1,7 +1,7 @@ Retrieves a list of your alert settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/settings/alerts_options_get.md b/openapi-specs/compute/34-01/desc/settings/alerts_options_get.md index 095c1f1b7..aa7a1d250 100644 --- a/openapi-specs/compute/34-01/desc/settings/alerts_options_get.md +++ b/openapi-specs/compute/34-01/desc/settings/alerts_options_get.md @@ -3,7 +3,7 @@ This endpoint will return the alert profile configuration options that can be fo The following example curl command uses basic auth to retrieve all alert profile configuration options: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/settings/alerts_post.md b/openapi-specs/compute/34-01/desc/settings/alerts_post.md index 3acb8d543..cd303f880 100644 --- a/openapi-specs/compute/34-01/desc/settings/alerts_post.md +++ b/openapi-specs/compute/34-01/desc/settings/alerts_post.md @@ -3,7 +3,7 @@ Configure alerts. The following example curl command sets the aggregation period for alerts to one hour. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/settings/certificates_post.md b/openapi-specs/compute/34-01/desc/settings/certificates_post.md index fbdc8a5a9..bd30ea399 100644 --- a/openapi-specs/compute/34-01/desc/settings/certificates_post.md +++ b/openapi-specs/compute/34-01/desc/settings/certificates_post.md @@ -9,7 +9,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to set the validity period for client certificates to seven days: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/34-01/desc/settings/certs_get.md b/openapi-specs/compute/34-01/desc/settings/certs_get.md index ba6674a3c..dbf1d3790 100644 --- a/openapi-specs/compute/34-01/desc/settings/certs_get.md +++ b/openapi-specs/compute/34-01/desc/settings/certs_get.md @@ -6,7 +6,7 @@ Defenders use these names to connect to Console. Refer to the following example cURL request that uses basic auth to retrieve the SANs in Console's cert: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/settings/certs_post.md b/openapi-specs/compute/34-01/desc/settings/certs_post.md index a6e429006..fb2cedee5 100644 --- a/openapi-specs/compute/34-01/desc/settings/certs_post.md +++ b/openapi-specs/compute/34-01/desc/settings/certs_post.md @@ -12,7 +12,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to add `node-01.example.com` to the `subjectAltName` field in the certificate: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/34-01/desc/settings/coderepos_get.md b/openapi-specs/compute/34-01/desc/settings/coderepos_get.md index 6cbfb78cb..286a8d905 100644 --- a/openapi-specs/compute/34-01/desc/settings/coderepos_get.md +++ b/openapi-specs/compute/34-01/desc/settings/coderepos_get.md @@ -20,7 +20,7 @@ Construct the full webhook using Console's publicly accessible DNS name or IP ad Refer to the following example cURL command that retrieves all code repositories to scan, as well as the webhook URL suffix: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/settings/console-certificates_post.md b/openapi-specs/compute/34-01/desc/settings/console-certificates_post.md index 5673af840..392061c8f 100644 --- a/openapi-specs/compute/34-01/desc/settings/console-certificates_post.md +++ b/openapi-specs/compute/34-01/desc/settings/console-certificates_post.md @@ -9,7 +9,7 @@ For the custom TLS certificate for securing browser access, this file must be in Refer to the following example cURL request that uses basic auth and configures the custom certificate to use for securing browser access to the console: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/settings/custom-labels_get.md b/openapi-specs/compute/34-01/desc/settings/custom-labels_get.md index a849dd8a8..19c1cadde 100644 --- a/openapi-specs/compute/34-01/desc/settings/custom-labels_get.md +++ b/openapi-specs/compute/34-01/desc/settings/custom-labels_get.md @@ -5,7 +5,7 @@ Returns the list of alert labels configured in Prisma Cloud Compute. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/settings/custom-labels_post.md b/openapi-specs/compute/34-01/desc/settings/custom-labels_post.md index 6bb66e706..9b0702fe8 100644 --- a/openapi-specs/compute/34-01/desc/settings/custom-labels_post.md +++ b/openapi-specs/compute/34-01/desc/settings/custom-labels_post.md @@ -5,7 +5,7 @@ Creates a custom alert label to augment audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/settings/defender_get.md b/openapi-specs/compute/34-01/desc/settings/defender_get.md index ecb8b6989..cf43bb304 100644 --- a/openapi-specs/compute/34-01/desc/settings/defender_get.md +++ b/openapi-specs/compute/34-01/desc/settings/defender_get.md @@ -5,7 +5,7 @@ Returns the advanced settings for Defenders. Refer to the following example cURL command that gets all advanced settings for Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/settings/forensic_get.md b/openapi-specs/compute/34-01/desc/settings/forensic_get.md index 9c16b70b9..3486b2bf9 100644 --- a/openapi-specs/compute/34-01/desc/settings/forensic_get.md +++ b/openapi-specs/compute/34-01/desc/settings/forensic_get.md @@ -1,7 +1,7 @@ Retrieves the settings for the forensics system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/settings/forensic_post.md b/openapi-specs/compute/34-01/desc/settings/forensic_post.md index 31f809d39..8943842fb 100644 --- a/openapi-specs/compute/34-01/desc/settings/forensic_post.md +++ b/openapi-specs/compute/34-01/desc/settings/forensic_post.md @@ -3,7 +3,7 @@ Configures the forensics system. The following example curl command allocates 100 MB of local disk space for container forensic data and 10 MB for host forensics data. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/settings/initialized_get.md b/openapi-specs/compute/34-01/desc/settings/initialized_get.md index 3134912d1..2af8462f1 100644 --- a/openapi-specs/compute/34-01/desc/settings/initialized_get.md +++ b/openapi-specs/compute/34-01/desc/settings/initialized_get.md @@ -4,7 +4,7 @@ After first installing Console, the first thing you must do is create an admin a Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/settings/intelligence-windows_post.md b/openapi-specs/compute/34-01/desc/settings/intelligence-windows_post.md index c39e256d2..0721dab3b 100644 --- a/openapi-specs/compute/34-01/desc/settings/intelligence-windows_post.md +++ b/openapi-specs/compute/34-01/desc/settings/intelligence-windows_post.md @@ -3,7 +3,7 @@ This endpoint will enable or disable the Windows Intelligence Service from **Man The following example curl command uses basic auth to enable online updates of Windows vulnerabilities from the intelligence stream: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/settings/intelligence_get.md b/openapi-specs/compute/34-01/desc/settings/intelligence_get.md index 26c694246..15e9f24ae 100644 --- a/openapi-specs/compute/34-01/desc/settings/intelligence_get.md +++ b/openapi-specs/compute/34-01/desc/settings/intelligence_get.md @@ -5,7 +5,7 @@ Returns the details about the Intelligence Stream configuration. Refer to the following example cURL command that uses basic auth to retrieve your Intelligence Stream configuration settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/settings/intelligence_post.md b/openapi-specs/compute/34-01/desc/settings/intelligence_post.md index 74b06a3a0..2dbbd0168 100644 --- a/openapi-specs/compute/34-01/desc/settings/intelligence_post.md +++ b/openapi-specs/compute/34-01/desc/settings/intelligence_post.md @@ -7,7 +7,7 @@ For more information, see [Intelligence Stream](https://docs.paloaltonetworks.co Refer to the following example cURL command that uses basic auth to configure settings of your Intelligence Stream. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/settings/latest-version_get.md b/openapi-specs/compute/34-01/desc/settings/latest-version_get.md index c443fa7b5..16601fb5b 100644 --- a/openapi-specs/compute/34-01/desc/settings/latest-version_get.md +++ b/openapi-specs/compute/34-01/desc/settings/latest-version_get.md @@ -3,7 +3,7 @@ Retrieves the version number of the latest available Prisma Cloud Compute releas Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/settings/latest_version_get.md b/openapi-specs/compute/34-01/desc/settings/latest_version_get.md index 18e436668..5c64edff1 100644 --- a/openapi-specs/compute/34-01/desc/settings/latest_version_get.md +++ b/openapi-specs/compute/34-01/desc/settings/latest_version_get.md @@ -1,7 +1,7 @@ This endpoint will return the latest version of the product. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/settings/ldap_get.md b/openapi-specs/compute/34-01/desc/settings/ldap_get.md index 4ad0ad0c9..7d803ba1c 100644 --- a/openapi-specs/compute/34-01/desc/settings/ldap_get.md +++ b/openapi-specs/compute/34-01/desc/settings/ldap_get.md @@ -5,7 +5,7 @@ Returns the LDAP integration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/settings/ldap_post.md b/openapi-specs/compute/34-01/desc/settings/ldap_post.md index c152c7dc5..34bc06ef4 100644 --- a/openapi-specs/compute/34-01/desc/settings/ldap_post.md +++ b/openapi-specs/compute/34-01/desc/settings/ldap_post.md @@ -7,7 +7,7 @@ For more information, see [Active Directory](https://docs.paloaltonetworks.com/p Refer to the following example cURL command that enables the LDAP integration and specifies the parameters required to integrate with an Active Directory service. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/settings/license_get.md b/openapi-specs/compute/34-01/desc/settings/license_get.md index 5c792cae8..2b4b548e3 100644 --- a/openapi-specs/compute/34-01/desc/settings/license_get.md +++ b/openapi-specs/compute/34-01/desc/settings/license_get.md @@ -5,7 +5,7 @@ Returns the details about the installed license. Refer to the following example cURL request that retrieves the license details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/settings/license_post.md b/openapi-specs/compute/34-01/desc/settings/license_post.md index b77800a5f..ce74b0d0f 100644 --- a/openapi-specs/compute/34-01/desc/settings/license_post.md +++ b/openapi-specs/compute/34-01/desc/settings/license_post.md @@ -8,7 +8,7 @@ For more information, see [Licensing](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to set your license: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/settings/logging_get.md b/openapi-specs/compute/34-01/desc/settings/logging_get.md index 6eda3e484..012be5def 100644 --- a/openapi-specs/compute/34-01/desc/settings/logging_get.md +++ b/openapi-specs/compute/34-01/desc/settings/logging_get.md @@ -5,7 +5,7 @@ Returns the logging settings. Refer to the following example cURL request that uses basic auth to retrieve your logging details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/settings/logging_post.md b/openapi-specs/compute/34-01/desc/settings/logging_post.md index 3619d9c0f..8d27ee1b3 100644 --- a/openapi-specs/compute/34-01/desc/settings/logging_post.md +++ b/openapi-specs/compute/34-01/desc/settings/logging_post.md @@ -8,7 +8,7 @@ For more information, see [Logging](https://docs.paloaltonetworks.com/prisma/pri Refer to the following example cURL request that enables verbose scan output for syslog and stdout: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/settings/logon_get.md b/openapi-specs/compute/34-01/desc/settings/logon_get.md index 1559f2405..b1e9164f2 100644 --- a/openapi-specs/compute/34-01/desc/settings/logon_get.md +++ b/openapi-specs/compute/34-01/desc/settings/logon_get.md @@ -5,7 +5,7 @@ Configures the logon settings. Refer to the following example cURL request that uses basic auth to retrieve all current logon settings. ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/settings/logon_post.md b/openapi-specs/compute/34-01/desc/settings/logon_post.md index 5c2b60c9f..691e082fe 100644 --- a/openapi-specs/compute/34-01/desc/settings/logon_post.md +++ b/openapi-specs/compute/34-01/desc/settings/logon_post.md @@ -7,7 +7,7 @@ For more information, see [Logon Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that uses basic auth to set the timeout to 900 seconds (15 minutes): ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/34-01/desc/settings/oauth_get.md b/openapi-specs/compute/34-01/desc/settings/oauth_get.md index 6dcf70fb5..5d997f016 100644 --- a/openapi-specs/compute/34-01/desc/settings/oauth_get.md +++ b/openapi-specs/compute/34-01/desc/settings/oauth_get.md @@ -5,7 +5,7 @@ Returns the OAuth configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/settings/oauth_post.md b/openapi-specs/compute/34-01/desc/settings/oauth_post.md index c593b9237..da3c83d2f 100644 --- a/openapi-specs/compute/34-01/desc/settings/oauth_post.md +++ b/openapi-specs/compute/34-01/desc/settings/oauth_post.md @@ -7,7 +7,7 @@ For more information, see [GitHub OAuth](https://docs.paloaltonetworks.com/prism Refer to the following example cURL response: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/settings/oidc_get.md b/openapi-specs/compute/34-01/desc/settings/oidc_get.md index ee439622b..1f27f93ba 100644 --- a/openapi-specs/compute/34-01/desc/settings/oidc_get.md +++ b/openapi-specs/compute/34-01/desc/settings/oidc_get.md @@ -5,7 +5,7 @@ Returns the OpenID Connect configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/settings/oidc_post.md b/openapi-specs/compute/34-01/desc/settings/oidc_post.md index e0270247e..5bd3a9192 100644 --- a/openapi-specs/compute/34-01/desc/settings/oidc_post.md +++ b/openapi-specs/compute/34-01/desc/settings/oidc_post.md @@ -7,7 +7,7 @@ For more information, see [OIDC](https://docs.paloaltonetworks.com/prisma/prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/settings/pcf_get.md b/openapi-specs/compute/34-01/desc/settings/pcf_get.md index 5dc21eb17..c5e42a823 100644 --- a/openapi-specs/compute/34-01/desc/settings/pcf_get.md +++ b/openapi-specs/compute/34-01/desc/settings/pcf_get.md @@ -3,7 +3,7 @@ This endpoint will return settings for PCF (Pivotal Cloud Foundry)Blobstore scan The following example curl command uses basic auth to retrieve the current PCF Blobstore scanning settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/settings/pcf_post.md b/openapi-specs/compute/34-01/desc/settings/pcf_post.md index 139e947cb..657e14f27 100644 --- a/openapi-specs/compute/34-01/desc/settings/pcf_post.md +++ b/openapi-specs/compute/34-01/desc/settings/pcf_post.md @@ -3,7 +3,7 @@ This endpoint will allow for updating settings for PCF (Pivotal Cloud Foundry) B The following example curl command uses basic auth to set up a PCF Blobstore scanner that scans the last `5` droplets for every droplet in the PCF Blobstore: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/settings/projects_get.md b/openapi-specs/compute/34-01/desc/settings/projects_get.md index f5dd20395..bc95414a1 100644 --- a/openapi-specs/compute/34-01/desc/settings/projects_get.md +++ b/openapi-specs/compute/34-01/desc/settings/projects_get.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command retrieves the state of the Projects feature from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ All API calls must be proxied through Central Console, where the request is auto To retrieve the Projects settings from a supervisor Console, append the `project` query parameter to your request. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/settings/projects_post.md b/openapi-specs/compute/34-01/desc/settings/projects_post.md index d29f8e9d5..b3472e6b9 100644 --- a/openapi-specs/compute/34-01/desc/settings/projects_post.md +++ b/openapi-specs/compute/34-01/desc/settings/projects_post.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command designates `` as master. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/settings/proxy_get.md b/openapi-specs/compute/34-01/desc/settings/proxy_get.md index 9a4922d59..477563069 100644 --- a/openapi-specs/compute/34-01/desc/settings/proxy_get.md +++ b/openapi-specs/compute/34-01/desc/settings/proxy_get.md @@ -5,7 +5,7 @@ Returns the proxy settings for Prisma Cloud Compute containers to access the Int Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/settings/proxy_post.md b/openapi-specs/compute/34-01/desc/settings/proxy_post.md index a1bdc07ed..df926524e 100644 --- a/openapi-specs/compute/34-01/desc/settings/proxy_post.md +++ b/openapi-specs/compute/34-01/desc/settings/proxy_post.md @@ -7,7 +7,7 @@ For more information, see [Proxy Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that specifies the proxy to use to access the Internet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/settings/registry_get.md b/openapi-specs/compute/34-01/desc/settings/registry_get.md index 12745005d..64e70b698 100644 --- a/openapi-specs/compute/34-01/desc/settings/registry_get.md +++ b/openapi-specs/compute/34-01/desc/settings/registry_get.md @@ -17,7 +17,7 @@ Construct the full webhook using the publicly accessible DNS name or IP address, The following cURL command retrieves all the registries to scan and the URL suffix for the registry's webhook URL suffix. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/settings/registry_post.md b/openapi-specs/compute/34-01/desc/settings/registry_post.md index efabf4e67..decf80a65 100644 --- a/openapi-specs/compute/34-01/desc/settings/registry_post.md +++ b/openapi-specs/compute/34-01/desc/settings/registry_post.md @@ -30,7 +30,7 @@ The API response returns an HTTP 400 error if the number of registry specificati Refer to the following example cURL command that configures Prisma Cloud Compute to scan the Ubuntu 16.04 repository on Docker Hub: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -64,7 +64,7 @@ To add settings for a GitLab Container Registry, you must specify the following Refer to the following example cURL command: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/settings/registry_put.md b/openapi-specs/compute/34-01/desc/settings/registry_put.md index 3768914f6..75d6c79a2 100644 --- a/openapi-specs/compute/34-01/desc/settings/registry_put.md +++ b/openapi-specs/compute/34-01/desc/settings/registry_put.md @@ -127,7 +127,7 @@ To remove a registry from the list: To delete all entries, submit an empty `specifications` array. For example: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-01/desc/settings/saml_get.md b/openapi-specs/compute/34-01/desc/settings/saml_get.md index f2228a440..4fb940e80 100644 --- a/openapi-specs/compute/34-01/desc/settings/saml_get.md +++ b/openapi-specs/compute/34-01/desc/settings/saml_get.md @@ -5,7 +5,7 @@ Returns the configured SAML settings that is used to authenticate to the Prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/settings/saml_post.md b/openapi-specs/compute/34-01/desc/settings/saml_post.md index 0bd9c4a25..dfe8d380f 100644 --- a/openapi-specs/compute/34-01/desc/settings/saml_post.md +++ b/openapi-specs/compute/34-01/desc/settings/saml_post.md @@ -7,7 +7,7 @@ For more information, see [Okta via SAML 2.0](https://docs.paloaltonetworks.com/ Refer to the following example cURL request that uses the basic auth to set up and enable the SAML integration with Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/settings/scan_get.md b/openapi-specs/compute/34-01/desc/settings/scan_get.md index 5c1df30a2..543ea7662 100644 --- a/openapi-specs/compute/34-01/desc/settings/scan_get.md +++ b/openapi-specs/compute/34-01/desc/settings/scan_get.md @@ -5,7 +5,7 @@ Returns the global settings for image, host, container, and registry scanning. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/settings/scan_post.md b/openapi-specs/compute/34-01/desc/settings/scan_post.md index f043d1c9f..9ddb521a2 100644 --- a/openapi-specs/compute/34-01/desc/settings/scan_post.md +++ b/openapi-specs/compute/34-01/desc/settings/scan_post.md @@ -9,7 +9,7 @@ Refer to the following example cURL request that configures the following scan i * Scan images, containers, and hosts once per day. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/settings/secrets_get.md b/openapi-specs/compute/34-01/desc/settings/secrets_get.md index 75e2b32c7..339009641 100644 --- a/openapi-specs/compute/34-01/desc/settings/secrets_get.md +++ b/openapi-specs/compute/34-01/desc/settings/secrets_get.md @@ -3,7 +3,7 @@ This endpoint will return configured secret store already configured in the cons The following example curl command retrieves any configured secret stores, as well as the refresh period in hours: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/settings/secrets_post.md b/openapi-specs/compute/34-01/desc/settings/secrets_post.md index d302ecdf8..730d031bf 100644 --- a/openapi-specs/compute/34-01/desc/settings/secrets_post.md +++ b/openapi-specs/compute/34-01/desc/settings/secrets_post.md @@ -5,7 +5,7 @@ Please note the data structure returned from endpoint /settings/secrets GET to s Refer to the following example curl command that adds a CyberArk secret store to the console with the appID set to `Prisma_Cloud_Compute_Console` and set the URL to `https://services-myca.twistlock.com:10882`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/settings/serverless-scan_get.md b/openapi-specs/compute/34-01/desc/settings/serverless-scan_get.md index bb8ce06ba..eb42e4a12 100644 --- a/openapi-specs/compute/34-01/desc/settings/serverless-scan_get.md +++ b/openapi-specs/compute/34-01/desc/settings/serverless-scan_get.md @@ -8,7 +8,7 @@ This endpoint maps to the **Function scope** table data in the **Defend > Vulner Refer to the following example cURL command that retrieves a list of serverless scan scopes: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/settings/serverless_get.md b/openapi-specs/compute/34-01/desc/settings/serverless_get.md index b6122c460..8c654807c 100644 --- a/openapi-specs/compute/34-01/desc/settings/serverless_get.md +++ b/openapi-specs/compute/34-01/desc/settings/serverless_get.md @@ -3,7 +3,7 @@ This endpoint will return any configured serverless function scanners found in * The following example curl command uses basic auth to retrieve serverless settings in an array, sorted by Cloud Provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/settings/serverless_post.md b/openapi-specs/compute/34-01/desc/settings/serverless_post.md index 6e26ea1d3..c0e0f3225 100644 --- a/openapi-specs/compute/34-01/desc/settings/serverless_post.md +++ b/openapi-specs/compute/34-01/desc/settings/serverless_post.md @@ -3,7 +3,7 @@ This endpoint will add serverless function providers to scan for vulnerabilities The following example curl command uses basic auth to add a serverless account to scan for serverless functions. This is assuming that you already have the [credential](https://docs.twistlock.com/docs/latest/configure/credentials_store.html) added to the console that is needed to scan that provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/settings/system_get.md b/openapi-specs/compute/34-01/desc/settings/system_get.md index 6f893abf0..0e8a3cba3 100644 --- a/openapi-specs/compute/34-01/desc/settings/system_get.md +++ b/openapi-specs/compute/34-01/desc/settings/system_get.md @@ -3,7 +3,7 @@ This endpoint will return all system settings in JSON format. The following example curl command does exactly that: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/settings/tas_get.md b/openapi-specs/compute/34-01/desc/settings/tas_get.md index 52f392433..d2d0017f0 100644 --- a/openapi-specs/compute/34-01/desc/settings/tas_get.md +++ b/openapi-specs/compute/34-01/desc/settings/tas_get.md @@ -5,7 +5,7 @@ Retrieves Tanzu Application Service (TAS) settings. Refer to the following example cURL command that retrieves all TAS settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/settings/telemetry_get.md b/openapi-specs/compute/34-01/desc/settings/telemetry_get.md index 6460c3fc3..46a807e77 100644 --- a/openapi-specs/compute/34-01/desc/settings/telemetry_get.md +++ b/openapi-specs/compute/34-01/desc/settings/telemetry_get.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that retrieves the settings if telemetry is enabled or not: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/settings/telemetry_post.md b/openapi-specs/compute/34-01/desc/settings/telemetry_post.md index bc97a6d0f..662846f33 100644 --- a/openapi-specs/compute/34-01/desc/settings/telemetry_post.md +++ b/openapi-specs/compute/34-01/desc/settings/telemetry_post.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to turn off telemetry: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/settings/trusted_certificate_post.md b/openapi-specs/compute/34-01/desc/settings/trusted_certificate_post.md index 5a2a30bda..c54b96fa5 100644 --- a/openapi-specs/compute/34-01/desc/settings/trusted_certificate_post.md +++ b/openapi-specs/compute/34-01/desc/settings/trusted_certificate_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/trusted-certificates` endpoint. Refer to the following example cURL request that uses basic auth to add a certificate to the list: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/34-01/desc/settings/trusted_certificates_post.md b/openapi-specs/compute/34-01/desc/settings/trusted_certificates_post.md index 78c07982b..e9bdc72a1 100644 --- a/openapi-specs/compute/34-01/desc/settings/trusted_certificates_post.md +++ b/openapi-specs/compute/34-01/desc/settings/trusted_certificates_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/certificates` endpoint. Refer to the following example cURL request that uses basic auth to enable this feature: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/34-01/desc/settings/vm_get.md b/openapi-specs/compute/34-01/desc/settings/vm_get.md index 8043742f5..b98b94240 100644 --- a/openapi-specs/compute/34-01/desc/settings/vm_get.md +++ b/openapi-specs/compute/34-01/desc/settings/vm_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **VM images scope** table data in the **Defend > Vulne Refer to the following example cURL command that retrieves all the scopes used for pattern matching on VM functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/signup/post.md b/openapi-specs/compute/34-01/desc/signup/post.md index 1db21df29..67344a0b1 100644 --- a/openapi-specs/compute/34-01/desc/signup/post.md +++ b/openapi-specs/compute/34-01/desc/signup/post.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i The following cURL command creates the initial admin user with the username `admin` and password `password`. ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -X POST \ -d '{"username": "admin", "password": "password"}' \ diff --git a/openapi-specs/compute/34-01/desc/static/capabilities_get.md b/openapi-specs/compute/34-01/desc/static/capabilities_get.md index ea119d2a9..f9b60278c 100644 --- a/openapi-specs/compute/34-01/desc/static/capabilities_get.md +++ b/openapi-specs/compute/34-01/desc/static/capabilities_get.md @@ -1,7 +1,7 @@ Returns a list of capabilities used in host models. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/static/regions_get.md b/openapi-specs/compute/34-01/desc/static/regions_get.md index 4a07097ee..3b1adb5f1 100644 --- a/openapi-specs/compute/34-01/desc/static/regions_get.md +++ b/openapi-specs/compute/34-01/desc/static/regions_get.md @@ -1,7 +1,7 @@ Returns a list of regions used in cloud radar. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/static/syscalls_get.md b/openapi-specs/compute/34-01/desc/static/syscalls_get.md index 9e2ddcde7..09505ba39 100644 --- a/openapi-specs/compute/34-01/desc/static/syscalls_get.md +++ b/openapi-specs/compute/34-01/desc/static/syscalls_get.md @@ -2,7 +2,7 @@ Returns a list of the Linux kernel system calls. Runtime rules for containers can allow-list and deny-list specific system calls. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/static/vulnerabilities_get.md b/openapi-specs/compute/34-01/desc/static/vulnerabilities_get.md index cb6acab28..19809472b 100644 --- a/openapi-specs/compute/34-01/desc/static/vulnerabilities_get.md +++ b/openapi-specs/compute/34-01/desc/static/vulnerabilities_get.md @@ -3,7 +3,7 @@ This data can be used for building out reports with the API. This data can be correlated with the `/api/v1/images` endpoint, specifically the the `complianceVulnerabilities` and `cveVulnerabilities` objects, to generate more thorough reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/stats/compliance.md b/openapi-specs/compute/34-01/desc/stats/compliance.md index 5c5be3991..4f4c90071 100644 --- a/openapi-specs/compute/34-01/desc/stats/compliance.md +++ b/openapi-specs/compute/34-01/desc/stats/compliance.md @@ -5,7 +5,7 @@ For the current day, the response will also include detailed compliance stats fo The following example command that uses curl and basic auth to retrieve compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/stats/compliance_get.md b/openapi-specs/compute/34-01/desc/stats/compliance_get.md index 314f6a179..2ef2f9f75 100644 --- a/openapi-specs/compute/34-01/desc/stats/compliance_get.md +++ b/openapi-specs/compute/34-01/desc/stats/compliance_get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Compliance > Compliance explorer* Refer to the following example cURL command that retrieves compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/stats/compliance_refresh.md b/openapi-specs/compute/34-01/desc/stats/compliance_refresh.md index b75491a69..d8ce211a8 100644 --- a/openapi-specs/compute/34-01/desc/stats/compliance_refresh.md +++ b/openapi-specs/compute/34-01/desc/stats/compliance_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/compliance endpoint return The following example command that uses curl and basic auth to refresh compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/stats/compliance_refresh_post.md b/openapi-specs/compute/34-01/desc/stats/compliance_refresh_post.md index 541a54d16..0f329d1db 100644 --- a/openapi-specs/compute/34-01/desc/stats/compliance_refresh_post.md +++ b/openapi-specs/compute/34-01/desc/stats/compliance_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/compliance`, b Refer to the following example cURL command that refreshes compliance statistics for the current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/stats/daily.md b/openapi-specs/compute/34-01/desc/stats/daily.md index 082f58a27..9fd4c6138 100644 --- a/openapi-specs/compute/34-01/desc/stats/daily.md +++ b/openapi-specs/compute/34-01/desc/stats/daily.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/stats/daily_get.md b/openapi-specs/compute/34-01/desc/stats/daily_get.md index 0db89bdc3..fe852126c 100644 --- a/openapi-specs/compute/34-01/desc/stats/daily_get.md +++ b/openapi-specs/compute/34-01/desc/stats/daily_get.md @@ -3,7 +3,7 @@ Returns a historical list of per-day statistics for the resources protected by P The following example command uses curl and basic auth to retrieve the daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/stats/dashboard.md b/openapi-specs/compute/34-01/desc/stats/dashboard.md index be90a2d32..1e5fabf08 100644 --- a/openapi-specs/compute/34-01/desc/stats/dashboard.md +++ b/openapi-specs/compute/34-01/desc/stats/dashboard.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/stats/dashboard_get.md b/openapi-specs/compute/34-01/desc/stats/dashboard_get.md index 601769645..8f0bc827c 100644 --- a/openapi-specs/compute/34-01/desc/stats/dashboard_get.md +++ b/openapi-specs/compute/34-01/desc/stats/dashboard_get.md @@ -5,7 +5,7 @@ Returns statistics about the resources protected by Prisma Cloud Compute, includ Refer to the following example cURL command that retrieves dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/stats/events_get.md b/openapi-specs/compute/34-01/desc/stats/events_get.md index 3be5eb4e7..e64f98e57 100644 --- a/openapi-specs/compute/34-01/desc/stats/events_get.md +++ b/openapi-specs/compute/34-01/desc/stats/events_get.md @@ -5,7 +5,7 @@ Returns events statistics for your environment. Refer to the following example cURL command retrieves event stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/stats/vulnerabilities.md b/openapi-specs/compute/34-01/desc/stats/vulnerabilities.md index 40c4dd1f1..199cfab62 100644 --- a/openapi-specs/compute/34-01/desc/stats/vulnerabilities.md +++ b/openapi-specs/compute/34-01/desc/stats/vulnerabilities.md @@ -5,7 +5,7 @@ For the current day, the response will also include descriptions of the CVEs cur The following example command that uses curl and basic auth to retrieve vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/stats/vulnerabilities_download_get.md b/openapi-specs/compute/34-01/desc/stats/vulnerabilities_download_get.md index 753af8c7f..9930a636b 100644 --- a/openapi-specs/compute/34-01/desc/stats/vulnerabilities_download_get.md +++ b/openapi-specs/compute/34-01/desc/stats/vulnerabilities_download_get.md @@ -17,7 +17,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a summary count of the CVEs and detailed descriptions for each CVE in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/stats/vulnerabilities_get.md b/openapi-specs/compute/34-01/desc/stats/vulnerabilities_get.md index 2fe5d4e18..978e96cfe 100644 --- a/openapi-specs/compute/34-01/desc/stats/vulnerabilities_get.md +++ b/openapi-specs/compute/34-01/desc/stats/vulnerabilities_get.md @@ -20,7 +20,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a summary count of the CVEs and detailed descriptions for each CVE: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/stats/vulnerabilities_impacted_resources_download_get.md b/openapi-specs/compute/34-01/desc/stats/vulnerabilities_impacted_resources_download_get.md index 0821d6a9f..502c09a6c 100644 --- a/openapi-specs/compute/34-01/desc/stats/vulnerabilities_impacted_resources_download_get.md +++ b/openapi-specs/compute/34-01/desc/stats/vulnerabilities_impacted_resources_download_get.md @@ -15,7 +15,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a list of impacted resources for `CVE-2015-0313` in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/stats/vulnerabilities_impacted_resources_get.md b/openapi-specs/compute/34-01/desc/stats/vulnerabilities_impacted_resources_get.md index c1e6d0ba2..014a5f4a2 100644 --- a/openapi-specs/compute/34-01/desc/stats/vulnerabilities_impacted_resources_get.md +++ b/openapi-specs/compute/34-01/desc/stats/vulnerabilities_impacted_resources_get.md @@ -18,7 +18,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a list of impacted resources for `CVE-2022-28391`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -95,7 +95,7 @@ Refer to the following example JSON response that shows the risk tree for the im Refer to the following example cURL command that retrieves a the impacted registry images `CVE-2015-0313` by using an optional query parameter `resourceType`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -108,7 +108,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a paginated list of impacted resources for `CVE-2015-0313` by using optional query parameters `limit` and `offset`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/stats/vulnerabilities_refresh.md b/openapi-specs/compute/34-01/desc/stats/vulnerabilities_refresh.md index 505a99d98..2aa7da8a1 100644 --- a/openapi-specs/compute/34-01/desc/stats/vulnerabilities_refresh.md +++ b/openapi-specs/compute/34-01/desc/stats/vulnerabilities_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/vulnerabilities endpoint r The following example command that uses curl and basic auth to refresh vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/stats/vulnerabilities_refresh_post.md b/openapi-specs/compute/34-01/desc/stats/vulnerabilities_refresh_post.md index 1e3210e18..85e3ddd7a 100644 --- a/openapi-specs/compute/34-01/desc/stats/vulnerabilities_refresh_post.md +++ b/openapi-specs/compute/34-01/desc/stats/vulnerabilities_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/vulnerabilitie Refer to the following example cURL command that refreshes the vulnerability statistics for current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/stats/workload_get.md b/openapi-specs/compute/34-01/desc/stats/workload_get.md index a25deed5c..940a835ee 100644 --- a/openapi-specs/compute/34-01/desc/stats/workload_get.md +++ b/openapi-specs/compute/34-01/desc/stats/workload_get.md @@ -1,7 +1,7 @@ Returns the workload statistics from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/statuses/intelligence.md b/openapi-specs/compute/34-01/desc/statuses/intelligence.md index 74da8c7ff..ac102e81f 100644 --- a/openapi-specs/compute/34-01/desc/statuses/intelligence.md +++ b/openapi-specs/compute/34-01/desc/statuses/intelligence.md @@ -3,7 +3,7 @@ Returns the connection status of the intelligence stream and the last intelligen The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/statuses/intelligence_get.md b/openapi-specs/compute/34-01/desc/statuses/intelligence_get.md index c18dd9611..b5f620ad9 100644 --- a/openapi-specs/compute/34-01/desc/statuses/intelligence_get.md +++ b/openapi-specs/compute/34-01/desc/statuses/intelligence_get.md @@ -3,7 +3,7 @@ Returns the connection status for the Intelligence Stream, along with the time o The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/statuses/registry_get.md b/openapi-specs/compute/34-01/desc/statuses/registry_get.md index 427c4915c..e4fd09fe9 100644 --- a/openapi-specs/compute/34-01/desc/statuses/registry_get.md +++ b/openapi-specs/compute/34-01/desc/statuses/registry_get.md @@ -13,7 +13,7 @@ To view the more details about the progress of a regular or on-demand registry s Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/statuses/secrets_get.md b/openapi-specs/compute/34-01/desc/statuses/secrets_get.md index 510f15161..e77c5ed70 100644 --- a/openapi-specs/compute/34-01/desc/statuses/secrets_get.md +++ b/openapi-specs/compute/34-01/desc/statuses/secrets_get.md @@ -3,7 +3,7 @@ Returns the connection status of any secret stores you have configured, as well The following is an example curl using basic auth to find the secret store status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/statuses/serverless-radar_get.md b/openapi-specs/compute/34-01/desc/statuses/serverless-radar_get.md index 3bfdbb5bf..4ab5d0c1d 100644 --- a/openapi-specs/compute/34-01/desc/statuses/serverless-radar_get.md +++ b/openapi-specs/compute/34-01/desc/statuses/serverless-radar_get.md @@ -1,7 +1,7 @@ Returns the status of the serverless scans. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/tags/get.md b/openapi-specs/compute/34-01/desc/tags/get.md index 6da7ad135..604eee98e 100644 --- a/openapi-specs/compute/34-01/desc/tags/get.md +++ b/openapi-specs/compute/34-01/desc/tags/get.md @@ -5,7 +5,7 @@ Retrieves a list of tags. Refer to the following example cURL command that retrieves a list of tags: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/tags/name_delete.md b/openapi-specs/compute/34-01/desc/tags/name_delete.md index 2ed010e57..6dedfce8f 100644 --- a/openapi-specs/compute/34-01/desc/tags/name_delete.md +++ b/openapi-specs/compute/34-01/desc/tags/name_delete.md @@ -5,7 +5,7 @@ Deletes a tag from the system. Refer to the following example cURL command that deletes a tag named *my tag*: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-01/desc/tags/name_put.md b/openapi-specs/compute/34-01/desc/tags/name_put.md index cbaea40d3..a5923b8ef 100644 --- a/openapi-specs/compute/34-01/desc/tags/name_put.md +++ b/openapi-specs/compute/34-01/desc/tags/name_put.md @@ -9,7 +9,7 @@ You must define all parameters in your PUT request. Refer to the following example cURL command that updates the parameters in a tag named `my_tag`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-01/desc/tags/post.md b/openapi-specs/compute/34-01/desc/tags/post.md index d55ae8b96..8e1a493d6 100644 --- a/openapi-specs/compute/34-01/desc/tags/post.md +++ b/openapi-specs/compute/34-01/desc/tags/post.md @@ -8,7 +8,7 @@ You can use tags as policy exceptions or assign them to vulnerabilities for acti Refer to the following example cURL command that creates a tag named "my-tag": ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/tags/tag_cve_delete.md b/openapi-specs/compute/34-01/desc/tags/tag_cve_delete.md index 8caed79cf..3031029b9 100644 --- a/openapi-specs/compute/34-01/desc/tags/tag_cve_delete.md +++ b/openapi-specs/compute/34-01/desc/tags/tag_cve_delete.md @@ -6,7 +6,7 @@ When you delete a tag, the tag is deleted from a wider scope. All the packages a Refer to the following example cURL command that removes the tag named `ignored` from the CVE `CVE-2017-15088`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-01/desc/tags/tag_cve_post.md b/openapi-specs/compute/34-01/desc/tags/tag_cve_post.md index 966a80bd8..1b4ead89b 100644 --- a/openapi-specs/compute/34-01/desc/tags/tag_cve_post.md +++ b/openapi-specs/compute/34-01/desc/tags/tag_cve_post.md @@ -45,7 +45,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the source package `perl`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -72,7 +72,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2021-20305` on the binary package `gnutls`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -98,7 +98,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -120,7 +120,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `image` and to all the packages and resources. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -140,7 +140,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `host`, resource `servo-vmware71`, and to all the packages. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/tas-droplets/download_get.md b/openapi-specs/compute/34-01/desc/tas-droplets/download_get.md index db92ec66a..7fdd6e259 100644 --- a/openapi-specs/compute/34-01/desc/tas-droplets/download_get.md +++ b/openapi-specs/compute/34-01/desc/tas-droplets/download_get.md @@ -9,7 +9,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo The following cURL command downloads all TAS droplets to a CSV file called `tas_droplets.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/tas-droplets/get.md b/openapi-specs/compute/34-01/desc/tas-droplets/get.md index d820517c2..ce07f8527 100644 --- a/openapi-specs/compute/34-01/desc/tas-droplets/get.md +++ b/openapi-specs/compute/34-01/desc/tas-droplets/get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > VMware Tanzu bl The following cURL command retrieves all TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/tas-droplets/get_tas_addresses.md b/openapi-specs/compute/34-01/desc/tas-droplets/get_tas_addresses.md index 528281613..8333cd24f 100644 --- a/openapi-specs/compute/34-01/desc/tas-droplets/get_tas_addresses.md +++ b/openapi-specs/compute/34-01/desc/tas-droplets/get_tas_addresses.md @@ -9,7 +9,7 @@ Gets the Cloud Controller Addresses of scanned Tanzu Application Service (TAS) d The following cURL command retrieves the Cloud Controller Addresses of scanned TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/tas-droplets/progress_get.md b/openapi-specs/compute/34-01/desc/tas-droplets/progress_get.md index 504a21e84..507d001bf 100644 --- a/openapi-specs/compute/34-01/desc/tas-droplets/progress_get.md +++ b/openapi-specs/compute/34-01/desc/tas-droplets/progress_get.md @@ -5,7 +5,7 @@ Returns the details of the TAS Droplets ongoing scan. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/tas-droplets/scan_post.md b/openapi-specs/compute/34-01/desc/tas-droplets/scan_post.md index aad2174af..13c4eeeb9 100644 --- a/openapi-specs/compute/34-01/desc/tas-droplets/scan_post.md +++ b/openapi-specs/compute/34-01/desc/tas-droplets/scan_post.md @@ -5,7 +5,7 @@ Scans the TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/tas-droplets/stop_post.md b/openapi-specs/compute/34-01/desc/tas-droplets/stop_post.md index 5f5a019b1..53d709ec7 100644 --- a/openapi-specs/compute/34-01/desc/tas-droplets/stop_post.md +++ b/openapi-specs/compute/34-01/desc/tas-droplets/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing scan of TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/trust/data_get.md b/openapi-specs/compute/34-01/desc/trust/data_get.md index dd55d47a3..88983f139 100644 --- a/openapi-specs/compute/34-01/desc/trust/data_get.md +++ b/openapi-specs/compute/34-01/desc/trust/data_get.md @@ -5,7 +5,7 @@ Returns the trusted registries, repositories, and images. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/trust/data_put.md b/openapi-specs/compute/34-01/desc/trust/data_put.md index 0e6a0ba49..733514505 100644 --- a/openapi-specs/compute/34-01/desc/trust/data_put.md +++ b/openapi-specs/compute/34-01/desc/trust/data_put.md @@ -6,7 +6,7 @@ Specify trusted images using either the image name or layers properties. Refer to the following example cURL command that uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -19,7 +19,7 @@ To edit a trust group based on image base layers, use PUT to specify a list of S Refer to the following example that specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-01/desc/trust/get.md b/openapi-specs/compute/34-01/desc/trust/get.md index 1226cd0a3..57ff5bdb5 100644 --- a/openapi-specs/compute/34-01/desc/trust/get.md +++ b/openapi-specs/compute/34-01/desc/trust/get.md @@ -3,7 +3,7 @@ Retrieves a list of all trusted images. The following example curl command uses basic auth to retrieve all trusted images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/trust/id_delete.md b/openapi-specs/compute/34-01/desc/trust/id_delete.md index b3114775f..d63cdf71a 100644 --- a/openapi-specs/compute/34-01/desc/trust/id_delete.md +++ b/openapi-specs/compute/34-01/desc/trust/id_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to specify a image trust grou ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-01/desc/trust/id_put.md b/openapi-specs/compute/34-01/desc/trust/id_put.md index 44d2c8b8b..c98617bcd 100644 --- a/openapi-specs/compute/34-01/desc/trust/id_put.md +++ b/openapi-specs/compute/34-01/desc/trust/id_put.md @@ -9,7 +9,7 @@ For more information about handles, see the `_id` in the response body for the G The following example curl command uses basic auth to modify the image property for an existing trusted image entry, where the handle for the entry is `docker-ubuntu-group`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-01/desc/trust/learn_get.md b/openapi-specs/compute/34-01/desc/trust/learn_get.md index d8a3414d0..004b16b02 100644 --- a/openapi-specs/compute/34-01/desc/trust/learn_get.md +++ b/openapi-specs/compute/34-01/desc/trust/learn_get.md @@ -1,7 +1,7 @@ Returns the state of the trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/trust/learn_post.md b/openapi-specs/compute/34-01/desc/trust/learn_post.md index 094817738..008657fa2 100644 --- a/openapi-specs/compute/34-01/desc/trust/learn_post.md +++ b/openapi-specs/compute/34-01/desc/trust/learn_post.md @@ -1,7 +1,7 @@ Sets the state of trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/trust/post.md b/openapi-specs/compute/34-01/desc/trust/post.md index 1072275a1..23a324c6c 100644 --- a/openapi-specs/compute/34-01/desc/trust/post.md +++ b/openapi-specs/compute/34-01/desc/trust/post.md @@ -7,7 +7,7 @@ For more information about handles, see the `_id` key in the response body for t The following example curl command uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ To create a trust group based on image base layers, POST a list of SHA256 hashes The following example specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/users/get.md b/openapi-specs/compute/34-01/desc/users/get.md index e4e6966ec..cd5a661ba 100644 --- a/openapi-specs/compute/34-01/desc/users/get.md +++ b/openapi-specs/compute/34-01/desc/users/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Manage > Authentication > Users** in the Console UI. The following cURL command retrieves all users. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/users/id_delete.md b/openapi-specs/compute/34-01/desc/users/id_delete.md index 1cfa5642d..66a1102f9 100644 --- a/openapi-specs/compute/34-01/desc/users/id_delete.md +++ b/openapi-specs/compute/34-01/desc/users/id_delete.md @@ -17,7 +17,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes user `ID` from the system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-01/desc/util/osx_twistcli_arm64_get.md b/openapi-specs/compute/34-01/desc/util/osx_twistcli_arm64_get.md index b385d0d3b..a30686374 100644 --- a/openapi-specs/compute/34-01/desc/util/osx_twistcli_arm64_get.md +++ b/openapi-specs/compute/34-01/desc/util/osx_twistcli_arm64_get.md @@ -7,7 +7,7 @@ Downloads the twistcli binary executable for MacOS platforms based on ARM64 arch Refer to the following example cURL command that downloads and saves the “twistcli” binary executable for ARM64 bit MacOS platforms to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/compute/34-01/desc/util/osx_twistcli_get.md b/openapi-specs/compute/34-01/desc/util/osx_twistcli_get.md index c49f96c41..2353ea338 100644 --- a/openapi-specs/compute/34-01/desc/util/osx_twistcli_get.md +++ b/openapi-specs/compute/34-01/desc/util/osx_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **MacOS platform** hyperlink in **Manage > System > Ut The following cURL command downloads the twistcli binary executable for MacOS platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli \ diff --git a/openapi-specs/compute/34-01/desc/util/twistcli_arm64_get.md b/openapi-specs/compute/34-01/desc/util/twistcli_arm64_get.md index 7ec36d3f5..a3d7318ab 100644 --- a/openapi-specs/compute/34-01/desc/util/twistcli_arm64_get.md +++ b/openapi-specs/compute/34-01/desc/util/twistcli_arm64_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/compute/34-01/desc/util/twistcli_get.md b/openapi-specs/compute/34-01/desc/util/twistcli_get.md index f9d2d295c..08a3ae8aa 100644 --- a/openapi-specs/compute/34-01/desc/util/twistcli_get.md +++ b/openapi-specs/compute/34-01/desc/util/twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -X GET -o \ 'https:///api/v/util/twistcli' diff --git a/openapi-specs/compute/34-01/desc/util/twistlock_jenkins_plugin_get.md b/openapi-specs/compute/34-01/desc/util/twistlock_jenkins_plugin_get.md index 9fb8d4a02..c9f180e5e 100644 --- a/openapi-specs/compute/34-01/desc/util/twistlock_jenkins_plugin_get.md +++ b/openapi-specs/compute/34-01/desc/util/twistlock_jenkins_plugin_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-jenkins-plugin.hpi \ diff --git a/openapi-specs/compute/34-01/desc/util/twistlock_tas_tile_get.md b/openapi-specs/compute/34-01/desc/util/twistlock_tas_tile_get.md index fea28aaad..3fd114e2d 100644 --- a/openapi-specs/compute/34-01/desc/util/twistlock_tas_tile_get.md +++ b/openapi-specs/compute/34-01/desc/util/twistlock_tas_tile_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-tile.pivotal \ diff --git a/openapi-specs/compute/34-01/desc/util/windows_twistcli_get.md b/openapi-specs/compute/34-01/desc/util/windows_twistcli_get.md index 1c545dbbb..38c609b08 100644 --- a/openapi-specs/compute/34-01/desc/util/windows_twistcli_get.md +++ b/openapi-specs/compute/34-01/desc/util/windows_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Windows platform** hyperlink in **Manage > System > The following cURL command downloads the twistcli binary executable for Windows platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli.exe \ diff --git a/openapi-specs/compute/34-01/desc/version/get.md b/openapi-specs/compute/34-01/desc/version/get.md index 28be315e0..5787e90fd 100644 --- a/openapi-specs/compute/34-01/desc/version/get.md +++ b/openapi-specs/compute/34-01/desc/version/get.md @@ -5,7 +5,7 @@ Retrieves the version number for Console. The following cURL command retrieves the version number for Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/vms/download_get.md b/openapi-specs/compute/34-01/desc/vms/download_get.md index e65e4efc9..3cc813bc5 100644 --- a/openapi-specs/compute/34-01/desc/vms/download_get.md +++ b/openapi-specs/compute/34-01/desc/vms/download_get.md @@ -7,7 +7,7 @@ Returns all VM image scan reports in CSV format. Refer to the following example cURL command that retrieves all VM image scan reports and saves the results in a CSV file called `vm_images_scan.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/vms/get.md b/openapi-specs/compute/34-01/desc/vms/get.md index e78a28c76..03ed8deb3 100644 --- a/openapi-specs/compute/34-01/desc/vms/get.md +++ b/openapi-specs/compute/34-01/desc/vms/get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > Hosts > VM imag Refer to the following example cURL command that retrieves all VM image scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/vms/labels_get.md b/openapi-specs/compute/34-01/desc/vms/labels_get.md index 0aed1a217..f509da479 100644 --- a/openapi-specs/compute/34-01/desc/vms/labels_get.md +++ b/openapi-specs/compute/34-01/desc/vms/labels_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-01/desc/vms/names_get.md b/openapi-specs/compute/34-01/desc/vms/names_get.md index 1145cfa0d..9f92e0156 100644 --- a/openapi-specs/compute/34-01/desc/vms/names_get.md +++ b/openapi-specs/compute/34-01/desc/vms/names_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/34-01/desc/vms/scan_post.md b/openapi-specs/compute/34-01/desc/vms/scan_post.md index 1caa2dcaf..4d4de3ab1 100644 --- a/openapi-specs/compute/34-01/desc/vms/scan_post.md +++ b/openapi-specs/compute/34-01/desc/vms/scan_post.md @@ -5,7 +5,7 @@ Re-scans all VM images immediately. This endpoint returns the time that the scan Refer to the following example cURL command that forces Prisma Cloud to re-scan all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-01/desc/vms/stop_post.md b/openapi-specs/compute/34-01/desc/vms/stop_post.md index 4a74743eb..49b2b26f9 100644 --- a/openapi-specs/compute/34-01/desc/vms/stop_post.md +++ b/openapi-specs/compute/34-01/desc/vms/stop_post.md @@ -7,7 +7,7 @@ Note: It might take a few minutes for the scan to stop completely. Refer to the following example cURL command that forces Prisma Cloud to stop scanning all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/SCAP/get.md b/openapi-specs/compute/34-02/desc/SCAP/get.md index a25abe94e..f5870d822 100644 --- a/openapi-specs/compute/34-02/desc/SCAP/get.md +++ b/openapi-specs/compute/34-02/desc/SCAP/get.md @@ -3,7 +3,7 @@ This endpoint will return any SCAP datastreams uploaded to the console. This end The following is an example curl command that uses basic auth to retrieve any uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/SCAP/id_delete.md b/openapi-specs/compute/34-02/desc/SCAP/id_delete.md index 39f1b0132..52923f20a 100644 --- a/openapi-specs/compute/34-02/desc/SCAP/id_delete.md +++ b/openapi-specs/compute/34-02/desc/SCAP/id_delete.md @@ -3,7 +3,7 @@ This endpoint will delete any SCAP datastreams uploaded to the console. You can The following is an example curl command that uses basic auth to delete an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-02/desc/SCAP/post.md b/openapi-specs/compute/34-02/desc/SCAP/post.md index d459a0e97..c45fd6b4e 100644 --- a/openapi-specs/compute/34-02/desc/SCAP/post.md +++ b/openapi-specs/compute/34-02/desc/SCAP/post.md @@ -3,7 +3,7 @@ This endpoint will allow you to add a SCAP datastream to the console. The following is an example curl command that uses basic auth to add an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/_ping/get.md b/openapi-specs/compute/34-02/desc/_ping/get.md index 8e143ef67..b7ffdc653 100644 --- a/openapi-specs/compute/34-02/desc/_ping/get.md +++ b/openapi-specs/compute/34-02/desc/_ping/get.md @@ -5,7 +5,7 @@ Checks if Console is reachable from your network host. Refer to the following cURL example command that pings Console and prints the HTTP response code: ```bash -$ curl -k \ +$ curl \ -s \ -o /dev/null \ -w "%{http_code}\n" \ diff --git a/openapi-specs/compute/34-02/desc/agentless/get_agentless_progress.md b/openapi-specs/compute/34-02/desc/agentless/get_agentless_progress.md index b98ed9da5..78396eec6 100644 --- a/openapi-specs/compute/34-02/desc/agentless/get_agentless_progress.md +++ b/openapi-specs/compute/34-02/desc/agentless/get_agentless_progress.md @@ -5,7 +5,7 @@ Shows the progress of an ongoing scan on hosts or containers for vulnerabilities Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/agentless/post_agentless_scan.md b/openapi-specs/compute/34-02/desc/agentless/post_agentless_scan.md index f1295cdc4..e2f8a4e11 100644 --- a/openapi-specs/compute/34-02/desc/agentless/post_agentless_scan.md +++ b/openapi-specs/compute/34-02/desc/agentless/post_agentless_scan.md @@ -9,7 +9,7 @@ Make sure that you download (use the agentless/templates API) and apply the perm Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/agentless/post_agentless_stop.md b/openapi-specs/compute/34-02/desc/agentless/post_agentless_stop.md index ab83960cc..ddee6ec7a 100644 --- a/openapi-specs/compute/34-02/desc/agentless/post_agentless_stop.md +++ b/openapi-specs/compute/34-02/desc/agentless/post_agentless_stop.md @@ -5,7 +5,7 @@ Stops an ongoing scan on hosts or containers for vulnerabilities and compliance. Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/agentless/post_agentless_templates.md b/openapi-specs/compute/34-02/desc/agentless/post_agentless_templates.md index 96be32555..5159c439a 100644 --- a/openapi-specs/compute/34-02/desc/agentless/post_agentless_templates.md +++ b/openapi-specs/compute/34-02/desc/agentless/post_agentless_templates.md @@ -31,7 +31,7 @@ Add the supported cloud accounts (AWS, Azure, GCP, and OCI) in Prisma Cloud Comp Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/alert-profiles/get.md b/openapi-specs/compute/34-02/desc/alert-profiles/get.md index 82647e248..f17191ac4 100644 --- a/openapi-specs/compute/34-02/desc/alert-profiles/get.md +++ b/openapi-specs/compute/34-02/desc/alert-profiles/get.md @@ -3,7 +3,7 @@ Retrieve a list of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/alert-profiles/id_delete.md b/openapi-specs/compute/34-02/desc/alert-profiles/id_delete.md index 1a67fe20e..2cf21b57e 100644 --- a/openapi-specs/compute/34-02/desc/alert-profiles/id_delete.md +++ b/openapi-specs/compute/34-02/desc/alert-profiles/id_delete.md @@ -5,7 +5,7 @@ This method has no response data. The following example curl command deletes an existing alert profile named `PROFILE-NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-02/desc/alert-profiles/names_get.md b/openapi-specs/compute/34-02/desc/alert-profiles/names_get.md index cac14437b..38a1f78ca 100644 --- a/openapi-specs/compute/34-02/desc/alert-profiles/names_get.md +++ b/openapi-specs/compute/34-02/desc/alert-profiles/names_get.md @@ -3,7 +3,7 @@ Retrieve a list of only the names of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles' names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/alert-profiles/post.md b/openapi-specs/compute/34-02/desc/alert-profiles/post.md index 9fa643429..19db863d5 100644 --- a/openapi-specs/compute/34-02/desc/alert-profiles/post.md +++ b/openapi-specs/compute/34-02/desc/alert-profiles/post.md @@ -3,7 +3,7 @@ Update an existing alert profile created in the system. The following example curl command uses basic auth to add a Jira Alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/alert-profiles/test_post.md b/openapi-specs/compute/34-02/desc/alert-profiles/test_post.md index 1fc745efa..2205a6e73 100644 --- a/openapi-specs/compute/34-02/desc/alert-profiles/test_post.md +++ b/openapi-specs/compute/34-02/desc/alert-profiles/test_post.md @@ -3,7 +3,7 @@ Sends a test alert to verify successful configuration of the alert profile setti The following example curl command uses basic auth to send test alert for an email alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/application-control/get.md b/openapi-specs/compute/34-02/desc/application-control/get.md index 5bd600beb..535584284 100644 --- a/openapi-specs/compute/34-02/desc/application-control/get.md +++ b/openapi-specs/compute/34-02/desc/application-control/get.md @@ -3,7 +3,7 @@ Retrieves the host application control rules. The following example curl command uses basic auth to retrieve the control rules: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/access_delete.md b/openapi-specs/compute/34-02/desc/audits/access_delete.md index 37f33ca64..0450b534c 100644 --- a/openapi-specs/compute/34-02/desc/audits/access_delete.md +++ b/openapi-specs/compute/34-02/desc/audits/access_delete.md @@ -2,7 +2,7 @@ Deletes **all** access audits. This deletion cannot be undone. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-02/desc/audits/access_download_get.md b/openapi-specs/compute/34-02/desc/audits/access_download_get.md index 1700deb8d..8d8fee259 100644 --- a/openapi-specs/compute/34-02/desc/audits/access_download_get.md +++ b/openapi-specs/compute/34-02/desc/audits/access_download_get.md @@ -3,7 +3,7 @@ Returns the docker access audit events data in CSV format that are logged and ag **Note**: You can download the access events from Console under **Monitor > Events > Docker audits > Download CSV**. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/access_filters_get.md b/openapi-specs/compute/34-02/desc/audits/access_filters_get.md index 00ac061c1..4b8e9cd9b 100644 --- a/openapi-specs/compute/34-02/desc/audits/access_filters_get.md +++ b/openapi-specs/compute/34-02/desc/audits/access_filters_get.md @@ -5,7 +5,7 @@ The following example uses basic auth to list history of commands that are run o ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ The following command gives list of sudo events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -27,7 +27,7 @@ $ curl -k \ The following command gives list of SSHD events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/access_get.md b/openapi-specs/compute/34-02/desc/audits/access_get.md index 2401391c7..56e53fe12 100644 --- a/openapi-specs/compute/34-02/desc/audits/access_get.md +++ b/openapi-specs/compute/34-02/desc/audits/access_get.md @@ -8,7 +8,7 @@ You can configure Prisma Cloud Compute to log and aggregate events such as sudo Refer to the following example cURL command that gives a list of all access audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/admission_download_get.md b/openapi-specs/compute/34-02/desc/audits/admission_download_get.md index 9571c483f..d45f47c4e 100644 --- a/openapi-specs/compute/34-02/desc/audits/admission_download_get.md +++ b/openapi-specs/compute/34-02/desc/audits/admission_download_get.md @@ -4,7 +4,7 @@ Returns the access admission events data in CSV format that were alerted or bloc Refer to the following example cURL command that downloads the admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/admission_get.md b/openapi-specs/compute/34-02/desc/audits/admission_get.md index 84414496c..3640c737c 100644 --- a/openapi-specs/compute/34-02/desc/audits/admission_get.md +++ b/openapi-specs/compute/34-02/desc/audits/admission_get.md @@ -4,7 +4,7 @@ Returns all activities that were alerted or blocked by Defender functioning as O Refer to the following example cURL command that gives a list of all admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/firewall_network_container_download_get.md b/openapi-specs/compute/34-02/desc/audits/firewall_network_container_download_get.md index 29029ac6d..434e09acd 100644 --- a/openapi-specs/compute/34-02/desc/audits/firewall_network_container_download_get.md +++ b/openapi-specs/compute/34-02/desc/audits/firewall_network_container_download_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/firewall_network_container_get.md b/openapi-specs/compute/34-02/desc/audits/firewall_network_container_get.md index 454558a44..be03b2c45 100644 --- a/openapi-specs/compute/34-02/desc/audits/firewall_network_container_get.md +++ b/openapi-specs/compute/34-02/desc/audits/firewall_network_container_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/firewall_network_host_download_get.md b/openapi-specs/compute/34-02/desc/audits/firewall_network_host_download_get.md index 768dd00d7..e83e8e1c3 100644 --- a/openapi-specs/compute/34-02/desc/audits/firewall_network_host_download_get.md +++ b/openapi-specs/compute/34-02/desc/audits/firewall_network_host_download_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/firewall_network_host_get.md b/openapi-specs/compute/34-02/desc/audits/firewall_network_host_get.md index e5dc4c399..6cbda0d4b 100644 --- a/openapi-specs/compute/34-02/desc/audits/firewall_network_host_get.md +++ b/openapi-specs/compute/34-02/desc/audits/firewall_network_host_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/incidents_archive_patch.md b/openapi-specs/compute/34-02/desc/audits/incidents_archive_patch.md index a1127a001..d1f42eedd 100644 --- a/openapi-specs/compute/34-02/desc/audits/incidents_archive_patch.md +++ b/openapi-specs/compute/34-02/desc/audits/incidents_archive_patch.md @@ -7,7 +7,7 @@ You can get an incident ID from the list of incidents using the endpoint GET /ap Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/compute/34-02/desc/audits/incidents_download_get.md b/openapi-specs/compute/34-02/desc/audits/incidents_download_get.md index 2266c3471..5958756bf 100644 --- a/openapi-specs/compute/34-02/desc/audits/incidents_download_get.md +++ b/openapi-specs/compute/34-02/desc/audits/incidents_download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the **CSV** hyperlink in **Monitor > Runtime > Incident ex The following cURL command downloads all incidents and saves the result in a CSV file called `incidents.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/incidents_filters_get.md b/openapi-specs/compute/34-02/desc/audits/incidents_filters_get.md index 7d1c6f303..856881c90 100644 --- a/openapi-specs/compute/34-02/desc/audits/incidents_filters_get.md +++ b/openapi-specs/compute/34-02/desc/audits/incidents_filters_get.md @@ -3,7 +3,7 @@ This endpoint lists the incident categories found in your environment. The following example lists incident filters. ```bash -$ curl -k \ +$ curl \ -u \ https://console:8083/api/v1/audits/incidents/filters ``` diff --git a/openapi-specs/compute/34-02/desc/audits/incidents_get.md b/openapi-specs/compute/34-02/desc/audits/incidents_get.md index 7724a08c1..9b9451821 100644 --- a/openapi-specs/compute/34-02/desc/audits/incidents_get.md +++ b/openapi-specs/compute/34-02/desc/audits/incidents_get.md @@ -9,7 +9,7 @@ This endpoint maps to the table in **Monitor > Runtime > Incident explorer** in Refer to the following example cURL command that retrieves a list of unacknowledged incidents (not in the archived state): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/kubernetes_download_get.md b/openapi-specs/compute/34-02/desc/audits/kubernetes_download_get.md index 6008bd92a..62992095c 100644 --- a/openapi-specs/compute/34-02/desc/audits/kubernetes_download_get.md +++ b/openapi-specs/compute/34-02/desc/audits/kubernetes_download_get.md @@ -7,7 +7,7 @@ Returns the audit events data that occur in an integrated Kubernetes cluster tha Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/kubernetes_get.md b/openapi-specs/compute/34-02/desc/audits/kubernetes_get.md index e1ecb8a88..2e3f51b71 100644 --- a/openapi-specs/compute/34-02/desc/audits/kubernetes_get.md +++ b/openapi-specs/compute/34-02/desc/audits/kubernetes_get.md @@ -7,7 +7,7 @@ Retrieves events that occur in an integrated Kubernetes cluster that you configu Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/mgmt_download_get.md b/openapi-specs/compute/34-02/desc/audits/mgmt_download_get.md index ae3ef45b6..bcee17342 100644 --- a/openapi-specs/compute/34-02/desc/audits/mgmt_download_get.md +++ b/openapi-specs/compute/34-02/desc/audits/mgmt_download_get.md @@ -10,7 +10,7 @@ Management audits are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/mgmt_filters_get.md b/openapi-specs/compute/34-02/desc/audits/mgmt_filters_get.md index 854977b99..f910a4c2a 100644 --- a/openapi-specs/compute/34-02/desc/audits/mgmt_filters_get.md +++ b/openapi-specs/compute/34-02/desc/audits/mgmt_filters_get.md @@ -6,7 +6,7 @@ Use these filters to query management audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/mgmt_get.md b/openapi-specs/compute/34-02/desc/audits/mgmt_get.md index 5b586cb5e..abe802348 100644 --- a/openapi-specs/compute/34-02/desc/audits/mgmt_get.md +++ b/openapi-specs/compute/34-02/desc/audits/mgmt_get.md @@ -10,7 +10,7 @@ Management audit events are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/runtime_app_embedded_download_get.md b/openapi-specs/compute/34-02/desc/audits/runtime_app_embedded_download_get.md index f3d844ead..ec5ae0f2a 100644 --- a/openapi-specs/compute/34-02/desc/audits/runtime_app_embedded_download_get.md +++ b/openapi-specs/compute/34-02/desc/audits/runtime_app_embedded_download_get.md @@ -5,7 +5,7 @@ Returns the app-embedded runtime audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/runtime_app_embedded_get.md b/openapi-specs/compute/34-02/desc/audits/runtime_app_embedded_get.md index c1d72acfa..51a43b7f5 100644 --- a/openapi-specs/compute/34-02/desc/audits/runtime_app_embedded_get.md +++ b/openapi-specs/compute/34-02/desc/audits/runtime_app_embedded_get.md @@ -5,7 +5,7 @@ Retrieves all app-embedded runtime audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/runtime_container_delete.md b/openapi-specs/compute/34-02/desc/audits/runtime_container_delete.md index ddc8e82d6..62050c71f 100644 --- a/openapi-specs/compute/34-02/desc/audits/runtime_container_delete.md +++ b/openapi-specs/compute/34-02/desc/audits/runtime_container_delete.md @@ -3,7 +3,7 @@ Deletes all container runtime audits. The following example curl command uses basic auth to delete all the audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-02/desc/audits/runtime_container_download_get.md b/openapi-specs/compute/34-02/desc/audits/runtime_container_download_get.md index 20e673b5e..81286d929 100644 --- a/openapi-specs/compute/34-02/desc/audits/runtime_container_download_get.md +++ b/openapi-specs/compute/34-02/desc/audits/runtime_container_download_get.md @@ -6,7 +6,7 @@ Returns the container audit events data in CSV format when a runtime sensor such Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o \ diff --git a/openapi-specs/compute/34-02/desc/audits/runtime_container_get.md b/openapi-specs/compute/34-02/desc/audits/runtime_container_get.md index 11beffb24..a6b6ba484 100644 --- a/openapi-specs/compute/34-02/desc/audits/runtime_container_get.md +++ b/openapi-specs/compute/34-02/desc/audits/runtime_container_get.md @@ -7,7 +7,7 @@ Retrieves all container audit events when a runtime sensor such as process, netw Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/runtime_container_timeslice_get.md b/openapi-specs/compute/34-02/desc/audits/runtime_container_timeslice_get.md index f65d477af..01df48f28 100644 --- a/openapi-specs/compute/34-02/desc/audits/runtime_container_timeslice_get.md +++ b/openapi-specs/compute/34-02/desc/audits/runtime_container_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/runtime_file-integrity_download_get.md b/openapi-specs/compute/34-02/desc/audits/runtime_file-integrity_download_get.md index 99ec70c52..234c3ce32 100644 --- a/openapi-specs/compute/34-02/desc/audits/runtime_file-integrity_download_get.md +++ b/openapi-specs/compute/34-02/desc/audits/runtime_file-integrity_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for file-integrity checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/runtime_file-integrity_get.md b/openapi-specs/compute/34-02/desc/audits/runtime_file-integrity_get.md index 53fec9f9f..c31904422 100644 --- a/openapi-specs/compute/34-02/desc/audits/runtime_file-integrity_get.md +++ b/openapi-specs/compute/34-02/desc/audits/runtime_file-integrity_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for file-integrity checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/runtime_host_delete.md b/openapi-specs/compute/34-02/desc/audits/runtime_host_delete.md index 0ab1c877e..2ada9b15a 100644 --- a/openapi-specs/compute/34-02/desc/audits/runtime_host_delete.md +++ b/openapi-specs/compute/34-02/desc/audits/runtime_host_delete.md @@ -3,7 +3,7 @@ Deletes all host audits from the database. The following example curl command uses basic auth to delete all host audits: ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/audits/runtime/host diff --git a/openapi-specs/compute/34-02/desc/audits/runtime_host_download_get.md b/openapi-specs/compute/34-02/desc/audits/runtime_host_download_get.md index 4d0454f56..d85cc39d0 100644 --- a/openapi-specs/compute/34-02/desc/audits/runtime_host_download_get.md +++ b/openapi-specs/compute/34-02/desc/audits/runtime_host_download_get.md @@ -5,7 +5,7 @@ Returns the runtime host audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/runtime_host_get.md b/openapi-specs/compute/34-02/desc/audits/runtime_host_get.md index 044b8b42d..e063550d6 100644 --- a/openapi-specs/compute/34-02/desc/audits/runtime_host_get.md +++ b/openapi-specs/compute/34-02/desc/audits/runtime_host_get.md @@ -5,7 +5,7 @@ Retrieves the runtime host audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/runtime_host_timeslice_get.md b/openapi-specs/compute/34-02/desc/audits/runtime_host_timeslice_get.md index 8933efa74..aafd869b8 100644 --- a/openapi-specs/compute/34-02/desc/audits/runtime_host_timeslice_get.md +++ b/openapi-specs/compute/34-02/desc/audits/runtime_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/runtime_log-inspection_download_get.md b/openapi-specs/compute/34-02/desc/audits/runtime_log-inspection_download_get.md index f047ed96f..0aa1a5710 100644 --- a/openapi-specs/compute/34-02/desc/audits/runtime_log-inspection_download_get.md +++ b/openapi-specs/compute/34-02/desc/audits/runtime_log-inspection_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for log inspection checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/runtime_log-inspection_get.md b/openapi-specs/compute/34-02/desc/audits/runtime_log-inspection_get.md index 49f0d7be4..8292b623e 100644 --- a/openapi-specs/compute/34-02/desc/audits/runtime_log-inspection_get.md +++ b/openapi-specs/compute/34-02/desc/audits/runtime_log-inspection_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for log inspection checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/runtime_rasp_delete.md b/openapi-specs/compute/34-02/desc/audits/runtime_rasp_delete.md index 688e04038..14315c55b 100644 --- a/openapi-specs/compute/34-02/desc/audits/runtime_rasp_delete.md +++ b/openapi-specs/compute/34-02/desc/audits/runtime_rasp_delete.md @@ -1,7 +1,7 @@ Deletes all RASP Defender runtime audits. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-02/desc/audits/runtime_rasp_download_get.md b/openapi-specs/compute/34-02/desc/audits/runtime_rasp_download_get.md index 303c75858..11a85100d 100644 --- a/openapi-specs/compute/34-02/desc/audits/runtime_rasp_download_get.md +++ b/openapi-specs/compute/34-02/desc/audits/runtime_rasp_download_get.md @@ -1,7 +1,7 @@ Returns CSV data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/runtime_rasp_get.md b/openapi-specs/compute/34-02/desc/audits/runtime_rasp_get.md index 229d908b1..0475cb149 100644 --- a/openapi-specs/compute/34-02/desc/audits/runtime_rasp_get.md +++ b/openapi-specs/compute/34-02/desc/audits/runtime_rasp_get.md @@ -1,7 +1,7 @@ Returns JSON data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/runtime_serverless_delete.md b/openapi-specs/compute/34-02/desc/audits/runtime_serverless_delete.md index 99ada0515..e27ebe858 100644 --- a/openapi-specs/compute/34-02/desc/audits/runtime_serverless_delete.md +++ b/openapi-specs/compute/34-02/desc/audits/runtime_serverless_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to delete the current audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-02/desc/audits/runtime_serverless_download_get.md b/openapi-specs/compute/34-02/desc/audits/runtime_serverless_download_get.md index f829d2342..91693c145 100644 --- a/openapi-specs/compute/34-02/desc/audits/runtime_serverless_download_get.md +++ b/openapi-specs/compute/34-02/desc/audits/runtime_serverless_download_get.md @@ -5,7 +5,7 @@ Returns the scan audit events data in CSV format for any configured serverless f Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/runtime_serverless_filters_get.md b/openapi-specs/compute/34-02/desc/audits/runtime_serverless_filters_get.md index b9bf38610..babda78dd 100644 --- a/openapi-specs/compute/34-02/desc/audits/runtime_serverless_filters_get.md +++ b/openapi-specs/compute/34-02/desc/audits/runtime_serverless_filters_get.md @@ -2,7 +2,7 @@ Returns all serverless filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/runtime_serverless_get.md b/openapi-specs/compute/34-02/desc/audits/runtime_serverless_get.md index 045946886..f6aeb748e 100644 --- a/openapi-specs/compute/34-02/desc/audits/runtime_serverless_get.md +++ b/openapi-specs/compute/34-02/desc/audits/runtime_serverless_get.md @@ -5,7 +5,7 @@ Retrieves all scan events for any configured serverless functions in Prisma Clou Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/runtime_serverless_timeslice_get.md b/openapi-specs/compute/34-02/desc/audits/runtime_serverless_timeslice_get.md index 863890174..a2456cec0 100644 --- a/openapi-specs/compute/34-02/desc/audits/runtime_serverless_timeslice_get.md +++ b/openapi-specs/compute/34-02/desc/audits/runtime_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/trust_delete.md b/openapi-specs/compute/34-02/desc/audits/trust_delete.md index 0bfb2bd81..4aaeef3fe 100644 --- a/openapi-specs/compute/34-02/desc/audits/trust_delete.md +++ b/openapi-specs/compute/34-02/desc/audits/trust_delete.md @@ -1,7 +1,7 @@ Deletes all the trust audits from the events page in Console. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-02/desc/audits/trust_download_get.md b/openapi-specs/compute/34-02/desc/audits/trust_download_get.md index 21c0e55a2..234089449 100644 --- a/openapi-specs/compute/34-02/desc/audits/trust_download_get.md +++ b/openapi-specs/compute/34-02/desc/audits/trust_download_get.md @@ -5,7 +5,7 @@ Returns the trust audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/trust_get.md b/openapi-specs/compute/34-02/desc/audits/trust_get.md index 8fb3a341d..de7d47e96 100644 --- a/openapi-specs/compute/34-02/desc/audits/trust_get.md +++ b/openapi-specs/compute/34-02/desc/audits/trust_get.md @@ -4,7 +4,7 @@ Retrieves all the trust audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/waas_agentless_download_get.md b/openapi-specs/compute/34-02/desc/audits/waas_agentless_download_get.md index bbfcd12f5..f930ef6b3 100644 --- a/openapi-specs/compute/34-02/desc/audits/waas_agentless_download_get.md +++ b/openapi-specs/compute/34-02/desc/audits/waas_agentless_download_get.md @@ -7,7 +7,7 @@ Returns the agentless Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/waas_agentless_get.md b/openapi-specs/compute/34-02/desc/audits/waas_agentless_get.md index ad40ae497..b257b0385 100644 --- a/openapi-specs/compute/34-02/desc/audits/waas_agentless_get.md +++ b/openapi-specs/compute/34-02/desc/audits/waas_agentless_get.md @@ -7,7 +7,7 @@ Retrieves all agentless Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/waas_agentless_timeslice_get.md b/openapi-specs/compute/34-02/desc/audits/waas_agentless_timeslice_get.md index 007c6dba3..3eaf34b25 100644 --- a/openapi-specs/compute/34-02/desc/audits/waas_agentless_timeslice_get.md +++ b/openapi-specs/compute/34-02/desc/audits/waas_agentless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/waas_app_embedded_download_get.md b/openapi-specs/compute/34-02/desc/audits/waas_app_embedded_download_get.md index 149c10376..c94aa87b0 100644 --- a/openapi-specs/compute/34-02/desc/audits/waas_app_embedded_download_get.md +++ b/openapi-specs/compute/34-02/desc/audits/waas_app_embedded_download_get.md @@ -6,7 +6,7 @@ Returns the app-embedded WAAS audit events data in CSV format for the specified Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/waas_app_embedded_get.md b/openapi-specs/compute/34-02/desc/audits/waas_app_embedded_get.md index 400fa447d..6318fb299 100644 --- a/openapi-specs/compute/34-02/desc/audits/waas_app_embedded_get.md +++ b/openapi-specs/compute/34-02/desc/audits/waas_app_embedded_get.md @@ -6,7 +6,7 @@ Returns all app-embedded WAAS audit events for the specified query parameters. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/waas_app_embedded_timeslice_get.md b/openapi-specs/compute/34-02/desc/audits/waas_app_embedded_timeslice_get.md index 79a60038e..42a76d08c 100644 --- a/openapi-specs/compute/34-02/desc/audits/waas_app_embedded_timeslice_get.md +++ b/openapi-specs/compute/34-02/desc/audits/waas_app_embedded_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the app-embedded WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/waas_container_download_get.md b/openapi-specs/compute/34-02/desc/audits/waas_container_download_get.md index 9a5e04fad..7d26c34f4 100644 --- a/openapi-specs/compute/34-02/desc/audits/waas_container_download_get.md +++ b/openapi-specs/compute/34-02/desc/audits/waas_container_download_get.md @@ -6,7 +6,7 @@ Returns the container Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that downloads the WAAS container audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/waas_container_get.md b/openapi-specs/compute/34-02/desc/audits/waas_container_get.md index ac0df80fd..c1ad08f3c 100644 --- a/openapi-specs/compute/34-02/desc/audits/waas_container_get.md +++ b/openapi-specs/compute/34-02/desc/audits/waas_container_get.md @@ -6,7 +6,7 @@ Retrieves all container Web-Application and API Security (WAAS) audits. Refer to the following example cURL command that retrieves all container WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/waas_container_timeslice_get.md b/openapi-specs/compute/34-02/desc/audits/waas_container_timeslice_get.md index a56b4c48f..be56260d6 100644 --- a/openapi-specs/compute/34-02/desc/audits/waas_container_timeslice_get.md +++ b/openapi-specs/compute/34-02/desc/audits/waas_container_timeslice_get.md @@ -11,7 +11,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the container WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s):: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/waas_host_download_get.md b/openapi-specs/compute/34-02/desc/audits/waas_host_download_get.md index 4bc66202b..71692e682 100644 --- a/openapi-specs/compute/34-02/desc/audits/waas_host_download_get.md +++ b/openapi-specs/compute/34-02/desc/audits/waas_host_download_get.md @@ -7,7 +7,7 @@ Returns the host Web-Application and API Security (WAAS) audit events data in CS Refer to the following example cURL command that downloads the host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/waas_host_get.md b/openapi-specs/compute/34-02/desc/audits/waas_host_get.md index 14c967594..f6e3df050 100644 --- a/openapi-specs/compute/34-02/desc/audits/waas_host_get.md +++ b/openapi-specs/compute/34-02/desc/audits/waas_host_get.md @@ -7,7 +7,7 @@ Retrieves all host Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/waas_host_timeslice_get.md b/openapi-specs/compute/34-02/desc/audits/waas_host_timeslice_get.md index e28ed7b7a..67b3a54c3 100644 --- a/openapi-specs/compute/34-02/desc/audits/waas_host_timeslice_get.md +++ b/openapi-specs/compute/34-02/desc/audits/waas_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves host WAAS audit events for a specific time frame: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/waas_serverless_download_get.md b/openapi-specs/compute/34-02/desc/audits/waas_serverless_download_get.md index da05504df..0c0dbe698 100644 --- a/openapi-specs/compute/34-02/desc/audits/waas_serverless_download_get.md +++ b/openapi-specs/compute/34-02/desc/audits/waas_serverless_download_get.md @@ -7,7 +7,7 @@ Returns the serverless function Web-Application and API Security (WAAS) audit ev Refer to the following example cURL command that downloads the serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/waas_serverless_get.md b/openapi-specs/compute/34-02/desc/audits/waas_serverless_get.md index fe482a3f3..82488f7ee 100644 --- a/openapi-specs/compute/34-02/desc/audits/waas_serverless_get.md +++ b/openapi-specs/compute/34-02/desc/audits/waas_serverless_get.md @@ -7,7 +7,7 @@ Retrieves all serverless function Web-Application and API Security (WAAS) audit Refer to the following example cURL command that retrieves all serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/audits/waas_serverless_timeslice_get.md b/openapi-specs/compute/34-02/desc/audits/waas_serverless_timeslice_get.md index ec9ff3df1..a0a9a1368 100644 --- a/openapi-specs/compute/34-02/desc/audits/waas_serverless_timeslice_get.md +++ b/openapi-specs/compute/34-02/desc/audits/waas_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the serverless WAAS audit events for a : ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/authenticate-client/post.md b/openapi-specs/compute/34-02/desc/authenticate-client/post.md index bc493d04e..ce6f00afe 100644 --- a/openapi-specs/compute/34-02/desc/authenticate-client/post.md +++ b/openapi-specs/compute/34-02/desc/authenticate-client/post.md @@ -8,7 +8,7 @@ This endpoint checks the supplied client certificate and authorizes the user bas Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X POST \ --cert \ https:///api/v/authenticate-client diff --git a/openapi-specs/compute/34-02/desc/authenticate/post.md b/openapi-specs/compute/34-02/desc/authenticate/post.md index cb018de64..4f85c5d34 100644 --- a/openapi-specs/compute/34-02/desc/authenticate/post.md +++ b/openapi-specs/compute/34-02/desc/authenticate/post.md @@ -9,7 +9,7 @@ You can set the validity period in Console under **Manage > Authentication > Log Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H "Content-Type: application/json" \ -X POST \ -d \ diff --git a/openapi-specs/compute/34-02/desc/authenticate/renew_get.md b/openapi-specs/compute/34-02/desc/authenticate/renew_get.md index 6040d58e1..3458b500a 100644 --- a/openapi-specs/compute/34-02/desc/authenticate/renew_get.md +++ b/openapi-specs/compute/34-02/desc/authenticate/renew_get.md @@ -5,7 +5,7 @@ Renews an old (unexpired) access token and returns a new token. The following cURL command retrieves a new access token using an old access token. ```bash -$ curl -k \ +$ curl \ -H "Authorization: Bearer " \ https:///api/v1/authenticate/renew ``` diff --git a/openapi-specs/compute/34-02/desc/certs/capem_get.md b/openapi-specs/compute/34-02/desc/certs/capem_get.md index f0f0f1bf3..945476c9b 100644 --- a/openapi-specs/compute/34-02/desc/certs/capem_get.md +++ b/openapi-specs/compute/34-02/desc/certs/capem_get.md @@ -5,7 +5,7 @@ Retrieves the Base64-encoded SSL root certificate self-signed by primary certifi Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/certs/client-certs_get.md b/openapi-specs/compute/34-02/desc/certs/client-certs_get.md index d099b3e3d..279d196b1 100644 --- a/openapi-specs/compute/34-02/desc/certs/client-certs_get.md +++ b/openapi-specs/compute/34-02/desc/certs/client-certs_get.md @@ -3,7 +3,7 @@ Downloads a script that installs a client certificate, client private key, and c The following example curl command uses basic auth to download and run the install script for your client certs: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/certs/client-certs.sh | sh diff --git a/openapi-specs/compute/34-02/desc/certs/server-certs_get.md b/openapi-specs/compute/34-02/desc/certs/server-certs_get.md index 0bb13f51d..118a4d9b0 100644 --- a/openapi-specs/compute/34-02/desc/certs/server-certs_get.md +++ b/openapi-specs/compute/34-02/desc/certs/server-certs_get.md @@ -12,7 +12,7 @@ Retrieves the server certificate bundle from Prisma Cloud Compute that contains Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -u \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/cloud/compliance_download_get.md b/openapi-specs/compute/34-02/desc/cloud/compliance_download_get.md index 7b1ec9fea..14f2725b1 100644 --- a/openapi-specs/compute/34-02/desc/cloud/compliance_download_get.md +++ b/openapi-specs/compute/34-02/desc/cloud/compliance_download_get.md @@ -2,7 +2,7 @@ Download all cloud scan data in CSV format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/cloud/compliance_get.md b/openapi-specs/compute/34-02/desc/cloud/compliance_get.md index 48c2fe5bb..ad47e0998 100644 --- a/openapi-specs/compute/34-02/desc/cloud/compliance_get.md +++ b/openapi-specs/compute/34-02/desc/cloud/compliance_get.md @@ -2,7 +2,7 @@ Returns a list of all cloud compliance scan results. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/cloud/compliance_scan_post.md b/openapi-specs/compute/34-02/desc/cloud/compliance_scan_post.md index 7f87bf1f4..7321c3b9d 100644 --- a/openapi-specs/compute/34-02/desc/cloud/compliance_scan_post.md +++ b/openapi-specs/compute/34-02/desc/cloud/compliance_scan_post.md @@ -2,7 +2,7 @@ Initiates a new cloud compliance scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/cloud/compliance_stop_post.md b/openapi-specs/compute/34-02/desc/cloud/compliance_stop_post.md index df0febb56..60c31dc51 100644 --- a/openapi-specs/compute/34-02/desc/cloud/compliance_stop_post.md +++ b/openapi-specs/compute/34-02/desc/cloud/compliance_stop_post.md @@ -2,7 +2,7 @@ Terminates a cloud compliance scan that's in progress.. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/cloud/discovery_download_get.md b/openapi-specs/compute/34-02/desc/cloud/discovery_download_get.md index 44d60a113..a667c8471 100644 --- a/openapi-specs/compute/34-02/desc/cloud/discovery_download_get.md +++ b/openapi-specs/compute/34-02/desc/cloud/discovery_download_get.md @@ -5,7 +5,7 @@ Downloads all cloud scan data in a CSV file. Refer to the following cURL example command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/cloud/discovery_entities_get.md b/openapi-specs/compute/34-02/desc/cloud/discovery_entities_get.md index a7abbdfb6..85f1be971 100644 --- a/openapi-specs/compute/34-02/desc/cloud/discovery_entities_get.md +++ b/openapi-specs/compute/34-02/desc/cloud/discovery_entities_get.md @@ -7,7 +7,7 @@ Use this API endpoint along with the `GET, api/vVERSION/cloud/discovery` to get Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/cloud/discovery_get.md b/openapi-specs/compute/34-02/desc/cloud/discovery_get.md index 28025f140..c2b4c6e3c 100644 --- a/openapi-specs/compute/34-02/desc/cloud/discovery_get.md +++ b/openapi-specs/compute/34-02/desc/cloud/discovery_get.md @@ -8,7 +8,7 @@ Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/cloud/discovery_scan_post.md b/openapi-specs/compute/34-02/desc/cloud/discovery_scan_post.md index 51799ebdb..0717096f8 100644 --- a/openapi-specs/compute/34-02/desc/cloud/discovery_scan_post.md +++ b/openapi-specs/compute/34-02/desc/cloud/discovery_scan_post.md @@ -5,7 +5,7 @@ Initiates a new cloud discovery scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/cloud/discovery_stop_post.md b/openapi-specs/compute/34-02/desc/cloud/discovery_stop_post.md index 6a6c7a5a5..73dbf46e7 100644 --- a/openapi-specs/compute/34-02/desc/cloud/discovery_stop_post.md +++ b/openapi-specs/compute/34-02/desc/cloud/discovery_stop_post.md @@ -5,7 +5,7 @@ Terminates a cloud discovery scan that's in progress. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/cloud/discovery_vms_get.md b/openapi-specs/compute/34-02/desc/cloud/discovery_vms_get.md index 6766f4e5a..2264a27fe 100644 --- a/openapi-specs/compute/34-02/desc/cloud/discovery_vms_get.md +++ b/openapi-specs/compute/34-02/desc/cloud/discovery_vms_get.md @@ -5,7 +5,7 @@ Returns the discovered cloud VM instances. Refer to the following example cURL command that retrieves all the discovered cloud VM instances: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/coderepos/download_get.md b/openapi-specs/compute/34-02/desc/coderepos/download_get.md index 4ec0197bb..b06dd9f17 100644 --- a/openapi-specs/compute/34-02/desc/coderepos/download_get.md +++ b/openapi-specs/compute/34-02/desc/coderepos/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Code re The following cURL command generates a CSV file containing the reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/coderepos/get.md b/openapi-specs/compute/34-02/desc/coderepos/get.md index 54c4e99bf..42dc16fb6 100644 --- a/openapi-specs/compute/34-02/desc/coderepos/get.md +++ b/openapi-specs/compute/34-02/desc/coderepos/get.md @@ -10,7 +10,7 @@ This endpoint maps to the **Code repositories** table in **Monitor > Vulnerabili The following cURL command retrieves all code repository scan reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/collections/get.md b/openapi-specs/compute/34-02/desc/collections/get.md index 99120d17d..5a9e8a50c 100755 --- a/openapi-specs/compute/34-02/desc/collections/get.md +++ b/openapi-specs/compute/34-02/desc/collections/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table in **Manage > Collections and Tags > Collections Refer to the following example cURL command that returns a list of collections: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/collections/name_delete.md b/openapi-specs/compute/34-02/desc/collections/name_delete.md index 3e2debd01..033358000 100755 --- a/openapi-specs/compute/34-02/desc/collections/name_delete.md +++ b/openapi-specs/compute/34-02/desc/collections/name_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that deletes a collection with the name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-02/desc/collections/name_usages_get.md b/openapi-specs/compute/34-02/desc/collections/name_usages_get.md index 5c9c40424..89e383cce 100755 --- a/openapi-specs/compute/34-02/desc/collections/name_usages_get.md +++ b/openapi-specs/compute/34-02/desc/collections/name_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that retrieves all policies with name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/containers/count_get.md b/openapi-specs/compute/34-02/desc/containers/count_get.md index 4c6ecdcb4..aca59a913 100644 --- a/openapi-specs/compute/34-02/desc/containers/count_get.md +++ b/openapi-specs/compute/34-02/desc/containers/count_get.md @@ -5,7 +5,7 @@ Returns an integer representing the number of containers in your environment. Refer to the following example cURL command that returns the number of containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/containers/download_get.md b/openapi-specs/compute/34-02/desc/containers/download_get.md index 5c0811d7c..5ed3fec35 100644 --- a/openapi-specs/compute/34-02/desc/containers/download_get.md +++ b/openapi-specs/compute/34-02/desc/containers/download_get.md @@ -9,7 +9,7 @@ You can download the container scan reports in CSV format in Console under **Mon Refer to the following example cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/containers/filters_get.md b/openapi-specs/compute/34-02/desc/containers/filters_get.md index c8a1dfca4..6c2777819 100644 --- a/openapi-specs/compute/34-02/desc/containers/filters_get.md +++ b/openapi-specs/compute/34-02/desc/containers/filters_get.md @@ -1,7 +1,7 @@ Returns all container filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/containers/get.md b/openapi-specs/compute/34-02/desc/containers/get.md index 4cacdde60..3de9dd4af 100644 --- a/openapi-specs/compute/34-02/desc/containers/get.md +++ b/openapi-specs/compute/34-02/desc/containers/get.md @@ -16,7 +16,7 @@ Refer to the following available options for the `fields` query parameters: Refer to the following example cURL command that retrieves a scan report for all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -26,7 +26,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a scan report for a container with the collection ``: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/containers/labels_get.md b/openapi-specs/compute/34-02/desc/containers/labels_get.md index eb40a748d..7a63ab6fb 100644 --- a/openapi-specs/compute/34-02/desc/containers/labels_get.md +++ b/openapi-specs/compute/34-02/desc/containers/labels_get.md @@ -1,7 +1,7 @@ Returns an array of strings containing all of the labels. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/containers/names_get.md b/openapi-specs/compute/34-02/desc/containers/names_get.md index 8b32465d5..9025e2e10 100644 --- a/openapi-specs/compute/34-02/desc/containers/names_get.md +++ b/openapi-specs/compute/34-02/desc/containers/names_get.md @@ -5,7 +5,7 @@ Returns an array of strings containing all container names. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/containers/scan_post.md b/openapi-specs/compute/34-02/desc/containers/scan_post.md index 6b2bdaaba..56137cf64 100644 --- a/openapi-specs/compute/34-02/desc/containers/scan_post.md +++ b/openapi-specs/compute/34-02/desc/containers/scan_post.md @@ -4,7 +4,7 @@ This endpoint returns the time that the scans were initiated. The following example command uses curl and basic auth to force Prisma Cloud Compute to re-scan all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/credentials/get.md b/openapi-specs/compute/34-02/desc/credentials/get.md index ee4309dee..b807ce8f3 100644 --- a/openapi-specs/compute/34-02/desc/credentials/get.md +++ b/openapi-specs/compute/34-02/desc/credentials/get.md @@ -6,7 +6,7 @@ This endpoint maps to **Manage > Authentication > Credentials store** in the Con Refer to the following example cURL command that retrieves all credentials: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/credentials/id_delete.md b/openapi-specs/compute/34-02/desc/credentials/id_delete.md index e5c70259e..27f090158 100644 --- a/openapi-specs/compute/34-02/desc/credentials/id_delete.md +++ b/openapi-specs/compute/34-02/desc/credentials/id_delete.md @@ -14,7 +14,7 @@ To invoke this endpoint in the Prisma Cloud Compute user interface: Refer to the following example cURL command that deletes an existing credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-02/desc/credentials/id_usages_get.md b/openapi-specs/compute/34-02/desc/credentials/id_usages_get.md index 76c1099aa..ca2ce6216 100644 --- a/openapi-specs/compute/34-02/desc/credentials/id_usages_get.md +++ b/openapi-specs/compute/34-02/desc/credentials/id_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following cURL command that retrieves all usages for a credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/curl_examples.md b/openapi-specs/compute/34-02/desc/curl_examples.md index 3d4fcd468..745d21db3 100644 --- a/openapi-specs/compute/34-02/desc/curl_examples.md +++ b/openapi-specs/compute/34-02/desc/curl_examples.md @@ -6,7 +6,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -17,7 +17,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -29,7 +29,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/compute/34-02/desc/custom-compliance/get.md b/openapi-specs/compute/34-02/desc/custom-compliance/get.md index 9022a87b7..9dddcff4e 100644 --- a/openapi-specs/compute/34-02/desc/custom-compliance/get.md +++ b/openapi-specs/compute/34-02/desc/custom-compliance/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example curl command that gets the list of custom compliance checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/custom-compliance/id_delete.md b/openapi-specs/compute/34-02/desc/custom-compliance/id_delete.md index 72c7183ee..f6536e51d 100644 --- a/openapi-specs/compute/34-02/desc/custom-compliance/id_delete.md +++ b/openapi-specs/compute/34-02/desc/custom-compliance/id_delete.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example cURL command that uses basic auth to delete the compliance check with id 9000: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-02/desc/custom-compliance/put.md b/openapi-specs/compute/34-02/desc/custom-compliance/put.md index 480e41b54..b8760a11f 100644 --- a/openapi-specs/compute/34-02/desc/custom-compliance/put.md +++ b/openapi-specs/compute/34-02/desc/custom-compliance/put.md @@ -21,7 +21,7 @@ Create `custom_check.json` file (example): Refer to the following example curl command that uses basic auth to update the checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-02/desc/custom-rules/get.md b/openapi-specs/compute/34-02/desc/custom-rules/get.md index f0385f81a..f77924be8 100644 --- a/openapi-specs/compute/34-02/desc/custom-rules/get.md +++ b/openapi-specs/compute/34-02/desc/custom-rules/get.md @@ -7,7 +7,7 @@ This endpoint maps to the policy table in **Defend > Custom rules** in the Conso Refer to the following example cURL command that retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/custom-rules/id_delete.md b/openapi-specs/compute/34-02/desc/custom-rules/id_delete.md index c0d6dc8b0..01412abf3 100644 --- a/openapi-specs/compute/34-02/desc/custom-rules/id_delete.md +++ b/openapi-specs/compute/34-02/desc/custom-rules/id_delete.md @@ -5,7 +5,7 @@ Deletes a custom rule. Refer to the following example cURL command that deletes a custom rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-02/desc/cves/distribution_get.md b/openapi-specs/compute/34-02/desc/cves/distribution_get.md index aecddce23..7365e1a5e 100644 --- a/openapi-specs/compute/34-02/desc/cves/distribution_get.md +++ b/openapi-specs/compute/34-02/desc/cves/distribution_get.md @@ -3,7 +3,7 @@ Retrieves CVEs from the vulnerability database grouped into distribution where y The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/cves/get.md b/openapi-specs/compute/34-02/desc/cves/get.md index 469ea4b28..f81223298 100644 --- a/openapi-specs/compute/34-02/desc/cves/get.md +++ b/openapi-specs/compute/34-02/desc/cves/get.md @@ -6,7 +6,7 @@ A null response indicates that the CVE is not in our database. The following example curl command queries the Prisma Cloud Compute database for `CVE-2018-1102`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/defenders/app_embedded_post.md b/openapi-specs/compute/34-02/desc/defenders/app_embedded_post.md index 9167469d0..7999cbadb 100644 --- a/openapi-specs/compute/34-02/desc/defenders/app_embedded_post.md +++ b/openapi-specs/compute/34-02/desc/defenders/app_embedded_post.md @@ -5,7 +5,7 @@ Creates an augmented Dockerfile with Defender and dependencies included as a ZIP Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/defenders/daemonset_yaml_get.md b/openapi-specs/compute/34-02/desc/defenders/daemonset_yaml_get.md index 678901a8a..b68869081 100644 --- a/openapi-specs/compute/34-02/desc/defenders/daemonset_yaml_get.md +++ b/openapi-specs/compute/34-02/desc/defenders/daemonset_yaml_get.md @@ -10,7 +10,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https://:8083/api/v1/defenders/daemonset.yaml?consoleaddr=&listener=none&namespace=twistlock&orchestration=kubernetes' diff --git a/openapi-specs/compute/34-02/desc/defenders/daemonset_yaml_post.md b/openapi-specs/compute/34-02/desc/defenders/daemonset_yaml_post.md index 268e3ba81..af006122b 100644 --- a/openapi-specs/compute/34-02/desc/defenders/daemonset_yaml_post.md +++ b/openapi-specs/compute/34-02/desc/defenders/daemonset_yaml_post.md @@ -5,7 +5,7 @@ Creates a DaemonSet deployment file in YAML format that you can use to deploy De Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/defenders/download_get.md b/openapi-specs/compute/34-02/desc/defenders/download_get.md index 2d9435506..67f08c0e5 100644 --- a/openapi-specs/compute/34-02/desc/defenders/download_get.md +++ b/openapi-specs/compute/34-02/desc/defenders/download_get.md @@ -8,7 +8,7 @@ Use the query parameters to filter what data is returned. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o \ diff --git a/openapi-specs/compute/34-02/desc/defenders/fargate_json_post.md b/openapi-specs/compute/34-02/desc/defenders/fargate_json_post.md index 5128e90a1..e2e4e85ab 100644 --- a/openapi-specs/compute/34-02/desc/defenders/fargate_json_post.md +++ b/openapi-specs/compute/34-02/desc/defenders/fargate_json_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command: Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -23,7 +23,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/defenders/fargate_yaml_post.md b/openapi-specs/compute/34-02/desc/defenders/fargate_yaml_post.md index 9a8306a1b..95560526a 100644 --- a/openapi-specs/compute/34-02/desc/defenders/fargate_yaml_post.md +++ b/openapi-specs/compute/34-02/desc/defenders/fargate_yaml_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.yaml` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/yaml' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/defenders/get.md b/openapi-specs/compute/34-02/desc/defenders/get.md index 471e7ef9d..8d2f5cd4c 100644 --- a/openapi-specs/compute/34-02/desc/defenders/get.md +++ b/openapi-specs/compute/34-02/desc/defenders/get.md @@ -7,7 +7,7 @@ This endpoint maps to the UI Console page in **Manage > Defenders > Defenders**. Refer to the following example cURL command that retrieves all deployed Defenders. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/defenders/helm_get.md b/openapi-specs/compute/34-02/desc/defenders/helm_get.md index b11f9c4b9..487c8b7e8 100644 --- a/openapi-specs/compute/34-02/desc/defenders/helm_get.md +++ b/openapi-specs/compute/34-02/desc/defenders/helm_get.md @@ -13,7 +13,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o twistlock-defender-helm.tar.gz \ diff --git a/openapi-specs/compute/34-02/desc/defenders/helm_post.md b/openapi-specs/compute/34-02/desc/defenders/helm_post.md index 2046e63eb..fb76807ae 100644 --- a/openapi-specs/compute/34-02/desc/defenders/helm_post.md +++ b/openapi-specs/compute/34-02/desc/defenders/helm_post.md @@ -5,7 +5,7 @@ Creates a Helm deployment file that you can use to deploy Defenders to your clus Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/defenders/id_delete.md b/openapi-specs/compute/34-02/desc/defenders/id_delete.md index f637ef850..e3ac52daf 100644 --- a/openapi-specs/compute/34-02/desc/defenders/id_delete.md +++ b/openapi-specs/compute/34-02/desc/defenders/id_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes an existing Defender on a host. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-02/desc/defenders/id_features_post.md b/openapi-specs/compute/34-02/desc/defenders/id_features_post.md index ec8e4c5f3..9b42f5fa0 100644 --- a/openapi-specs/compute/34-02/desc/defenders/id_features_post.md +++ b/openapi-specs/compute/34-02/desc/defenders/id_features_post.md @@ -3,7 +3,7 @@ Updates a deployed Defender's configuration. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/defenders/id_restart_post.md b/openapi-specs/compute/34-02/desc/defenders/id_restart_post.md index da0cc7811..7296a186b 100644 --- a/openapi-specs/compute/34-02/desc/defenders/id_restart_post.md +++ b/openapi-specs/compute/34-02/desc/defenders/id_restart_post.md @@ -3,7 +3,7 @@ Restarts Defender on a given host. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/defenders/id_upgrade_post.md b/openapi-specs/compute/34-02/desc/defenders/id_upgrade_post.md index f0d30d1e9..3e63c6414 100644 --- a/openapi-specs/compute/34-02/desc/defenders/id_upgrade_post.md +++ b/openapi-specs/compute/34-02/desc/defenders/id_upgrade_post.md @@ -7,7 +7,7 @@ Upgrades Defender on ``. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/defenders/image-name_get.md b/openapi-specs/compute/34-02/desc/defenders/image-name_get.md index e81ba3e19..19f360c07 100644 --- a/openapi-specs/compute/34-02/desc/defenders/image-name_get.md +++ b/openapi-specs/compute/34-02/desc/defenders/image-name_get.md @@ -5,7 +5,7 @@ Returns the full Docker image name for Defender. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/defenders/install-bundle_get.md b/openapi-specs/compute/34-02/desc/defenders/install-bundle_get.md index 882d0cd53..9b09e733f 100644 --- a/openapi-specs/compute/34-02/desc/defenders/install-bundle_get.md +++ b/openapi-specs/compute/34-02/desc/defenders/install-bundle_get.md @@ -5,7 +5,7 @@ Returns the certificate bundle that Defender needs to securely connect to Consol Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/defenders/names_get.md b/openapi-specs/compute/34-02/desc/defenders/names_get.md index 728eb6364..6339c1483 100644 --- a/openapi-specs/compute/34-02/desc/defenders/names_get.md +++ b/openapi-specs/compute/34-02/desc/defenders/names_get.md @@ -5,7 +5,7 @@ Retrieves a list of Defender hostnames that can be used as the `{id}` query para Refer to the following example cURL command that retrieves a list of all Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -15,7 +15,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of connected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -25,7 +25,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of disconnected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -37,7 +37,7 @@ The endpoint enlists all the connected and disconnected Defenders if do not spec Refer to the following example cURL command that retrieves a list of Defenders by type: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/defenders/rasp_post.md b/openapi-specs/compute/34-02/desc/defenders/rasp_post.md index 526a9e112..e110044dd 100644 --- a/openapi-specs/compute/34-02/desc/defenders/rasp_post.md +++ b/openapi-specs/compute/34-02/desc/defenders/rasp_post.md @@ -7,7 +7,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o rasp-defender.zip diff --git a/openapi-specs/compute/34-02/desc/defenders/serverless-bundle_post.md b/openapi-specs/compute/34-02/desc/defenders/serverless-bundle_post.md index df4f13e6a..7533e436b 100644 --- a/openapi-specs/compute/34-02/desc/defenders/serverless-bundle_post.md +++ b/openapi-specs/compute/34-02/desc/defenders/serverless-bundle_post.md @@ -5,7 +5,7 @@ Downloads a ZIP file with serverless Defender bundle. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/octet-stream' \ -o serverless_bundle.zip \ diff --git a/openapi-specs/compute/34-02/desc/defenders/summary_get.md b/openapi-specs/compute/34-02/desc/defenders/summary_get.md index 08be4ebc4..e308ef64b 100644 --- a/openapi-specs/compute/34-02/desc/defenders/summary_get.md +++ b/openapi-specs/compute/34-02/desc/defenders/summary_get.md @@ -6,7 +6,7 @@ Lists the number of Defenders in each defender category. Refer to the following example cURL command that retrieves a summary of Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/defenders/upgrade_post.md b/openapi-specs/compute/34-02/desc/defenders/upgrade_post.md index 2f0b4d39e..eacd6b779 100644 --- a/openapi-specs/compute/34-02/desc/defenders/upgrade_post.md +++ b/openapi-specs/compute/34-02/desc/defenders/upgrade_post.md @@ -9,7 +9,7 @@ To upgrade Serverless and Fargate Defenders, re-embed them. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/deployment/daemonsets_deploy_post.md b/openapi-specs/compute/34-02/desc/deployment/daemonsets_deploy_post.md index 94ec9386b..b60f28346 100644 --- a/openapi-specs/compute/34-02/desc/deployment/daemonsets_deploy_post.md +++ b/openapi-specs/compute/34-02/desc/deployment/daemonsets_deploy_post.md @@ -5,7 +5,7 @@ It identifies the cluster's API server, user, and credentials. Use the various request parameters to control the properties of the deployed DaemonSet. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/deployment/daemonsets_get.md b/openapi-specs/compute/34-02/desc/deployment/daemonsets_get.md index a0b7f3798..0385acf75 100644 --- a/openapi-specs/compute/34-02/desc/deployment/daemonsets_get.md +++ b/openapi-specs/compute/34-02/desc/deployment/daemonsets_get.md @@ -3,7 +3,7 @@ You must specify a `credentialID`, of type `kubeconfig`, which identifies your c Credentials are managed in Console's credentials store (`/api/v1/credentials`). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/feeds/custom-vulnerabilities_get.md b/openapi-specs/compute/34-02/desc/feeds/custom-vulnerabilities_get.md index 71834f19d..d661acf55 100644 --- a/openapi-specs/compute/34-02/desc/feeds/custom-vulnerabilities_get.md +++ b/openapi-specs/compute/34-02/desc/feeds/custom-vulnerabilities_get.md @@ -11,7 +11,7 @@ Vulnerability rules can be created using the Prisma Cloud Compute. Refer to the following cURL command that retrieves a list of all the custom vulnerabilities and associated rules. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/feeds/custom-vulnerabilities_put.md b/openapi-specs/compute/34-02/desc/feeds/custom-vulnerabilities_put.md index 4fe1c1898..149ada978 100644 --- a/openapi-specs/compute/34-02/desc/feeds/custom-vulnerabilities_put.md +++ b/openapi-specs/compute/34-02/desc/feeds/custom-vulnerabilities_put.md @@ -5,7 +5,7 @@ Updates all the custom vulnerabilities and associated rules simultaneously for h Refer to the following cURL command that updates a vulnerability for a library named `internal-lib`, and specifies that its versions `1.1` to `1.8` are known to be vulnerable. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -37,7 +37,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: **Note:** You will need `jq` to execute this command. ``` - $ curl -k \ + $ curl \ -u \ https:///api/v/feeds/custom/custom-vulnerabilities \ | jq '.' > custom_vulnerability_rules.json @@ -66,7 +66,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 3. Update the rules by pushing the new JSON payload. **Note:** Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -77,7 +77,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 4. Run the cURL command for the `GET /api/vVERSION/feeds/custom/custom-vulnerabilities` endpoint and you can see that the previously installed rules are now overwritten with your new rules. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/feeds/custom_vulnerabilities_digest_get.md b/openapi-specs/compute/34-02/desc/feeds/custom_vulnerabilities_digest_get.md index 0eb501d9b..02af9a3ab 100644 --- a/openapi-specs/compute/34-02/desc/feeds/custom_vulnerabilities_digest_get.md +++ b/openapi-specs/compute/34-02/desc/feeds/custom_vulnerabilities_digest_get.md @@ -5,7 +5,7 @@ Returns the unique digest for the custom vulnerabilities and associated rules fo The following cURL command retrieves the digest for the configured custom vulnerabilities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/feeds/cve_allow_list_digest_get.md b/openapi-specs/compute/34-02/desc/feeds/cve_allow_list_digest_get.md index e27f21251..911a07fd9 100644 --- a/openapi-specs/compute/34-02/desc/feeds/cve_allow_list_digest_get.md +++ b/openapi-specs/compute/34-02/desc/feeds/cve_allow_list_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the Common Vulnerabilities and Exposures (CVE) a The following cURL command retrieves the digest for the configured CVE allow list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/feeds/cve_allow_list_get.md b/openapi-specs/compute/34-02/desc/feeds/cve_allow_list_get.md index 34fb2c7f8..d73ce17c2 100644 --- a/openapi-specs/compute/34-02/desc/feeds/cve_allow_list_get.md +++ b/openapi-specs/compute/34-02/desc/feeds/cve_allow_list_get.md @@ -5,7 +5,7 @@ Retrieves the globally allow-listed Common Vulnerabilities and Exposures (CVE). The following cURL command retrieves the globally allow-listed CVEs. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/feeds/cve_allow_list_put.md b/openapi-specs/compute/34-02/desc/feeds/cve_allow_list_put.md index 850016965..c4e2ce0af 100644 --- a/openapi-specs/compute/34-02/desc/feeds/cve_allow_list_put.md +++ b/openapi-specs/compute/34-02/desc/feeds/cve_allow_list_put.md @@ -7,7 +7,7 @@ Globally allow-lists a set of Common Vulnerabilities and Exposures (CVE). The following cURL command installs a global CVE allow-list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-02/desc/feeds/ips_digest_get.md b/openapi-specs/compute/34-02/desc/feeds/ips_digest_get.md index d059271ea..ae2a09915 100644 --- a/openapi-specs/compute/34-02/desc/feeds/ips_digest_get.md +++ b/openapi-specs/compute/34-02/desc/feeds/ips_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the list of suspicious or high risk IP endpoints The following cURL command retrieves the digest for the banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/feeds/ips_get.md b/openapi-specs/compute/34-02/desc/feeds/ips_get.md index 381257d47..f51c577a7 100644 --- a/openapi-specs/compute/34-02/desc/feeds/ips_get.md +++ b/openapi-specs/compute/34-02/desc/feeds/ips_get.md @@ -5,7 +5,7 @@ Retrieves the customized list of block-listed suspicious or high-risk IP address The following cURL command retrieves the list of globally block-listed suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/feeds/ips_put.md b/openapi-specs/compute/34-02/desc/feeds/ips_put.md index 6f8fc2419..5bf791044 100644 --- a/openapi-specs/compute/34-02/desc/feeds/ips_put.md +++ b/openapi-specs/compute/34-02/desc/feeds/ips_put.md @@ -7,7 +7,7 @@ Bans a custom list of suspicious or high-risk IP addresses. The following cURL command installs a custom list of banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-02/desc/feeds/malware_digest_get.md b/openapi-specs/compute/34-02/desc/feeds/malware_digest_get.md index 005c476a2..522a59aef 100644 --- a/openapi-specs/compute/34-02/desc/feeds/malware_digest_get.md +++ b/openapi-specs/compute/34-02/desc/feeds/malware_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for all the MD5 signatures of malicious executables The following cURL command retrieves the digest for the configured list for the MD5 signatures of malicious executables. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/feeds/malware_get.md b/openapi-specs/compute/34-02/desc/feeds/malware_get.md index 2a7aa128b..72bee6594 100644 --- a/openapi-specs/compute/34-02/desc/feeds/malware_get.md +++ b/openapi-specs/compute/34-02/desc/feeds/malware_get.md @@ -5,7 +5,7 @@ Returns the customized list of MD5 signatures of malicious executables. Refer to the following cURL command that retrieves the list of MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/feeds/malware_put.md b/openapi-specs/compute/34-02/desc/feeds/malware_put.md index 7e6ec5da0..176304cb9 100644 --- a/openapi-specs/compute/34-02/desc/feeds/malware_put.md +++ b/openapi-specs/compute/34-02/desc/feeds/malware_put.md @@ -7,7 +7,7 @@ Creates a custom list of malware MD5 signatures of malicious executables. Refer to the following cURL command that installs a custom list of malware MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-02/desc/feeds/refresh_post.md b/openapi-specs/compute/34-02/desc/feeds/refresh_post.md index a83c40d10..1c756edae 100644 --- a/openapi-specs/compute/34-02/desc/feeds/refresh_post.md +++ b/openapi-specs/compute/34-02/desc/feeds/refresh_post.md @@ -1,7 +1,7 @@ Triggers Console to refresh its data from the **Intelligence Stream** ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/forensic/activities_download_get.md b/openapi-specs/compute/34-02/desc/forensic/activities_download_get.md index 8a2dbd926..1918e3790 100644 --- a/openapi-specs/compute/34-02/desc/forensic/activities_download_get.md +++ b/openapi-specs/compute/34-02/desc/forensic/activities_download_get.md @@ -3,7 +3,7 @@ Downloads all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/forensic/activities_get.md b/openapi-specs/compute/34-02/desc/forensic/activities_get.md index c8fb1d0cd..c0761aa60 100644 --- a/openapi-specs/compute/34-02/desc/forensic/activities_get.md +++ b/openapi-specs/compute/34-02/desc/forensic/activities_get.md @@ -3,7 +3,7 @@ Retrieves all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/groups/get.md b/openapi-specs/compute/34-02/desc/groups/get.md index 6a0daa2eb..34a2711e0 100644 --- a/openapi-specs/compute/34-02/desc/groups/get.md +++ b/openapi-specs/compute/34-02/desc/groups/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups. ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/34-02/desc/groups/id_delete.md b/openapi-specs/compute/34-02/desc/groups/id_delete.md index 5962a1135..0c3cfa1cd 100644 --- a/openapi-specs/compute/34-02/desc/groups/id_delete.md +++ b/openapi-specs/compute/34-02/desc/groups/id_delete.md @@ -13,7 +13,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes a collection with the name `{id}`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-02/desc/groups/names.md b/openapi-specs/compute/34-02/desc/groups/names.md index 80f34f536..9c2dd1089 100644 --- a/openapi-specs/compute/34-02/desc/groups/names.md +++ b/openapi-specs/compute/34-02/desc/groups/names.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/34-02/desc/groups/post.md b/openapi-specs/compute/34-02/desc/groups/post.md index d0fc23a6d..ebad011f4 100644 --- a/openapi-specs/compute/34-02/desc/groups/post.md +++ b/openapi-specs/compute/34-02/desc/groups/post.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that creates a new group named `my-group`: ```bash -$ curl -k \ +$ curl \ -X POST \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/34-02/desc/high-availability/get.md b/openapi-specs/compute/34-02/desc/high-availability/get.md index a988d47ef..83d5d9b46 100644 --- a/openapi-specs/compute/34-02/desc/high-availability/get.md +++ b/openapi-specs/compute/34-02/desc/high-availability/get.md @@ -3,7 +3,7 @@ Returns the status of high high availability. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/34-02/desc/hosts/download_get.md b/openapi-specs/compute/34-02/desc/hosts/download_get.md index ab691fb49..34e546573 100644 --- a/openapi-specs/compute/34-02/desc/hosts/download_get.md +++ b/openapi-specs/compute/34-02/desc/hosts/download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Hosts > Refer to the following example cURL command that downloads all host scan reports to a CSV file called `hosts_report.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o hosts_report.csv \ diff --git a/openapi-specs/compute/34-02/desc/hosts/filters_get.md b/openapi-specs/compute/34-02/desc/hosts/filters_get.md index 4bf6df5e6..a39ec8a97 100644 --- a/openapi-specs/compute/34-02/desc/hosts/filters_get.md +++ b/openapi-specs/compute/34-02/desc/hosts/filters_get.md @@ -3,7 +3,7 @@ Returns host filters such as distribution and host name. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/hosts/get.md b/openapi-specs/compute/34-02/desc/hosts/get.md index 43020558a..9bdf69c6c 100644 --- a/openapi-specs/compute/34-02/desc/hosts/get.md +++ b/openapi-specs/compute/34-02/desc/hosts/get.md @@ -37,7 +37,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following cURL command that retrieves all host scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/hosts/info_get.md b/openapi-specs/compute/34-02/desc/hosts/info_get.md index 5b3903b7e..523024735 100644 --- a/openapi-specs/compute/34-02/desc/hosts/info_get.md +++ b/openapi-specs/compute/34-02/desc/hosts/info_get.md @@ -5,7 +5,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/hosts/scan_post.md b/openapi-specs/compute/34-02/desc/hosts/scan_post.md index 6b72cbfa3..0e0e7b074 100644 --- a/openapi-specs/compute/34-02/desc/hosts/scan_post.md +++ b/openapi-specs/compute/34-02/desc/hosts/scan_post.md @@ -3,7 +3,7 @@ Re-scan all hosts immediately. Refer to the following example command that forces Prisma Cloud Compute to re-scan all hosts: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/hosts/scan diff --git a/openapi-specs/compute/34-02/desc/images/defender_layer_get.md b/openapi-specs/compute/34-02/desc/images/defender_layer_get.md index 1dfe3633d..4bb88d62c 100644 --- a/openapi-specs/compute/34-02/desc/images/defender_layer_get.md +++ b/openapi-specs/compute/34-02/desc/images/defender_layer_get.md @@ -5,7 +5,7 @@ Returns the the Prisma Cloud Compute Defender in as a layer that can be used in Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/compute/34-02/desc/images/defender_rasp_get.md b/openapi-specs/compute/34-02/desc/images/defender_rasp_get.md index a8e145ff7..260e271a1 100644 --- a/openapi-specs/compute/34-02/desc/images/defender_rasp_get.md +++ b/openapi-specs/compute/34-02/desc/images/defender_rasp_get.md @@ -3,7 +3,7 @@ Returns the the Prisma Cloud Compute Defender as the RASP Defender A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/compute/34-02/desc/images/download_get.md b/openapi-specs/compute/34-02/desc/images/download_get.md index c7b987aeb..9b8011af9 100644 --- a/openapi-specs/compute/34-02/desc/images/download_get.md +++ b/openapi-specs/compute/34-02/desc/images/download_get.md @@ -16,7 +16,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -27,7 +27,7 @@ $ curl -k \ Refer to the following example cURL command that might be useful for developers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/images/get.md b/openapi-specs/compute/34-02/desc/images/get.md index 3f594c6c8..dcef1b0a4 100644 --- a/openapi-specs/compute/34-02/desc/images/get.md +++ b/openapi-specs/compute/34-02/desc/images/get.md @@ -26,7 +26,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following cURL command that retrieves a compact scan report for all images: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -36,7 +36,7 @@ $ curl -k \ Refer to the following cURL command that retrieves a compact scan report for an Ubuntu image: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -47,7 +47,7 @@ The name query is synonymous with the filter images text field in the Console UI Refer to the following cURL command that retrieves the scan report for an image with the matching SHA-256 hash: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/images/names_get.md b/openapi-specs/compute/34-02/desc/images/names_get.md index 3a234df98..311b33574 100644 --- a/openapi-specs/compute/34-02/desc/images/names_get.md +++ b/openapi-specs/compute/34-02/desc/images/names_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/34-02/desc/images/scan_post.md b/openapi-specs/compute/34-02/desc/images/scan_post.md index 8d802727a..36278249b 100644 --- a/openapi-specs/compute/34-02/desc/images/scan_post.md +++ b/openapi-specs/compute/34-02/desc/images/scan_post.md @@ -5,7 +5,7 @@ Re-scan all images immediately. This endpoint returns the time that the scans we Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all images: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/images/scan diff --git a/openapi-specs/compute/34-02/desc/images/twistlock_defender_tar_gz_get.md b/openapi-specs/compute/34-02/desc/images/twistlock_defender_tar_gz_get.md index 7852e12ba..36fb66ae8 100644 --- a/openapi-specs/compute/34-02/desc/images/twistlock_defender_tar_gz_get.md +++ b/openapi-specs/compute/34-02/desc/images/twistlock_defender_tar_gz_get.md @@ -1,7 +1,7 @@ Download the Container Defender image for Linux platforms. ```bash -$ curl -k \ +$ curl \ -u \ -H "Content-Type: application/octet-stream" \ -o twistlock_defender.tar.gz \ diff --git a/openapi-specs/compute/34-02/desc/intro.md b/openapi-specs/compute/34-02/desc/intro.md index 9038a3734..5b4ed5864 100644 --- a/openapi-specs/compute/34-02/desc/intro.md +++ b/openapi-specs/compute/34-02/desc/intro.md @@ -47,7 +47,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -58,7 +58,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -70,7 +70,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/compute/34-02/desc/kubernetes/scan_post.md b/openapi-specs/compute/34-02/desc/kubernetes/scan_post.md index 15d614c1a..ab74d5d96 100644 --- a/openapi-specs/compute/34-02/desc/kubernetes/scan_post.md +++ b/openapi-specs/compute/34-02/desc/kubernetes/scan_post.md @@ -3,7 +3,7 @@ This endpoint will trigger a Kubernetes scan. The following example curl command uses basic auth to initiate this scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/logs/console_get.md b/openapi-specs/compute/34-02/desc/logs/console_get.md index 80ece6611..113543540 100644 --- a/openapi-specs/compute/34-02/desc/logs/console_get.md +++ b/openapi-specs/compute/34-02/desc/logs/console_get.md @@ -3,7 +3,7 @@ Retrieves the latest Console log messages. The following example curl command retrieves the 10 latest Console log messages: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/logs/defender_download_get.md b/openapi-specs/compute/34-02/desc/logs/defender_download_get.md index 5d6718db0..05bbc6a75 100644 --- a/openapi-specs/compute/34-02/desc/logs/defender_download_get.md +++ b/openapi-specs/compute/34-02/desc/logs/defender_download_get.md @@ -5,7 +5,7 @@ The hostname can be returned from the endpoint `/defenders/names` The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/logs/defender_get.md b/openapi-specs/compute/34-02/desc/logs/defender_get.md index 1e733a746..f2e3b25df 100644 --- a/openapi-specs/compute/34-02/desc/logs/defender_get.md +++ b/openapi-specs/compute/34-02/desc/logs/defender_get.md @@ -7,7 +7,7 @@ Note that you must quote the URL when running the following command. Otherwise the shell misinterprets the ampersand (`&`) as the end of the command, and puts the curl command in the background. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/logs/system_download_get.md b/openapi-specs/compute/34-02/desc/logs/system_download_get.md index 1e5b5b873..43bb0abce 100644 --- a/openapi-specs/compute/34-02/desc/logs/system_download_get.md +++ b/openapi-specs/compute/34-02/desc/logs/system_download_get.md @@ -4,7 +4,7 @@ This endpoint will return the system debug logs with `tar.gz` file extension. The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/pcf-droplets/addresses_get.md b/openapi-specs/compute/34-02/desc/pcf-droplets/addresses_get.md index 257a47455..bb3365015 100644 --- a/openapi-specs/compute/34-02/desc/pcf-droplets/addresses_get.md +++ b/openapi-specs/compute/34-02/desc/pcf-droplets/addresses_get.md @@ -5,7 +5,7 @@ You can also add optional query parameters to this API call, in this example `cl The following example curl command retrieves the list of addresses: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/pcf-droplets/download_get.md b/openapi-specs/compute/34-02/desc/pcf-droplets/download_get.md index ad761e744..ac8546a25 100644 --- a/openapi-specs/compute/34-02/desc/pcf-droplets/download_get.md +++ b/openapi-specs/compute/34-02/desc/pcf-droplets/download_get.md @@ -3,7 +3,7 @@ This endpoint will download the list of configured cloud controller addresses co The following example curl command retrieves the list of addresses and outputs it to a file call `PCF_blobstores.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/pcf-droplets/get.md b/openapi-specs/compute/34-02/desc/pcf-droplets/get.md index 930d16948..aad607cba 100644 --- a/openapi-specs/compute/34-02/desc/pcf-droplets/get.md +++ b/openapi-specs/compute/34-02/desc/pcf-droplets/get.md @@ -3,7 +3,7 @@ This endpoint will return the full metadata of PCF blobstore from page **Monitor The following example curl command will retrieve this: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/pcf-droplets/scan_post.md b/openapi-specs/compute/34-02/desc/pcf-droplets/scan_post.md index 34e75b26c..d9c9df4dd 100644 --- a/openapi-specs/compute/34-02/desc/pcf-droplets/scan_post.md +++ b/openapi-specs/compute/34-02/desc/pcf-droplets/scan_post.md @@ -3,7 +3,7 @@ This endpoint will kick off a scan of the any PCF Blobstores you have configured Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/pcf-droplets/stop_post.md b/openapi-specs/compute/34-02/desc/pcf-droplets/stop_post.md index 94c376972..2c4d5264a 100644 --- a/openapi-specs/compute/34-02/desc/pcf-droplets/stop_post.md +++ b/openapi-specs/compute/34-02/desc/pcf-droplets/stop_post.md @@ -3,7 +3,7 @@ This endpoint will instruct the PFC Defenders to stop scanning. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/policies/compliance_ci_images_get.md b/openapi-specs/compute/34-02/desc/policies/compliance_ci_images_get.md index f97130a97..9a2b2abf5 100644 --- a/openapi-specs/compute/34-02/desc/policies/compliance_ci_images_get.md +++ b/openapi-specs/compute/34-02/desc/policies/compliance_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > CI** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/policies/compliance_ci_serverless_get.md b/openapi-specs/compute/34-02/desc/policies/compliance_ci_serverless_get.md index 59195f070..2f30e2d74 100644 --- a/openapi-specs/compute/34-02/desc/policies/compliance_ci_serverless_get.md +++ b/openapi-specs/compute/34-02/desc/policies/compliance_ci_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Functions > CI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/policies/compliance_container_get.md b/openapi-specs/compute/34-02/desc/policies/compliance_container_get.md index 7f10245ea..657d4f2dd 100644 --- a/openapi-specs/compute/34-02/desc/policies/compliance_container_get.md +++ b/openapi-specs/compute/34-02/desc/policies/compliance_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > Deployed** Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/policies/compliance_container_impacted_get.md b/openapi-specs/compute/34-02/desc/policies/compliance_container_impacted_get.md index 607bfa3c8..de9e0ee77 100644 --- a/openapi-specs/compute/34-02/desc/policies/compliance_container_impacted_get.md +++ b/openapi-specs/compute/34-02/desc/policies/compliance_container_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of containers captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/compliance/container/impacted?ruleName=' diff --git a/openapi-specs/compute/34-02/desc/policies/compliance_host_get.md b/openapi-specs/compute/34-02/desc/policies/compliance_host_get.md index c029ecf7f..a5e429af5 100755 --- a/openapi-specs/compute/34-02/desc/policies/compliance_host_get.md +++ b/openapi-specs/compute/34-02/desc/policies/compliance_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Hosts > Running hosts** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/policies/compliance_serverless_get.md b/openapi-specs/compute/34-02/desc/policies/compliance_serverless_get.md index c7de886c1..f559179f6 100755 --- a/openapi-specs/compute/34-02/desc/policies/compliance_serverless_get.md +++ b/openapi-specs/compute/34-02/desc/policies/compliance_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Functions > Functions** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/policies/compliance_vms_get.md b/openapi-specs/compute/34-02/desc/policies/compliance_vms_get.md index f7d7e1a49..b61d20d9d 100755 --- a/openapi-specs/compute/34-02/desc/policies/compliance_vms_get.md +++ b/openapi-specs/compute/34-02/desc/policies/compliance_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Hosts > VM ima The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/policies/compliance_vms_impacted_get.md b/openapi-specs/compute/34-02/desc/policies/compliance_vms_impacted_get.md index 9cf5b9d03..4ac3f2832 100644 --- a/openapi-specs/compute/34-02/desc/policies/compliance_vms_impacted_get.md +++ b/openapi-specs/compute/34-02/desc/policies/compliance_vms_impacted_get.md @@ -8,7 +8,7 @@ Use query parameters to retrieve the list of impacted resources by *account ID*, Refer to the following example cURL command, which retrieves a list of impacted resources: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/policies/docker_get.md b/openapi-specs/compute/34-02/desc/policies/docker_get.md index f56872c67..e8ab3d5bb 100644 --- a/openapi-specs/compute/34-02/desc/policies/docker_get.md +++ b/openapi-specs/compute/34-02/desc/policies/docker_get.md @@ -3,7 +3,7 @@ Retrieves a list of all access control rules for Docker Engine commands. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/policies/docker_put.md b/openapi-specs/compute/34-02/desc/policies/docker_put.md index 860e2bb1e..a5d0c0230 100644 --- a/openapi-specs/compute/34-02/desc/policies/docker_put.md +++ b/openapi-specs/compute/34-02/desc/policies/docker_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove Docker access control rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/docker \ | jq '.' > docker_access_control_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove Docker access control rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/34-02/desc/policies/firewall_app-embedded_get.md b/openapi-specs/compute/34-02/desc/policies/firewall_app-embedded_get.md index 3da2a7cd6..4e59c4c21 100644 --- a/openapi-specs/compute/34-02/desc/policies/firewall_app-embedded_get.md +++ b/openapi-specs/compute/34-02/desc/policies/firewall_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > App-Embedded** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/policies/firewall_app_container_get.md b/openapi-specs/compute/34-02/desc/policies/firewall_app_container_get.md index 3b8c157fa..f0486aa4c 100644 --- a/openapi-specs/compute/34-02/desc/policies/firewall_app_container_get.md +++ b/openapi-specs/compute/34-02/desc/policies/firewall_app_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Container** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/container' diff --git a/openapi-specs/compute/34-02/desc/policies/firewall_app_host_get.md b/openapi-specs/compute/34-02/desc/policies/firewall_app_host_get.md index adb90128a..75c22add4 100644 --- a/openapi-specs/compute/34-02/desc/policies/firewall_app_host_get.md +++ b/openapi-specs/compute/34-02/desc/policies/firewall_app_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Host** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/policies/firewall_app_network_list_get.md b/openapi-specs/compute/34-02/desc/policies/firewall_app_network_list_get.md index 13f7fb450..5a1f87d85 100644 --- a/openapi-specs/compute/34-02/desc/policies/firewall_app_network_list_get.md +++ b/openapi-specs/compute/34-02/desc/policies/firewall_app_network_list_get.md @@ -11,7 +11,7 @@ This endpoint maps to **Defend > WAAS > Network lists** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/network-list' diff --git a/openapi-specs/compute/34-02/desc/policies/firewall_app_out-of-band_get.md b/openapi-specs/compute/34-02/desc/policies/firewall_app_out-of-band_get.md index d4f72d041..9ae662687 100644 --- a/openapi-specs/compute/34-02/desc/policies/firewall_app_out-of-band_get.md +++ b/openapi-specs/compute/34-02/desc/policies/firewall_app_out-of-band_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/policies/firewall_app_out-of-band_impacted_get.md b/openapi-specs/compute/34-02/desc/policies/firewall_app_out-of-band_impacted_get.md index 25d2c6691..96a427f94 100644 --- a/openapi-specs/compute/34-02/desc/policies/firewall_app_out-of-band_impacted_get.md +++ b/openapi-specs/compute/34-02/desc/policies/firewall_app_out-of-band_impacted_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/policies/firewall_app_rasp_get.md b/openapi-specs/compute/34-02/desc/policies/firewall_app_rasp_get.md index 15d481cf3..a201d3beb 100644 --- a/openapi-specs/compute/34-02/desc/policies/firewall_app_rasp_get.md +++ b/openapi-specs/compute/34-02/desc/policies/firewall_app_rasp_get.md @@ -1,7 +1,7 @@ Retrieves a list of all application firewall (CNAF) rules for RASP. ``` -$ curl -k \ +$ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp ``` diff --git a/openapi-specs/compute/34-02/desc/policies/firewall_app_rasp_put.md b/openapi-specs/compute/34-02/desc/policies/firewall_app_rasp_put.md index 04ba86483..1101c7690 100644 --- a/openapi-specs/compute/34-02/desc/policies/firewall_app_rasp_put.md +++ b/openapi-specs/compute/34-02/desc/policies/firewall_app_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp \ | jq '.' > app_firewall_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/34-02/desc/policies/firewall_app_serverless_get.md b/openapi-specs/compute/34-02/desc/policies/firewall_app_serverless_get.md index d19e909f3..90cac0015 100644 --- a/openapi-specs/compute/34-02/desc/policies/firewall_app_serverless_get.md +++ b/openapi-specs/compute/34-02/desc/policies/firewall_app_serverless_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Serverless** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/serverless' diff --git a/openapi-specs/compute/34-02/desc/policies/firewall_network_container_get.md b/openapi-specs/compute/34-02/desc/policies/firewall_network_container_get.md index 3f1343b53..82e656818 100644 --- a/openapi-specs/compute/34-02/desc/policies/firewall_network_container_get.md +++ b/openapi-specs/compute/34-02/desc/policies/firewall_network_container_get.md @@ -4,7 +4,7 @@ Retrieves a list of all CNNS container and host rules. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/policies/firewall_network_container_put.md b/openapi-specs/compute/34-02/desc/policies/firewall_network_container_put.md index fd9263430..cffb3f1c4 100644 --- a/openapi-specs/compute/34-02/desc/policies/firewall_network_container_put.md +++ b/openapi-specs/compute/34-02/desc/policies/firewall_network_container_put.md @@ -9,7 +9,7 @@ The procedure to add, edit, or remove rules is: Refer to the following example cURL command that retrieves a list of all rules, pretty-print the JSON response, and save the results to a file: ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -26,7 +26,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/34-02/desc/policies/firewall_network_entities_get.md b/openapi-specs/compute/34-02/desc/policies/firewall_network_entities_get.md index 757121f70..28ed8dbcb 100644 --- a/openapi-specs/compute/34-02/desc/policies/firewall_network_entities_get.md +++ b/openapi-specs/compute/34-02/desc/policies/firewall_network_entities_get.md @@ -1,7 +1,7 @@ Retrieves a list of all CNNF network objects. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/policies/firewall_network_entities_put.md b/openapi-specs/compute/34-02/desc/policies/firewall_network_entities_put.md index 83c023286..39044ee10 100644 --- a/openapi-specs/compute/34-02/desc/policies/firewall_network_entities_put.md +++ b/openapi-specs/compute/34-02/desc/policies/firewall_network_entities_put.md @@ -3,7 +3,7 @@ Updates the list of CNNF network objects. The following example curl command updates the network objects. There is an example of all three types (images,subnets, and applications ): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-02/desc/policies/policies.md b/openapi-specs/compute/34-02/desc/policies/policies.md index 69768c03d..97be7b616 100644 --- a/openapi-specs/compute/34-02/desc/policies/policies.md +++ b/openapi-specs/compute/34-02/desc/policies/policies.md @@ -21,7 +21,7 @@ To add, edit, or remove vulnerability rules from a policy: For example, the following cURL command uses basic auth to retrieve a list of all image vulnerability rules, pretty-prints the JSON response, and saves the results to a `vulnerability_rules.json` file. ```bash - $ curl -k \ + $ curl \ -u \ https:///api/v1/policies/runtime/host \ | jq '.' > vulnerability_rules.json @@ -36,7 +36,7 @@ To add, edit, or remove vulnerability rules from a policy: **Note:** Remember to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -107,7 +107,7 @@ Use the `PUT` method to delete all rules by submitting an empty JSON object. For example, to delete all host runtime rules: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-02/desc/policies/runtime_app-embedded_get.md b/openapi-specs/compute/34-02/desc/policies/runtime_app-embedded_get.md index fcf0ba8b9..517b741bb 100755 --- a/openapi-specs/compute/34-02/desc/policies/runtime_app-embedded_get.md +++ b/openapi-specs/compute/34-02/desc/policies/runtime_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > App-Embedded policy** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/policies/runtime_container_get.md b/openapi-specs/compute/34-02/desc/policies/runtime_container_get.md index f1b50b727..65cd10660 100644 --- a/openapi-specs/compute/34-02/desc/policies/runtime_container_get.md +++ b/openapi-specs/compute/34-02/desc/policies/runtime_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Container policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/policies/runtime_container_impacted_get.md b/openapi-specs/compute/34-02/desc/policies/runtime_container_impacted_get.md index 195f75547..e026d33b9 100644 --- a/openapi-specs/compute/34-02/desc/policies/runtime_container_impacted_get.md +++ b/openapi-specs/compute/34-02/desc/policies/runtime_container_impacted_get.md @@ -6,7 +6,7 @@ In the Console UI, you can see how it works by going to the **Defend > Runtime > Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ $ curl -k \ For additional help with your `ruleName`: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/policies/runtime_host_get.md b/openapi-specs/compute/34-02/desc/policies/runtime_host_get.md index 38800596c..559ef690a 100644 --- a/openapi-specs/compute/34-02/desc/policies/runtime_host_get.md +++ b/openapi-specs/compute/34-02/desc/policies/runtime_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Host policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/policies/runtime_rasp_get.md b/openapi-specs/compute/34-02/desc/policies/runtime_rasp_get.md index 5b7a76457..55a6ff05b 100644 --- a/openapi-specs/compute/34-02/desc/policies/runtime_rasp_get.md +++ b/openapi-specs/compute/34-02/desc/policies/runtime_rasp_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your RASP runtime policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/policies/runtime_rasp_put.md b/openapi-specs/compute/34-02/desc/policies/runtime_rasp_put.md index bba60ba81..f71fb4b93 100644 --- a/openapi-specs/compute/34-02/desc/policies/runtime_rasp_put.md +++ b/openapi-specs/compute/34-02/desc/policies/runtime_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve the rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET @@ -24,7 +24,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -H "Content-Type:application/json" \ -X PUT \ diff --git a/openapi-specs/compute/34-02/desc/policies/runtime_serverless_get.md b/openapi-specs/compute/34-02/desc/policies/runtime_serverless_get.md index 44326bbf6..c98489e16 100644 --- a/openapi-specs/compute/34-02/desc/policies/runtime_serverless_get.md +++ b/openapi-specs/compute/34-02/desc/policies/runtime_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Serverless policy** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/policies/secrets_get.md b/openapi-specs/compute/34-02/desc/policies/secrets_get.md index 89e6b9c0e..cb4ecb37c 100644 --- a/openapi-specs/compute/34-02/desc/policies/secrets_get.md +++ b/openapi-specs/compute/34-02/desc/policies/secrets_get.md @@ -3,7 +3,7 @@ Retrieves a list of all secrets rules. The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/policies/secrets diff --git a/openapi-specs/compute/34-02/desc/policies/secrets_put.md b/openapi-specs/compute/34-02/desc/policies/secrets_put.md index 1e8877ca1..04fd41f24 100644 --- a/openapi-specs/compute/34-02/desc/policies/secrets_put.md +++ b/openapi-specs/compute/34-02/desc/policies/secrets_put.md @@ -10,7 +10,7 @@ The procedure to add, edit, or remove secrets rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/secrets \ | jq '.' > secrets_rules.json @@ -24,7 +24,7 @@ The procedure to add, edit, or remove secrets rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/34-02/desc/policies/trust_get.md b/openapi-specs/compute/34-02/desc/policies/trust_get.md index 8de1ba409..0805d6777 100644 --- a/openapi-specs/compute/34-02/desc/policies/trust_get.md +++ b/openapi-specs/compute/34-02/desc/policies/trust_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/policies/trust_put.md b/openapi-specs/compute/34-02/desc/policies/trust_put.md index fccd4b91e..7fec72031 100644 --- a/openapi-specs/compute/34-02/desc/policies/trust_put.md +++ b/openapi-specs/compute/34-02/desc/policies/trust_put.md @@ -1,7 +1,7 @@ Updates the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-02/desc/policies/vulnerability_ci_images_get.md b/openapi-specs/compute/34-02/desc/policies/vulnerability_ci_images_get.md index abc3da8fa..ce0d50a29 100644 --- a/openapi-specs/compute/34-02/desc/policies/vulnerability_ci_images_get.md +++ b/openapi-specs/compute/34-02/desc/policies/vulnerability_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/policies/vulnerability_ci_serverless_get.md b/openapi-specs/compute/34-02/desc/policies/vulnerability_ci_serverless_get.md index 958c86495..6fb5f93ce 100644 --- a/openapi-specs/compute/34-02/desc/policies/vulnerability_ci_serverless_get.md +++ b/openapi-specs/compute/34-02/desc/policies/vulnerability_ci_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/policies/vulnerability_coderepos_get.md b/openapi-specs/compute/34-02/desc/policies/vulnerability_coderepos_get.md index 08dfed8e1..a4ac62f33 100644 --- a/openapi-specs/compute/34-02/desc/policies/vulnerability_coderepos_get.md +++ b/openapi-specs/compute/34-02/desc/policies/vulnerability_coderepos_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Code repositories** in the Co Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/vulnerability/coderepos' diff --git a/openapi-specs/compute/34-02/desc/policies/vulnerability_coderepos_impacted_get.md b/openapi-specs/compute/34-02/desc/policies/vulnerability_coderepos_impacted_get.md index a401a12c4..e64ef768e 100644 --- a/openapi-specs/compute/34-02/desc/policies/vulnerability_coderepos_impacted_get.md +++ b/openapi-specs/compute/34-02/desc/policies/vulnerability_coderepos_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/coderepos/impacted?project=&ruleName=' ``` diff --git a/openapi-specs/compute/34-02/desc/policies/vulnerability_coderepos_put.md b/openapi-specs/compute/34-02/desc/policies/vulnerability_coderepos_put.md index 514eec136..a002415b9 100644 --- a/openapi-specs/compute/34-02/desc/policies/vulnerability_coderepos_put.md +++ b/openapi-specs/compute/34-02/desc/policies/vulnerability_coderepos_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Code repo Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT 'https:///api/v/policies/vulnerability/coderepos' \ diff --git a/openapi-specs/compute/34-02/desc/policies/vulnerability_host_get.md b/openapi-specs/compute/34-02/desc/policies/vulnerability_host_get.md index 3b9b14b9c..260da7675 100644 --- a/openapi-specs/compute/34-02/desc/policies/vulnerability_host_get.md +++ b/openapi-specs/compute/34-02/desc/policies/vulnerability_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Hosts > Running hosts** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/policies/vulnerability_host_impacted_get.md b/openapi-specs/compute/34-02/desc/policies/vulnerability_host_impacted_get.md index 346368518..f44592830 100644 --- a/openapi-specs/compute/34-02/desc/policies/vulnerability_host_impacted_get.md +++ b/openapi-specs/compute/34-02/desc/policies/vulnerability_host_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by `RULE_NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/host/impacted?project={PROJECT_NAME}&ruleName={RULE_NAME}' ``` diff --git a/openapi-specs/compute/34-02/desc/policies/vulnerability_images_get.md b/openapi-specs/compute/34-02/desc/policies/vulnerability_images_get.md index 33581be37..57359bb8f 100644 --- a/openapi-specs/compute/34-02/desc/policies/vulnerability_images_get.md +++ b/openapi-specs/compute/34-02/desc/policies/vulnerability_images_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images?project=" diff --git a/openapi-specs/compute/34-02/desc/policies/vulnerability_images_impacted_get.md b/openapi-specs/compute/34-02/desc/policies/vulnerability_images_impacted_get.md index ae1d5e396..e2a4efa23 100644 --- a/openapi-specs/compute/34-02/desc/policies/vulnerability_images_impacted_get.md +++ b/openapi-specs/compute/34-02/desc/policies/vulnerability_images_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of images caught by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images/impacted?project=&ruleName=" diff --git a/openapi-specs/compute/34-02/desc/policies/vulnerability_images_put.md b/openapi-specs/compute/34-02/desc/policies/vulnerability_images_put.md index b3330dab7..8c3cc8af2 100644 --- a/openapi-specs/compute/34-02/desc/policies/vulnerability_images_put.md +++ b/openapi-specs/compute/34-02/desc/policies/vulnerability_images_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -X PUT 'https:///api/v/policies/vulnerability/images' \ --data '{ diff --git a/openapi-specs/compute/34-02/desc/policies/vulnerability_serverless_get.md b/openapi-specs/compute/34-02/desc/policies/vulnerability_serverless_get.md index c7a8e2ef5..41c7e75d8 100644 --- a/openapi-specs/compute/34-02/desc/policies/vulnerability_serverless_get.md +++ b/openapi-specs/compute/34-02/desc/policies/vulnerability_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Functions** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/policies/vulnerability_serverless_put.md b/openapi-specs/compute/34-02/desc/policies/vulnerability_serverless_put.md index 2b567b5b1..5199f0997 100644 --- a/openapi-specs/compute/34-02/desc/policies/vulnerability_serverless_put.md +++ b/openapi-specs/compute/34-02/desc/policies/vulnerability_serverless_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k 'https:///api/v/policies/vulnerability/serverless' \ +$ curl 'https:///api/v/policies/vulnerability/serverless' \ -X PUT \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/34-02/desc/policies/vulnerability_vms_get.md b/openapi-specs/compute/34-02/desc/policies/vulnerability_vms_get.md index 117d2cc4a..e37c1520f 100644 --- a/openapi-specs/compute/34-02/desc/policies/vulnerability_vms_get.md +++ b/openapi-specs/compute/34-02/desc/policies/vulnerability_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Hosts > V The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/policies/vulnerability_vms_impacted_get.md b/openapi-specs/compute/34-02/desc/policies/vulnerability_vms_impacted_get.md index 29d9621ea..f1a7f7ef5 100644 --- a/openapi-specs/compute/34-02/desc/policies/vulnerability_vms_impacted_get.md +++ b/openapi-specs/compute/34-02/desc/policies/vulnerability_vms_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/vms?project=&ruleName=' ``` diff --git a/openapi-specs/compute/34-02/desc/profiles/app-embedded_download_get.md b/openapi-specs/compute/34-02/desc/profiles/app-embedded_download_get.md index 4b3f7ff8a..2e8cac56d 100644 --- a/openapi-specs/compute/34-02/desc/profiles/app-embedded_download_get.md +++ b/openapi-specs/compute/34-02/desc/profiles/app-embedded_download_get.md @@ -5,7 +5,7 @@ Downloads the app-embedded observations in a CSV format. Refer to the following example cURL command that downloads all the app-embedded runtime profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/profiles/app-embedded_get.md b/openapi-specs/compute/34-02/desc/profiles/app-embedded_get.md index f3ddb3125..c332061e5 100644 --- a/openapi-specs/compute/34-02/desc/profiles/app-embedded_get.md +++ b/openapi-specs/compute/34-02/desc/profiles/app-embedded_get.md @@ -5,7 +5,7 @@ Retrieves the app-embedded observations. Refer to the following example cURL command that lists all the app-embedded runtime: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/profiles/container_download_get.md b/openapi-specs/compute/34-02/desc/profiles/container_download_get.md index ad7a86101..ee9d5e9e4 100644 --- a/openapi-specs/compute/34-02/desc/profiles/container_download_get.md +++ b/openapi-specs/compute/34-02/desc/profiles/container_download_get.md @@ -6,7 +6,7 @@ Retrieves the details and state of all runtime models in CSV format. Refer to the following example cURL command that downloads a complete list in CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/profiles/container_filters_get.md b/openapi-specs/compute/34-02/desc/profiles/container_filters_get.md index 8b6122b80..13535b520 100644 --- a/openapi-specs/compute/34-02/desc/profiles/container_filters_get.md +++ b/openapi-specs/compute/34-02/desc/profiles/container_filters_get.md @@ -4,7 +4,7 @@ Returns a list of os and images from page monitor/runtime/container-models in Co Example curl command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/profiles/container_get.md b/openapi-specs/compute/34-02/desc/profiles/container_get.md index cdbc24c3e..59a3764fb 100644 --- a/openapi-specs/compute/34-02/desc/profiles/container_get.md +++ b/openapi-specs/compute/34-02/desc/profiles/container_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of all runtime models. Refer to the following example cURL command that lists all runtime models in a system: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/profiles/container_learn_post.md b/openapi-specs/compute/34-02/desc/profiles/container_learn_post.md index 5fef2e31e..2c1d08af1 100644 --- a/openapi-specs/compute/34-02/desc/profiles/container_learn_post.md +++ b/openapi-specs/compute/34-02/desc/profiles/container_learn_post.md @@ -7,7 +7,7 @@ For more information, refer to [Learning mode](https://docs.prismacloud.io/en/cl Refer to the following example cURL command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/profiles/host_download_get.md b/openapi-specs/compute/34-02/desc/profiles/host_download_get.md index ace270a32..2dfb51ec0 100644 --- a/openapi-specs/compute/34-02/desc/profiles/host_download_get.md +++ b/openapi-specs/compute/34-02/desc/profiles/host_download_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of each host service runtime model in CSV format Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/profiles/host_get.md b/openapi-specs/compute/34-02/desc/profiles/host_get.md index 208a24de3..55d8bf8ff 100644 --- a/openapi-specs/compute/34-02/desc/profiles/host_get.md +++ b/openapi-specs/compute/34-02/desc/profiles/host_get.md @@ -15,7 +15,7 @@ The returned JSON object has the following structure: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/profiles/host_id_rule_get.md b/openapi-specs/compute/34-02/desc/profiles/host_id_rule_get.md index 672cb4c62..8be668fca 100644 --- a/openapi-specs/compute/34-02/desc/profiles/host_id_rule_get.md +++ b/openapi-specs/compute/34-02/desc/profiles/host_id_rule_get.md @@ -10,7 +10,7 @@ This is the `PROFILE_ID`. The following example command uses curl and basic auth to specify the learning mode for a profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/profiles/service_download_get.md b/openapi-specs/compute/34-02/desc/profiles/service_download_get.md index 63dff3354..4c1c431c1 100644 --- a/openapi-specs/compute/34-02/desc/profiles/service_download_get.md +++ b/openapi-specs/compute/34-02/desc/profiles/service_download_get.md @@ -1,7 +1,7 @@ Retrieves the details and state of all host service runtime models in CSV format ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/profiles/service_get.md b/openapi-specs/compute/34-02/desc/profiles/service_get.md index a4f8c348d..5d786d919 100644 --- a/openapi-specs/compute/34-02/desc/profiles/service_get.md +++ b/openapi-specs/compute/34-02/desc/profiles/service_get.md @@ -10,7 +10,7 @@ The returned JSON object has the following structure: Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/profiles/service_id_learn_post.md b/openapi-specs/compute/34-02/desc/profiles/service_id_learn_post.md index fb338b80d..fa85fc3a2 100644 --- a/openapi-specs/compute/34-02/desc/profiles/service_id_learn_post.md +++ b/openapi-specs/compute/34-02/desc/profiles/service_id_learn_post.md @@ -11,7 +11,7 @@ The `PROFILE_ID` is typically the service's name, such as `sshd` or `ntpd`. The following example command uses curl and basic auth to specify the learning mode for a host service profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/profiles/service_learn_post.md b/openapi-specs/compute/34-02/desc/profiles/service_learn_post.md index 02a1f299e..ceff8e5a5 100644 --- a/openapi-specs/compute/34-02/desc/profiles/service_learn_post.md +++ b/openapi-specs/compute/34-02/desc/profiles/service_learn_post.md @@ -3,7 +3,7 @@ Specify the learning mode for all host service profiles. The following example command uses curl and basic auth to specify the learning mode for all host service profiles. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/profiles/service_names_get.md b/openapi-specs/compute/34-02/desc/profiles/service_names_get.md index 7da863545..afae56f0d 100644 --- a/openapi-specs/compute/34-02/desc/profiles/service_names_get.md +++ b/openapi-specs/compute/34-02/desc/profiles/service_names_get.md @@ -3,7 +3,7 @@ Retrieves the name of all host service runtime models from within the app at **M The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/projects/get.md b/openapi-specs/compute/34-02/desc/projects/get.md index 05485c24c..1ac04d2c0 100644 --- a/openapi-specs/compute/34-02/desc/projects/get.md +++ b/openapi-specs/compute/34-02/desc/projects/get.md @@ -3,7 +3,7 @@ Lists all projects visible to the given user. Assuming the given user is an admin, the following example curl command would list all projects: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/projects/name_delete.md b/openapi-specs/compute/34-02/desc/projects/name_delete.md index fba889f7e..0a34e72a2 100644 --- a/openapi-specs/compute/34-02/desc/projects/name_delete.md +++ b/openapi-specs/compute/34-02/desc/projects/name_delete.md @@ -6,7 +6,7 @@ The value for `` can be retrieved from the `_id` field in the resp The DELETE method returns the decommissioned supervisor's admin username and password. ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/compute/34-02/desc/projects/name_put.md b/openapi-specs/compute/34-02/desc/projects/name_put.md index b5a83a67d..1bde9b0c7 100644 --- a/openapi-specs/compute/34-02/desc/projects/name_put.md +++ b/openapi-specs/compute/34-02/desc/projects/name_put.md @@ -4,7 +4,7 @@ The following example curl command updates a project named ``. The value for `` can be retrieved from the `_id` field in the response object from `GET /api/v1/projects`. ```bash -$ curl -k \ +$ curl \ -u \ -X PUT \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/compute/34-02/desc/projects/post.md b/openapi-specs/compute/34-02/desc/projects/post.md index 8862c0fd4..38c574173 100644 --- a/openapi-specs/compute/34-02/desc/projects/post.md +++ b/openapi-specs/compute/34-02/desc/projects/post.md @@ -3,7 +3,7 @@ Provisions a new project. The following example curl command provisions a new project named `my-project`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ $ curl -k \ If you have installed a new instance of Console, and you have already created an initial admin user for it, then you can specify the admin username name and password when you provision the project. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/projects/projects.md b/openapi-specs/compute/34-02/desc/projects/projects.md index 7e7dcff66..19c904e9e 100644 --- a/openapi-specs/compute/34-02/desc/projects/projects.md +++ b/openapi-specs/compute/34-02/desc/projects/projects.md @@ -20,7 +20,7 @@ If `project` is not specified, it is set to `Central+Console`. For example, to retrieve the compliance policies for a tenant project named `mobile_payments_division`, use the following curl command: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/radar/container_clean_post.md b/openapi-specs/compute/34-02/desc/radar/container_clean_post.md index 662b6d53f..d4f87e91e 100644 --- a/openapi-specs/compute/34-02/desc/radar/container_clean_post.md +++ b/openapi-specs/compute/34-02/desc/radar/container_clean_post.md @@ -1,7 +1,7 @@ Cleans the container runtime profiles and Radar entities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/radar/container_delete.md b/openapi-specs/compute/34-02/desc/radar/container_delete.md index 4eabe337f..b6cc69cf2 100644 --- a/openapi-specs/compute/34-02/desc/radar/container_delete.md +++ b/openapi-specs/compute/34-02/desc/radar/container_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-02/desc/radar/container_export_get.md b/openapi-specs/compute/34-02/desc/radar/container_export_get.md index 7f577568f..f776c7e6c 100644 --- a/openapi-specs/compute/34-02/desc/radar/container_export_get.md +++ b/openapi-specs/compute/34-02/desc/radar/container_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for containers) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/radar/container_filters_get.md b/openapi-specs/compute/34-02/desc/radar/container_filters_get.md index f66463da1..8d7cd6df3 100644 --- a/openapi-specs/compute/34-02/desc/radar/container_filters_get.md +++ b/openapi-specs/compute/34-02/desc/radar/container_filters_get.md @@ -1,7 +1,7 @@ Returns the namespaces from the container view on the Radar page. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/radar/container_get.md b/openapi-specs/compute/34-02/desc/radar/container_get.md index 280d683d9..404629a25 100644 --- a/openapi-specs/compute/34-02/desc/radar/container_get.md +++ b/openapi-specs/compute/34-02/desc/radar/container_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (container view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/radar/host_delete.md b/openapi-specs/compute/34-02/desc/radar/host_delete.md index 738fa7a7c..b4910a8b7 100644 --- a/openapi-specs/compute/34-02/desc/radar/host_delete.md +++ b/openapi-specs/compute/34-02/desc/radar/host_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two apps in CNNF for hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-02/desc/radar/host_export_get.md b/openapi-specs/compute/34-02/desc/radar/host_export_get.md index dd91b5335..851d6f40f 100644 --- a/openapi-specs/compute/34-02/desc/radar/host_export_get.md +++ b/openapi-specs/compute/34-02/desc/radar/host_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for hosts) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/radar/host_get.md b/openapi-specs/compute/34-02/desc/radar/host_get.md index a12025856..222d075aa 100644 --- a/openapi-specs/compute/34-02/desc/radar/host_get.md +++ b/openapi-specs/compute/34-02/desc/radar/host_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (host view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/radar/serverless_get.md b/openapi-specs/compute/34-02/desc/radar/serverless_get.md index b2f329149..170cfb48d 100644 --- a/openapi-specs/compute/34-02/desc/radar/serverless_get.md +++ b/openapi-specs/compute/34-02/desc/radar/serverless_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/radar/serverless_progress_get.md b/openapi-specs/compute/34-02/desc/radar/serverless_progress_get.md index a11c1ae20..0808dfbf4 100644 --- a/openapi-specs/compute/34-02/desc/radar/serverless_progress_get.md +++ b/openapi-specs/compute/34-02/desc/radar/serverless_progress_get.md @@ -1,7 +1,7 @@ Returns the scan progress from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/radar/serverless_scan_post.md b/openapi-specs/compute/34-02/desc/radar/serverless_scan_post.md index 0d519ba88..2d444ac88 100644 --- a/openapi-specs/compute/34-02/desc/radar/serverless_scan_post.md +++ b/openapi-specs/compute/34-02/desc/radar/serverless_scan_post.md @@ -1,7 +1,7 @@ Initiates a serverless scan of your environments. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/radar/serverless_stop_post.md b/openapi-specs/compute/34-02/desc/radar/serverless_stop_post.md index 5c0bdf186..f15bef34d 100644 --- a/openapi-specs/compute/34-02/desc/radar/serverless_stop_post.md +++ b/openapi-specs/compute/34-02/desc/radar/serverless_stop_post.md @@ -1,7 +1,7 @@ Stops an in-progress serverless scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/rbac/role_delete.md b/openapi-specs/compute/34-02/desc/rbac/role_delete.md index 87015b6e8..46efcf9c9 100644 --- a/openapi-specs/compute/34-02/desc/rbac/role_delete.md +++ b/openapi-specs/compute/34-02/desc/rbac/role_delete.md @@ -4,7 +4,7 @@ System roles and roles assigned to users/groups cannot be deleted. The following example curl command uses basic auth to delete role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-02/desc/rbac/roles_get.md b/openapi-specs/compute/34-02/desc/rbac/roles_get.md index 4cd1d9bc7..112026937 100644 --- a/openapi-specs/compute/34-02/desc/rbac/roles_get.md +++ b/openapi-specs/compute/34-02/desc/rbac/roles_get.md @@ -3,7 +3,7 @@ This endpoint will return a list in JSON format of the roles can be found under The following example curl command uses basic auth to return: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/rbac/roles_post.md b/openapi-specs/compute/34-02/desc/rbac/roles_post.md index 1f20772ce..6988766e8 100644 --- a/openapi-specs/compute/34-02/desc/rbac/roles_post.md +++ b/openapi-specs/compute/34-02/desc/rbac/roles_post.md @@ -37,7 +37,7 @@ The added role must contain the "user" permission with read-write access. This p The following example curl command uses basic auth to create the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/rbac/roles_put.md b/openapi-specs/compute/34-02/desc/rbac/roles_put.md index 34d7b41a7..f62e34ccb 100644 --- a/openapi-specs/compute/34-02/desc/rbac/roles_put.md +++ b/openapi-specs/compute/34-02/desc/rbac/roles_put.md @@ -38,7 +38,7 @@ The updated role must contain the "user" permission with read-write access. This The following example curl command uses basic auth to update the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-02/desc/recovery/backup_get.md b/openapi-specs/compute/34-02/desc/recovery/backup_get.md index 4da46f356..bf735905a 100644 --- a/openapi-specs/compute/34-02/desc/recovery/backup_get.md +++ b/openapi-specs/compute/34-02/desc/recovery/backup_get.md @@ -3,7 +3,7 @@ Returns a list of available backups. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/recovery/backup_id_delete.md b/openapi-specs/compute/34-02/desc/recovery/backup_id_delete.md index ae9c33e90..80cd4c3f6 100644 --- a/openapi-specs/compute/34-02/desc/recovery/backup_id_delete.md +++ b/openapi-specs/compute/34-02/desc/recovery/backup_id_delete.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-02/desc/recovery/backup_id_patch.md b/openapi-specs/compute/34-02/desc/recovery/backup_id_patch.md index 4a78cd67d..b3699972f 100644 --- a/openapi-specs/compute/34-02/desc/recovery/backup_id_patch.md +++ b/openapi-specs/compute/34-02/desc/recovery/backup_id_patch.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/compute/34-02/desc/recovery/backup_post.md b/openapi-specs/compute/34-02/desc/recovery/backup_post.md index f45161712..41436fe5f 100644 --- a/openapi-specs/compute/34-02/desc/recovery/backup_post.md +++ b/openapi-specs/compute/34-02/desc/recovery/backup_post.md @@ -3,7 +3,7 @@ Creates a backup named `backup_name` by invoking the MongoDB dump process. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/recovery/restore_id_post.md b/openapi-specs/compute/34-02/desc/recovery/restore_id_post.md index 850fceeaa..e424641cc 100644 --- a/openapi-specs/compute/34-02/desc/recovery/restore_id_post.md +++ b/openapi-specs/compute/34-02/desc/recovery/restore_id_post.md @@ -5,7 +5,7 @@ Restores Prisma Cloud Compute from the given backup. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/registry/download_get.md b/openapi-specs/compute/34-02/desc/registry/download_get.md index 5a3eb0141..3eef8d50e 100644 --- a/openapi-specs/compute/34-02/desc/registry/download_get.md +++ b/openapi-specs/compute/34-02/desc/registry/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Compliance > Images > Reg Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/registry/get.md b/openapi-specs/compute/34-02/desc/registry/get.md index e8b87080e..208b2f1e3 100644 --- a/openapi-specs/compute/34-02/desc/registry/get.md +++ b/openapi-specs/compute/34-02/desc/registry/get.md @@ -21,7 +21,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that retrieves a scan report for all images in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -33,7 +33,7 @@ The compact query can be used to get a general overview of the number of Vulnera Refer to the following cURL command that retrieves a compact scan report for the Ubuntu image in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -44,7 +44,7 @@ The name query is synonymous with the filter registry text field in the Console Refer to the following cURL that retrieves the scan report for the image in the registry with the matching **sha256** hash: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -54,7 +54,7 @@ $ curl -k \ Refer to the following cURL command that retrieves the images in the first 10 registries: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/registry/get_registry_progress.md b/openapi-specs/compute/34-02/desc/registry/get_registry_progress.md index ddc319c1b..cc6feac3d 100644 --- a/openapi-specs/compute/34-02/desc/registry/get_registry_progress.md +++ b/openapi-specs/compute/34-02/desc/registry/get_registry_progress.md @@ -11,7 +11,7 @@ For a regular scan, use the API path only without any query parameters. Refer to the following example cURL request that retrieves the ongoing scan details for a regular registry scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -61,7 +61,7 @@ For an on-demand scan that is started using the `/registry/scan` endpoint with t Refer to the following example cURL request that retrieves the ongoing scan details for an on-demand registry scan that is started using the `/registry/scan` endpoint for the repository `alpine` with tag `3.16`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/registry/names_get.md b/openapi-specs/compute/34-02/desc/registry/names_get.md index 6933a570c..25afb48b8 100644 --- a/openapi-specs/compute/34-02/desc/registry/names_get.md +++ b/openapi-specs/compute/34-02/desc/registry/names_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command that retrieves a list of image names from your scanned registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/registry/scan_post.md b/openapi-specs/compute/34-02/desc/registry/scan_post.md index ce7e19533..96bfd5f16 100644 --- a/openapi-specs/compute/34-02/desc/registry/scan_post.md +++ b/openapi-specs/compute/34-02/desc/registry/scan_post.md @@ -17,7 +17,7 @@ For information on scan result, see [Get Registry Scan Report](https://prisma.pa Refer to the following example cURL command that forces Prisma Cloud Compute to rescan all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -27,7 +27,7 @@ $ curl -k \ Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan a specific image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -52,7 +52,7 @@ For information on scan result, see [Get Registry Scan Report](https://pan.dev/p Refer to the following example cURL command to trigger an on-demand scan for an image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/registry/stop_post.md b/openapi-specs/compute/34-02/desc/registry/stop_post.md index 29e103ac1..05ac2f436 100644 --- a/openapi-specs/compute/34-02/desc/registry/stop_post.md +++ b/openapi-specs/compute/34-02/desc/registry/stop_post.md @@ -5,7 +5,7 @@ Stops current registry scan immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to stop scanning all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/scans/download_get.md b/openapi-specs/compute/34-02/desc/scans/download_get.md index 61a0ccc2d..3785bf562 100644 --- a/openapi-specs/compute/34-02/desc/scans/download_get.md +++ b/openapi-specs/compute/34-02/desc/scans/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Images The following cURL command retrieves and saves your Jenkins and twistcli scan reports to a CSV file called `scans_report.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/scans/filter_get.md b/openapi-specs/compute/34-02/desc/scans/filter_get.md index 58550ad35..df3e9cdb0 100644 --- a/openapi-specs/compute/34-02/desc/scans/filter_get.md +++ b/openapi-specs/compute/34-02/desc/scans/filter_get.md @@ -3,7 +3,7 @@ Retrieves the list of Jenkins projects that have been scanned by the Jenkins plu The following example curl command uses basic auth to retrieve the list of Jenkins project names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/scans/get.md b/openapi-specs/compute/34-02/desc/scans/get.md index e28506972..107b733bd 100644 --- a/openapi-specs/compute/34-02/desc/scans/get.md +++ b/openapi-specs/compute/34-02/desc/scans/get.md @@ -11,7 +11,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command that retrieves the scan reports for all images scanned using the Jenkins CI plugin or the twistcli tool: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -23,7 +23,7 @@ To get the report of a specific scan, add query parameters to narrow the scope o The following cURL command retrieves the scan report for an image with a SHA256 ID of `sha256:f756e84300d8e53006090573dd33abe5b8cfac3e42d104fc4be37f435fe512f3`. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/scans/id_get.md b/openapi-specs/compute/34-02/desc/scans/id_get.md index 7a342ef60..1557b1905 100644 --- a/openapi-specs/compute/34-02/desc/scans/id_get.md +++ b/openapi-specs/compute/34-02/desc/scans/id_get.md @@ -3,7 +3,7 @@ Retrieves all scan reports for images scanned by the Jenkins plugin or twistcli The following example curl command uses basic auth to retrieve the scan report for just an image with a SHA256 ID of `5c3385fd2e76c5c16124c077`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/scripts/console_sh_get.md b/openapi-specs/compute/34-02/desc/scripts/console_sh_get.md index d8f02038f..1622321ca 100644 --- a/openapi-specs/compute/34-02/desc/scripts/console_sh_get.md +++ b/openapi-specs/compute/34-02/desc/scripts/console_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/scripts/defender_ps1_get.md b/openapi-specs/compute/34-02/desc/scripts/defender_ps1_get.md index a47616983..45e4a6133 100644 --- a/openapi-specs/compute/34-02/desc/scripts/defender_ps1_get.md +++ b/openapi-specs/compute/34-02/desc/scripts/defender_ps1_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/scripts/defender_sh_get.md b/openapi-specs/compute/34-02/desc/scripts/defender_sh_get.md index 98ad6cf62..a8a302426 100644 --- a/openapi-specs/compute/34-02/desc/scripts/defender_sh_get.md +++ b/openapi-specs/compute/34-02/desc/scripts/defender_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/serverless/download_get.md b/openapi-specs/compute/34-02/desc/serverless/download_get.md index a8e49ff25..4d7d3adc1 100644 --- a/openapi-specs/compute/34-02/desc/serverless/download_get.md +++ b/openapi-specs/compute/34-02/desc/serverless/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Functio The following cURL command retrieves a list of all serverless resources monitored by Prisma Cloud Compute and saves the results in a CSV file called `serverless.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/serverless/download' \ diff --git a/openapi-specs/compute/34-02/desc/serverless/embed_post.md b/openapi-specs/compute/34-02/desc/serverless/embed_post.md index 6cce784b8..353b5721c 100644 --- a/openapi-specs/compute/34-02/desc/serverless/embed_post.md +++ b/openapi-specs/compute/34-02/desc/serverless/embed_post.md @@ -1,7 +1,7 @@ The following curl command uses basic auth to retrieve a list of all Serverless resources that monitored by Prisma Cloud Compute, and save the results to a CSV file: ```bash -$ curl -k \ +$ curl \ -X POST \ -H "Content-Type: application/octet-stream" \ -u \ diff --git a/openapi-specs/compute/34-02/desc/serverless/get.md b/openapi-specs/compute/34-02/desc/serverless/get.md index aee50492f..430ee065a 100644 --- a/openapi-specs/compute/34-02/desc/serverless/get.md +++ b/openapi-specs/compute/34-02/desc/serverless/get.md @@ -11,7 +11,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Functions > Scanned function Refer to the following example cURL command that retrieves the scan reports for serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/serverless/names_get.md b/openapi-specs/compute/34-02/desc/serverless/names_get.md index 3cab17092..90285574a 100644 --- a/openapi-specs/compute/34-02/desc/serverless/names_get.md +++ b/openapi-specs/compute/34-02/desc/serverless/names_get.md @@ -5,7 +5,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo The following curl command uses basic auth to retrieve a list of names of all Serverless resources monitored by Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -X GET \ -H "Content-Type: application/json" \ -u \ diff --git a/openapi-specs/compute/34-02/desc/serverless/scan_post.md b/openapi-specs/compute/34-02/desc/serverless/scan_post.md index 159285349..70a3a3b4e 100644 --- a/openapi-specs/compute/34-02/desc/serverless/scan_post.md +++ b/openapi-specs/compute/34-02/desc/serverless/scan_post.md @@ -5,7 +5,7 @@ Re-scan all serverless functions immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/scan diff --git a/openapi-specs/compute/34-02/desc/serverless/stop_post.md b/openapi-specs/compute/34-02/desc/serverless/stop_post.md index 763710842..67c0d2239 100644 --- a/openapi-specs/compute/34-02/desc/serverless/stop_post.md +++ b/openapi-specs/compute/34-02/desc/serverless/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing serverless scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/stop diff --git a/openapi-specs/compute/34-02/desc/settings/alerts_get.md b/openapi-specs/compute/34-02/desc/settings/alerts_get.md index 060114c39..2b25dc6c9 100644 --- a/openapi-specs/compute/34-02/desc/settings/alerts_get.md +++ b/openapi-specs/compute/34-02/desc/settings/alerts_get.md @@ -1,7 +1,7 @@ Retrieves a list of your alert settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/settings/alerts_options_get.md b/openapi-specs/compute/34-02/desc/settings/alerts_options_get.md index 095c1f1b7..aa7a1d250 100644 --- a/openapi-specs/compute/34-02/desc/settings/alerts_options_get.md +++ b/openapi-specs/compute/34-02/desc/settings/alerts_options_get.md @@ -3,7 +3,7 @@ This endpoint will return the alert profile configuration options that can be fo The following example curl command uses basic auth to retrieve all alert profile configuration options: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/settings/alerts_post.md b/openapi-specs/compute/34-02/desc/settings/alerts_post.md index 3acb8d543..cd303f880 100644 --- a/openapi-specs/compute/34-02/desc/settings/alerts_post.md +++ b/openapi-specs/compute/34-02/desc/settings/alerts_post.md @@ -3,7 +3,7 @@ Configure alerts. The following example curl command sets the aggregation period for alerts to one hour. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/settings/certificates_post.md b/openapi-specs/compute/34-02/desc/settings/certificates_post.md index fbdc8a5a9..bd30ea399 100644 --- a/openapi-specs/compute/34-02/desc/settings/certificates_post.md +++ b/openapi-specs/compute/34-02/desc/settings/certificates_post.md @@ -9,7 +9,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to set the validity period for client certificates to seven days: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/34-02/desc/settings/certs_get.md b/openapi-specs/compute/34-02/desc/settings/certs_get.md index ba6674a3c..dbf1d3790 100644 --- a/openapi-specs/compute/34-02/desc/settings/certs_get.md +++ b/openapi-specs/compute/34-02/desc/settings/certs_get.md @@ -6,7 +6,7 @@ Defenders use these names to connect to Console. Refer to the following example cURL request that uses basic auth to retrieve the SANs in Console's cert: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/settings/certs_post.md b/openapi-specs/compute/34-02/desc/settings/certs_post.md index a6e429006..fb2cedee5 100644 --- a/openapi-specs/compute/34-02/desc/settings/certs_post.md +++ b/openapi-specs/compute/34-02/desc/settings/certs_post.md @@ -12,7 +12,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to add `node-01.example.com` to the `subjectAltName` field in the certificate: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/34-02/desc/settings/coderepos_get.md b/openapi-specs/compute/34-02/desc/settings/coderepos_get.md index 6cbfb78cb..286a8d905 100644 --- a/openapi-specs/compute/34-02/desc/settings/coderepos_get.md +++ b/openapi-specs/compute/34-02/desc/settings/coderepos_get.md @@ -20,7 +20,7 @@ Construct the full webhook using Console's publicly accessible DNS name or IP ad Refer to the following example cURL command that retrieves all code repositories to scan, as well as the webhook URL suffix: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/settings/console-certificates_post.md b/openapi-specs/compute/34-02/desc/settings/console-certificates_post.md index 5673af840..392061c8f 100644 --- a/openapi-specs/compute/34-02/desc/settings/console-certificates_post.md +++ b/openapi-specs/compute/34-02/desc/settings/console-certificates_post.md @@ -9,7 +9,7 @@ For the custom TLS certificate for securing browser access, this file must be in Refer to the following example cURL request that uses basic auth and configures the custom certificate to use for securing browser access to the console: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/settings/custom-labels_get.md b/openapi-specs/compute/34-02/desc/settings/custom-labels_get.md index a849dd8a8..19c1cadde 100644 --- a/openapi-specs/compute/34-02/desc/settings/custom-labels_get.md +++ b/openapi-specs/compute/34-02/desc/settings/custom-labels_get.md @@ -5,7 +5,7 @@ Returns the list of alert labels configured in Prisma Cloud Compute. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/settings/custom-labels_post.md b/openapi-specs/compute/34-02/desc/settings/custom-labels_post.md index 6bb66e706..9b0702fe8 100644 --- a/openapi-specs/compute/34-02/desc/settings/custom-labels_post.md +++ b/openapi-specs/compute/34-02/desc/settings/custom-labels_post.md @@ -5,7 +5,7 @@ Creates a custom alert label to augment audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/settings/defender_get.md b/openapi-specs/compute/34-02/desc/settings/defender_get.md index ecb8b6989..cf43bb304 100644 --- a/openapi-specs/compute/34-02/desc/settings/defender_get.md +++ b/openapi-specs/compute/34-02/desc/settings/defender_get.md @@ -5,7 +5,7 @@ Returns the advanced settings for Defenders. Refer to the following example cURL command that gets all advanced settings for Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/settings/forensic_get.md b/openapi-specs/compute/34-02/desc/settings/forensic_get.md index 9c16b70b9..3486b2bf9 100644 --- a/openapi-specs/compute/34-02/desc/settings/forensic_get.md +++ b/openapi-specs/compute/34-02/desc/settings/forensic_get.md @@ -1,7 +1,7 @@ Retrieves the settings for the forensics system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/settings/forensic_post.md b/openapi-specs/compute/34-02/desc/settings/forensic_post.md index 31f809d39..8943842fb 100644 --- a/openapi-specs/compute/34-02/desc/settings/forensic_post.md +++ b/openapi-specs/compute/34-02/desc/settings/forensic_post.md @@ -3,7 +3,7 @@ Configures the forensics system. The following example curl command allocates 100 MB of local disk space for container forensic data and 10 MB for host forensics data. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/settings/initialized_get.md b/openapi-specs/compute/34-02/desc/settings/initialized_get.md index 3134912d1..2af8462f1 100644 --- a/openapi-specs/compute/34-02/desc/settings/initialized_get.md +++ b/openapi-specs/compute/34-02/desc/settings/initialized_get.md @@ -4,7 +4,7 @@ After first installing Console, the first thing you must do is create an admin a Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/settings/intelligence-windows_post.md b/openapi-specs/compute/34-02/desc/settings/intelligence-windows_post.md index c39e256d2..0721dab3b 100644 --- a/openapi-specs/compute/34-02/desc/settings/intelligence-windows_post.md +++ b/openapi-specs/compute/34-02/desc/settings/intelligence-windows_post.md @@ -3,7 +3,7 @@ This endpoint will enable or disable the Windows Intelligence Service from **Man The following example curl command uses basic auth to enable online updates of Windows vulnerabilities from the intelligence stream: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/settings/intelligence_get.md b/openapi-specs/compute/34-02/desc/settings/intelligence_get.md index 26c694246..15e9f24ae 100644 --- a/openapi-specs/compute/34-02/desc/settings/intelligence_get.md +++ b/openapi-specs/compute/34-02/desc/settings/intelligence_get.md @@ -5,7 +5,7 @@ Returns the details about the Intelligence Stream configuration. Refer to the following example cURL command that uses basic auth to retrieve your Intelligence Stream configuration settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/settings/intelligence_post.md b/openapi-specs/compute/34-02/desc/settings/intelligence_post.md index 74b06a3a0..2dbbd0168 100644 --- a/openapi-specs/compute/34-02/desc/settings/intelligence_post.md +++ b/openapi-specs/compute/34-02/desc/settings/intelligence_post.md @@ -7,7 +7,7 @@ For more information, see [Intelligence Stream](https://docs.paloaltonetworks.co Refer to the following example cURL command that uses basic auth to configure settings of your Intelligence Stream. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/settings/latest-version_get.md b/openapi-specs/compute/34-02/desc/settings/latest-version_get.md index c443fa7b5..16601fb5b 100644 --- a/openapi-specs/compute/34-02/desc/settings/latest-version_get.md +++ b/openapi-specs/compute/34-02/desc/settings/latest-version_get.md @@ -3,7 +3,7 @@ Retrieves the version number of the latest available Prisma Cloud Compute releas Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/settings/latest_version_get.md b/openapi-specs/compute/34-02/desc/settings/latest_version_get.md index 18e436668..5c64edff1 100644 --- a/openapi-specs/compute/34-02/desc/settings/latest_version_get.md +++ b/openapi-specs/compute/34-02/desc/settings/latest_version_get.md @@ -1,7 +1,7 @@ This endpoint will return the latest version of the product. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/settings/ldap_get.md b/openapi-specs/compute/34-02/desc/settings/ldap_get.md index 4ad0ad0c9..7d803ba1c 100644 --- a/openapi-specs/compute/34-02/desc/settings/ldap_get.md +++ b/openapi-specs/compute/34-02/desc/settings/ldap_get.md @@ -5,7 +5,7 @@ Returns the LDAP integration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/settings/ldap_post.md b/openapi-specs/compute/34-02/desc/settings/ldap_post.md index c152c7dc5..34bc06ef4 100644 --- a/openapi-specs/compute/34-02/desc/settings/ldap_post.md +++ b/openapi-specs/compute/34-02/desc/settings/ldap_post.md @@ -7,7 +7,7 @@ For more information, see [Active Directory](https://docs.paloaltonetworks.com/p Refer to the following example cURL command that enables the LDAP integration and specifies the parameters required to integrate with an Active Directory service. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/settings/license_get.md b/openapi-specs/compute/34-02/desc/settings/license_get.md index 5c792cae8..2b4b548e3 100644 --- a/openapi-specs/compute/34-02/desc/settings/license_get.md +++ b/openapi-specs/compute/34-02/desc/settings/license_get.md @@ -5,7 +5,7 @@ Returns the details about the installed license. Refer to the following example cURL request that retrieves the license details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/settings/license_post.md b/openapi-specs/compute/34-02/desc/settings/license_post.md index b77800a5f..ce74b0d0f 100644 --- a/openapi-specs/compute/34-02/desc/settings/license_post.md +++ b/openapi-specs/compute/34-02/desc/settings/license_post.md @@ -8,7 +8,7 @@ For more information, see [Licensing](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to set your license: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/settings/logging_get.md b/openapi-specs/compute/34-02/desc/settings/logging_get.md index 6eda3e484..012be5def 100644 --- a/openapi-specs/compute/34-02/desc/settings/logging_get.md +++ b/openapi-specs/compute/34-02/desc/settings/logging_get.md @@ -5,7 +5,7 @@ Returns the logging settings. Refer to the following example cURL request that uses basic auth to retrieve your logging details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/settings/logging_post.md b/openapi-specs/compute/34-02/desc/settings/logging_post.md index 3619d9c0f..8d27ee1b3 100644 --- a/openapi-specs/compute/34-02/desc/settings/logging_post.md +++ b/openapi-specs/compute/34-02/desc/settings/logging_post.md @@ -8,7 +8,7 @@ For more information, see [Logging](https://docs.paloaltonetworks.com/prisma/pri Refer to the following example cURL request that enables verbose scan output for syslog and stdout: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/settings/logon_get.md b/openapi-specs/compute/34-02/desc/settings/logon_get.md index 1559f2405..b1e9164f2 100644 --- a/openapi-specs/compute/34-02/desc/settings/logon_get.md +++ b/openapi-specs/compute/34-02/desc/settings/logon_get.md @@ -5,7 +5,7 @@ Configures the logon settings. Refer to the following example cURL request that uses basic auth to retrieve all current logon settings. ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/settings/logon_post.md b/openapi-specs/compute/34-02/desc/settings/logon_post.md index 5c2b60c9f..691e082fe 100644 --- a/openapi-specs/compute/34-02/desc/settings/logon_post.md +++ b/openapi-specs/compute/34-02/desc/settings/logon_post.md @@ -7,7 +7,7 @@ For more information, see [Logon Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that uses basic auth to set the timeout to 900 seconds (15 minutes): ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/34-02/desc/settings/oauth_get.md b/openapi-specs/compute/34-02/desc/settings/oauth_get.md index 6dcf70fb5..5d997f016 100644 --- a/openapi-specs/compute/34-02/desc/settings/oauth_get.md +++ b/openapi-specs/compute/34-02/desc/settings/oauth_get.md @@ -5,7 +5,7 @@ Returns the OAuth configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/settings/oauth_post.md b/openapi-specs/compute/34-02/desc/settings/oauth_post.md index c593b9237..da3c83d2f 100644 --- a/openapi-specs/compute/34-02/desc/settings/oauth_post.md +++ b/openapi-specs/compute/34-02/desc/settings/oauth_post.md @@ -7,7 +7,7 @@ For more information, see [GitHub OAuth](https://docs.paloaltonetworks.com/prism Refer to the following example cURL response: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/settings/oidc_get.md b/openapi-specs/compute/34-02/desc/settings/oidc_get.md index ee439622b..1f27f93ba 100644 --- a/openapi-specs/compute/34-02/desc/settings/oidc_get.md +++ b/openapi-specs/compute/34-02/desc/settings/oidc_get.md @@ -5,7 +5,7 @@ Returns the OpenID Connect configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/settings/oidc_post.md b/openapi-specs/compute/34-02/desc/settings/oidc_post.md index e0270247e..5bd3a9192 100644 --- a/openapi-specs/compute/34-02/desc/settings/oidc_post.md +++ b/openapi-specs/compute/34-02/desc/settings/oidc_post.md @@ -7,7 +7,7 @@ For more information, see [OIDC](https://docs.paloaltonetworks.com/prisma/prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/settings/pcf_get.md b/openapi-specs/compute/34-02/desc/settings/pcf_get.md index 5dc21eb17..c5e42a823 100644 --- a/openapi-specs/compute/34-02/desc/settings/pcf_get.md +++ b/openapi-specs/compute/34-02/desc/settings/pcf_get.md @@ -3,7 +3,7 @@ This endpoint will return settings for PCF (Pivotal Cloud Foundry)Blobstore scan The following example curl command uses basic auth to retrieve the current PCF Blobstore scanning settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/settings/pcf_post.md b/openapi-specs/compute/34-02/desc/settings/pcf_post.md index 139e947cb..657e14f27 100644 --- a/openapi-specs/compute/34-02/desc/settings/pcf_post.md +++ b/openapi-specs/compute/34-02/desc/settings/pcf_post.md @@ -3,7 +3,7 @@ This endpoint will allow for updating settings for PCF (Pivotal Cloud Foundry) B The following example curl command uses basic auth to set up a PCF Blobstore scanner that scans the last `5` droplets for every droplet in the PCF Blobstore: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/settings/projects_get.md b/openapi-specs/compute/34-02/desc/settings/projects_get.md index f5dd20395..bc95414a1 100644 --- a/openapi-specs/compute/34-02/desc/settings/projects_get.md +++ b/openapi-specs/compute/34-02/desc/settings/projects_get.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command retrieves the state of the Projects feature from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ All API calls must be proxied through Central Console, where the request is auto To retrieve the Projects settings from a supervisor Console, append the `project` query parameter to your request. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/settings/projects_post.md b/openapi-specs/compute/34-02/desc/settings/projects_post.md index d29f8e9d5..b3472e6b9 100644 --- a/openapi-specs/compute/34-02/desc/settings/projects_post.md +++ b/openapi-specs/compute/34-02/desc/settings/projects_post.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command designates `` as master. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/settings/proxy_get.md b/openapi-specs/compute/34-02/desc/settings/proxy_get.md index 9a4922d59..477563069 100644 --- a/openapi-specs/compute/34-02/desc/settings/proxy_get.md +++ b/openapi-specs/compute/34-02/desc/settings/proxy_get.md @@ -5,7 +5,7 @@ Returns the proxy settings for Prisma Cloud Compute containers to access the Int Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/settings/proxy_post.md b/openapi-specs/compute/34-02/desc/settings/proxy_post.md index a1bdc07ed..df926524e 100644 --- a/openapi-specs/compute/34-02/desc/settings/proxy_post.md +++ b/openapi-specs/compute/34-02/desc/settings/proxy_post.md @@ -7,7 +7,7 @@ For more information, see [Proxy Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that specifies the proxy to use to access the Internet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/settings/registry_get.md b/openapi-specs/compute/34-02/desc/settings/registry_get.md index 12745005d..64e70b698 100644 --- a/openapi-specs/compute/34-02/desc/settings/registry_get.md +++ b/openapi-specs/compute/34-02/desc/settings/registry_get.md @@ -17,7 +17,7 @@ Construct the full webhook using the publicly accessible DNS name or IP address, The following cURL command retrieves all the registries to scan and the URL suffix for the registry's webhook URL suffix. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/settings/registry_post.md b/openapi-specs/compute/34-02/desc/settings/registry_post.md index efabf4e67..decf80a65 100644 --- a/openapi-specs/compute/34-02/desc/settings/registry_post.md +++ b/openapi-specs/compute/34-02/desc/settings/registry_post.md @@ -30,7 +30,7 @@ The API response returns an HTTP 400 error if the number of registry specificati Refer to the following example cURL command that configures Prisma Cloud Compute to scan the Ubuntu 16.04 repository on Docker Hub: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -64,7 +64,7 @@ To add settings for a GitLab Container Registry, you must specify the following Refer to the following example cURL command: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/settings/registry_put.md b/openapi-specs/compute/34-02/desc/settings/registry_put.md index 3768914f6..75d6c79a2 100644 --- a/openapi-specs/compute/34-02/desc/settings/registry_put.md +++ b/openapi-specs/compute/34-02/desc/settings/registry_put.md @@ -127,7 +127,7 @@ To remove a registry from the list: To delete all entries, submit an empty `specifications` array. For example: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-02/desc/settings/saml_get.md b/openapi-specs/compute/34-02/desc/settings/saml_get.md index f2228a440..4fb940e80 100644 --- a/openapi-specs/compute/34-02/desc/settings/saml_get.md +++ b/openapi-specs/compute/34-02/desc/settings/saml_get.md @@ -5,7 +5,7 @@ Returns the configured SAML settings that is used to authenticate to the Prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/settings/saml_post.md b/openapi-specs/compute/34-02/desc/settings/saml_post.md index 0bd9c4a25..dfe8d380f 100644 --- a/openapi-specs/compute/34-02/desc/settings/saml_post.md +++ b/openapi-specs/compute/34-02/desc/settings/saml_post.md @@ -7,7 +7,7 @@ For more information, see [Okta via SAML 2.0](https://docs.paloaltonetworks.com/ Refer to the following example cURL request that uses the basic auth to set up and enable the SAML integration with Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/settings/scan_get.md b/openapi-specs/compute/34-02/desc/settings/scan_get.md index 5c1df30a2..543ea7662 100644 --- a/openapi-specs/compute/34-02/desc/settings/scan_get.md +++ b/openapi-specs/compute/34-02/desc/settings/scan_get.md @@ -5,7 +5,7 @@ Returns the global settings for image, host, container, and registry scanning. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/settings/scan_post.md b/openapi-specs/compute/34-02/desc/settings/scan_post.md index f043d1c9f..9ddb521a2 100644 --- a/openapi-specs/compute/34-02/desc/settings/scan_post.md +++ b/openapi-specs/compute/34-02/desc/settings/scan_post.md @@ -9,7 +9,7 @@ Refer to the following example cURL request that configures the following scan i * Scan images, containers, and hosts once per day. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/settings/secrets_get.md b/openapi-specs/compute/34-02/desc/settings/secrets_get.md index 75e2b32c7..339009641 100644 --- a/openapi-specs/compute/34-02/desc/settings/secrets_get.md +++ b/openapi-specs/compute/34-02/desc/settings/secrets_get.md @@ -3,7 +3,7 @@ This endpoint will return configured secret store already configured in the cons The following example curl command retrieves any configured secret stores, as well as the refresh period in hours: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/settings/secrets_post.md b/openapi-specs/compute/34-02/desc/settings/secrets_post.md index d302ecdf8..730d031bf 100644 --- a/openapi-specs/compute/34-02/desc/settings/secrets_post.md +++ b/openapi-specs/compute/34-02/desc/settings/secrets_post.md @@ -5,7 +5,7 @@ Please note the data structure returned from endpoint /settings/secrets GET to s Refer to the following example curl command that adds a CyberArk secret store to the console with the appID set to `Prisma_Cloud_Compute_Console` and set the URL to `https://services-myca.twistlock.com:10882`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/settings/serverless-scan_get.md b/openapi-specs/compute/34-02/desc/settings/serverless-scan_get.md index bb8ce06ba..eb42e4a12 100644 --- a/openapi-specs/compute/34-02/desc/settings/serverless-scan_get.md +++ b/openapi-specs/compute/34-02/desc/settings/serverless-scan_get.md @@ -8,7 +8,7 @@ This endpoint maps to the **Function scope** table data in the **Defend > Vulner Refer to the following example cURL command that retrieves a list of serverless scan scopes: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/settings/serverless_get.md b/openapi-specs/compute/34-02/desc/settings/serverless_get.md index b6122c460..8c654807c 100644 --- a/openapi-specs/compute/34-02/desc/settings/serverless_get.md +++ b/openapi-specs/compute/34-02/desc/settings/serverless_get.md @@ -3,7 +3,7 @@ This endpoint will return any configured serverless function scanners found in * The following example curl command uses basic auth to retrieve serverless settings in an array, sorted by Cloud Provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/settings/serverless_post.md b/openapi-specs/compute/34-02/desc/settings/serverless_post.md index 6e26ea1d3..c0e0f3225 100644 --- a/openapi-specs/compute/34-02/desc/settings/serverless_post.md +++ b/openapi-specs/compute/34-02/desc/settings/serverless_post.md @@ -3,7 +3,7 @@ This endpoint will add serverless function providers to scan for vulnerabilities The following example curl command uses basic auth to add a serverless account to scan for serverless functions. This is assuming that you already have the [credential](https://docs.twistlock.com/docs/latest/configure/credentials_store.html) added to the console that is needed to scan that provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/settings/system_get.md b/openapi-specs/compute/34-02/desc/settings/system_get.md index 6f893abf0..0e8a3cba3 100644 --- a/openapi-specs/compute/34-02/desc/settings/system_get.md +++ b/openapi-specs/compute/34-02/desc/settings/system_get.md @@ -3,7 +3,7 @@ This endpoint will return all system settings in JSON format. The following example curl command does exactly that: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/settings/tas_get.md b/openapi-specs/compute/34-02/desc/settings/tas_get.md index 52f392433..d2d0017f0 100644 --- a/openapi-specs/compute/34-02/desc/settings/tas_get.md +++ b/openapi-specs/compute/34-02/desc/settings/tas_get.md @@ -5,7 +5,7 @@ Retrieves Tanzu Application Service (TAS) settings. Refer to the following example cURL command that retrieves all TAS settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/settings/telemetry_get.md b/openapi-specs/compute/34-02/desc/settings/telemetry_get.md index 6460c3fc3..46a807e77 100644 --- a/openapi-specs/compute/34-02/desc/settings/telemetry_get.md +++ b/openapi-specs/compute/34-02/desc/settings/telemetry_get.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that retrieves the settings if telemetry is enabled or not: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/settings/telemetry_post.md b/openapi-specs/compute/34-02/desc/settings/telemetry_post.md index bc97a6d0f..662846f33 100644 --- a/openapi-specs/compute/34-02/desc/settings/telemetry_post.md +++ b/openapi-specs/compute/34-02/desc/settings/telemetry_post.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to turn off telemetry: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/settings/trusted_certificate_post.md b/openapi-specs/compute/34-02/desc/settings/trusted_certificate_post.md index 5a2a30bda..c54b96fa5 100644 --- a/openapi-specs/compute/34-02/desc/settings/trusted_certificate_post.md +++ b/openapi-specs/compute/34-02/desc/settings/trusted_certificate_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/trusted-certificates` endpoint. Refer to the following example cURL request that uses basic auth to add a certificate to the list: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/34-02/desc/settings/trusted_certificates_post.md b/openapi-specs/compute/34-02/desc/settings/trusted_certificates_post.md index 78c07982b..e9bdc72a1 100644 --- a/openapi-specs/compute/34-02/desc/settings/trusted_certificates_post.md +++ b/openapi-specs/compute/34-02/desc/settings/trusted_certificates_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/certificates` endpoint. Refer to the following example cURL request that uses basic auth to enable this feature: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/34-02/desc/settings/vm_get.md b/openapi-specs/compute/34-02/desc/settings/vm_get.md index 8043742f5..b98b94240 100644 --- a/openapi-specs/compute/34-02/desc/settings/vm_get.md +++ b/openapi-specs/compute/34-02/desc/settings/vm_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **VM images scope** table data in the **Defend > Vulne Refer to the following example cURL command that retrieves all the scopes used for pattern matching on VM functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/signup/post.md b/openapi-specs/compute/34-02/desc/signup/post.md index 1db21df29..67344a0b1 100644 --- a/openapi-specs/compute/34-02/desc/signup/post.md +++ b/openapi-specs/compute/34-02/desc/signup/post.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i The following cURL command creates the initial admin user with the username `admin` and password `password`. ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -X POST \ -d '{"username": "admin", "password": "password"}' \ diff --git a/openapi-specs/compute/34-02/desc/static/capabilities_get.md b/openapi-specs/compute/34-02/desc/static/capabilities_get.md index ea119d2a9..f9b60278c 100644 --- a/openapi-specs/compute/34-02/desc/static/capabilities_get.md +++ b/openapi-specs/compute/34-02/desc/static/capabilities_get.md @@ -1,7 +1,7 @@ Returns a list of capabilities used in host models. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/static/regions_get.md b/openapi-specs/compute/34-02/desc/static/regions_get.md index 4a07097ee..3b1adb5f1 100644 --- a/openapi-specs/compute/34-02/desc/static/regions_get.md +++ b/openapi-specs/compute/34-02/desc/static/regions_get.md @@ -1,7 +1,7 @@ Returns a list of regions used in cloud radar. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/static/syscalls_get.md b/openapi-specs/compute/34-02/desc/static/syscalls_get.md index 9e2ddcde7..09505ba39 100644 --- a/openapi-specs/compute/34-02/desc/static/syscalls_get.md +++ b/openapi-specs/compute/34-02/desc/static/syscalls_get.md @@ -2,7 +2,7 @@ Returns a list of the Linux kernel system calls. Runtime rules for containers can allow-list and deny-list specific system calls. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/static/vulnerabilities_get.md b/openapi-specs/compute/34-02/desc/static/vulnerabilities_get.md index cb6acab28..19809472b 100644 --- a/openapi-specs/compute/34-02/desc/static/vulnerabilities_get.md +++ b/openapi-specs/compute/34-02/desc/static/vulnerabilities_get.md @@ -3,7 +3,7 @@ This data can be used for building out reports with the API. This data can be correlated with the `/api/v1/images` endpoint, specifically the the `complianceVulnerabilities` and `cveVulnerabilities` objects, to generate more thorough reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/stats/compliance.md b/openapi-specs/compute/34-02/desc/stats/compliance.md index 5c5be3991..4f4c90071 100644 --- a/openapi-specs/compute/34-02/desc/stats/compliance.md +++ b/openapi-specs/compute/34-02/desc/stats/compliance.md @@ -5,7 +5,7 @@ For the current day, the response will also include detailed compliance stats fo The following example command that uses curl and basic auth to retrieve compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/stats/compliance_get.md b/openapi-specs/compute/34-02/desc/stats/compliance_get.md index 314f6a179..2ef2f9f75 100644 --- a/openapi-specs/compute/34-02/desc/stats/compliance_get.md +++ b/openapi-specs/compute/34-02/desc/stats/compliance_get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Compliance > Compliance explorer* Refer to the following example cURL command that retrieves compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/stats/compliance_refresh.md b/openapi-specs/compute/34-02/desc/stats/compliance_refresh.md index b75491a69..d8ce211a8 100644 --- a/openapi-specs/compute/34-02/desc/stats/compliance_refresh.md +++ b/openapi-specs/compute/34-02/desc/stats/compliance_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/compliance endpoint return The following example command that uses curl and basic auth to refresh compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/stats/compliance_refresh_post.md b/openapi-specs/compute/34-02/desc/stats/compliance_refresh_post.md index 541a54d16..0f329d1db 100644 --- a/openapi-specs/compute/34-02/desc/stats/compliance_refresh_post.md +++ b/openapi-specs/compute/34-02/desc/stats/compliance_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/compliance`, b Refer to the following example cURL command that refreshes compliance statistics for the current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/stats/daily.md b/openapi-specs/compute/34-02/desc/stats/daily.md index 082f58a27..9fd4c6138 100644 --- a/openapi-specs/compute/34-02/desc/stats/daily.md +++ b/openapi-specs/compute/34-02/desc/stats/daily.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/stats/daily_get.md b/openapi-specs/compute/34-02/desc/stats/daily_get.md index 0db89bdc3..fe852126c 100644 --- a/openapi-specs/compute/34-02/desc/stats/daily_get.md +++ b/openapi-specs/compute/34-02/desc/stats/daily_get.md @@ -3,7 +3,7 @@ Returns a historical list of per-day statistics for the resources protected by P The following example command uses curl and basic auth to retrieve the daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/stats/dashboard.md b/openapi-specs/compute/34-02/desc/stats/dashboard.md index be90a2d32..1e5fabf08 100644 --- a/openapi-specs/compute/34-02/desc/stats/dashboard.md +++ b/openapi-specs/compute/34-02/desc/stats/dashboard.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/stats/dashboard_get.md b/openapi-specs/compute/34-02/desc/stats/dashboard_get.md index 601769645..8f0bc827c 100644 --- a/openapi-specs/compute/34-02/desc/stats/dashboard_get.md +++ b/openapi-specs/compute/34-02/desc/stats/dashboard_get.md @@ -5,7 +5,7 @@ Returns statistics about the resources protected by Prisma Cloud Compute, includ Refer to the following example cURL command that retrieves dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/stats/events_get.md b/openapi-specs/compute/34-02/desc/stats/events_get.md index 3be5eb4e7..e64f98e57 100644 --- a/openapi-specs/compute/34-02/desc/stats/events_get.md +++ b/openapi-specs/compute/34-02/desc/stats/events_get.md @@ -5,7 +5,7 @@ Returns events statistics for your environment. Refer to the following example cURL command retrieves event stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/stats/vulnerabilities.md b/openapi-specs/compute/34-02/desc/stats/vulnerabilities.md index 40c4dd1f1..199cfab62 100644 --- a/openapi-specs/compute/34-02/desc/stats/vulnerabilities.md +++ b/openapi-specs/compute/34-02/desc/stats/vulnerabilities.md @@ -5,7 +5,7 @@ For the current day, the response will also include descriptions of the CVEs cur The following example command that uses curl and basic auth to retrieve vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/stats/vulnerabilities_download_get.md b/openapi-specs/compute/34-02/desc/stats/vulnerabilities_download_get.md index 753af8c7f..9930a636b 100644 --- a/openapi-specs/compute/34-02/desc/stats/vulnerabilities_download_get.md +++ b/openapi-specs/compute/34-02/desc/stats/vulnerabilities_download_get.md @@ -17,7 +17,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a summary count of the CVEs and detailed descriptions for each CVE in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/stats/vulnerabilities_get.md b/openapi-specs/compute/34-02/desc/stats/vulnerabilities_get.md index 2fe5d4e18..978e96cfe 100644 --- a/openapi-specs/compute/34-02/desc/stats/vulnerabilities_get.md +++ b/openapi-specs/compute/34-02/desc/stats/vulnerabilities_get.md @@ -20,7 +20,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a summary count of the CVEs and detailed descriptions for each CVE: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/stats/vulnerabilities_impacted_resources_download_get.md b/openapi-specs/compute/34-02/desc/stats/vulnerabilities_impacted_resources_download_get.md index 0821d6a9f..502c09a6c 100644 --- a/openapi-specs/compute/34-02/desc/stats/vulnerabilities_impacted_resources_download_get.md +++ b/openapi-specs/compute/34-02/desc/stats/vulnerabilities_impacted_resources_download_get.md @@ -15,7 +15,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a list of impacted resources for `CVE-2015-0313` in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/stats/vulnerabilities_impacted_resources_get.md b/openapi-specs/compute/34-02/desc/stats/vulnerabilities_impacted_resources_get.md index c1e6d0ba2..014a5f4a2 100644 --- a/openapi-specs/compute/34-02/desc/stats/vulnerabilities_impacted_resources_get.md +++ b/openapi-specs/compute/34-02/desc/stats/vulnerabilities_impacted_resources_get.md @@ -18,7 +18,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a list of impacted resources for `CVE-2022-28391`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -95,7 +95,7 @@ Refer to the following example JSON response that shows the risk tree for the im Refer to the following example cURL command that retrieves a the impacted registry images `CVE-2015-0313` by using an optional query parameter `resourceType`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -108,7 +108,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a paginated list of impacted resources for `CVE-2015-0313` by using optional query parameters `limit` and `offset`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/stats/vulnerabilities_refresh.md b/openapi-specs/compute/34-02/desc/stats/vulnerabilities_refresh.md index 505a99d98..2aa7da8a1 100644 --- a/openapi-specs/compute/34-02/desc/stats/vulnerabilities_refresh.md +++ b/openapi-specs/compute/34-02/desc/stats/vulnerabilities_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/vulnerabilities endpoint r The following example command that uses curl and basic auth to refresh vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/stats/vulnerabilities_refresh_post.md b/openapi-specs/compute/34-02/desc/stats/vulnerabilities_refresh_post.md index 1e3210e18..85e3ddd7a 100644 --- a/openapi-specs/compute/34-02/desc/stats/vulnerabilities_refresh_post.md +++ b/openapi-specs/compute/34-02/desc/stats/vulnerabilities_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/vulnerabilitie Refer to the following example cURL command that refreshes the vulnerability statistics for current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/stats/workload_get.md b/openapi-specs/compute/34-02/desc/stats/workload_get.md index a25deed5c..940a835ee 100644 --- a/openapi-specs/compute/34-02/desc/stats/workload_get.md +++ b/openapi-specs/compute/34-02/desc/stats/workload_get.md @@ -1,7 +1,7 @@ Returns the workload statistics from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/statuses/intelligence.md b/openapi-specs/compute/34-02/desc/statuses/intelligence.md index 74da8c7ff..ac102e81f 100644 --- a/openapi-specs/compute/34-02/desc/statuses/intelligence.md +++ b/openapi-specs/compute/34-02/desc/statuses/intelligence.md @@ -3,7 +3,7 @@ Returns the connection status of the intelligence stream and the last intelligen The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/statuses/intelligence_get.md b/openapi-specs/compute/34-02/desc/statuses/intelligence_get.md index c18dd9611..b5f620ad9 100644 --- a/openapi-specs/compute/34-02/desc/statuses/intelligence_get.md +++ b/openapi-specs/compute/34-02/desc/statuses/intelligence_get.md @@ -3,7 +3,7 @@ Returns the connection status for the Intelligence Stream, along with the time o The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/statuses/registry_get.md b/openapi-specs/compute/34-02/desc/statuses/registry_get.md index 427c4915c..e4fd09fe9 100644 --- a/openapi-specs/compute/34-02/desc/statuses/registry_get.md +++ b/openapi-specs/compute/34-02/desc/statuses/registry_get.md @@ -13,7 +13,7 @@ To view the more details about the progress of a regular or on-demand registry s Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/statuses/secrets_get.md b/openapi-specs/compute/34-02/desc/statuses/secrets_get.md index 510f15161..e77c5ed70 100644 --- a/openapi-specs/compute/34-02/desc/statuses/secrets_get.md +++ b/openapi-specs/compute/34-02/desc/statuses/secrets_get.md @@ -3,7 +3,7 @@ Returns the connection status of any secret stores you have configured, as well The following is an example curl using basic auth to find the secret store status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/statuses/serverless-radar_get.md b/openapi-specs/compute/34-02/desc/statuses/serverless-radar_get.md index 3bfdbb5bf..4ab5d0c1d 100644 --- a/openapi-specs/compute/34-02/desc/statuses/serverless-radar_get.md +++ b/openapi-specs/compute/34-02/desc/statuses/serverless-radar_get.md @@ -1,7 +1,7 @@ Returns the status of the serverless scans. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/tags/get.md b/openapi-specs/compute/34-02/desc/tags/get.md index 6da7ad135..604eee98e 100644 --- a/openapi-specs/compute/34-02/desc/tags/get.md +++ b/openapi-specs/compute/34-02/desc/tags/get.md @@ -5,7 +5,7 @@ Retrieves a list of tags. Refer to the following example cURL command that retrieves a list of tags: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/tags/name_delete.md b/openapi-specs/compute/34-02/desc/tags/name_delete.md index 2ed010e57..6dedfce8f 100644 --- a/openapi-specs/compute/34-02/desc/tags/name_delete.md +++ b/openapi-specs/compute/34-02/desc/tags/name_delete.md @@ -5,7 +5,7 @@ Deletes a tag from the system. Refer to the following example cURL command that deletes a tag named *my tag*: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-02/desc/tags/name_put.md b/openapi-specs/compute/34-02/desc/tags/name_put.md index cbaea40d3..a5923b8ef 100644 --- a/openapi-specs/compute/34-02/desc/tags/name_put.md +++ b/openapi-specs/compute/34-02/desc/tags/name_put.md @@ -9,7 +9,7 @@ You must define all parameters in your PUT request. Refer to the following example cURL command that updates the parameters in a tag named `my_tag`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-02/desc/tags/post.md b/openapi-specs/compute/34-02/desc/tags/post.md index d55ae8b96..8e1a493d6 100644 --- a/openapi-specs/compute/34-02/desc/tags/post.md +++ b/openapi-specs/compute/34-02/desc/tags/post.md @@ -8,7 +8,7 @@ You can use tags as policy exceptions or assign them to vulnerabilities for acti Refer to the following example cURL command that creates a tag named "my-tag": ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/tags/tag_cve_delete.md b/openapi-specs/compute/34-02/desc/tags/tag_cve_delete.md index 8caed79cf..3031029b9 100644 --- a/openapi-specs/compute/34-02/desc/tags/tag_cve_delete.md +++ b/openapi-specs/compute/34-02/desc/tags/tag_cve_delete.md @@ -6,7 +6,7 @@ When you delete a tag, the tag is deleted from a wider scope. All the packages a Refer to the following example cURL command that removes the tag named `ignored` from the CVE `CVE-2017-15088`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-02/desc/tags/tag_cve_post.md b/openapi-specs/compute/34-02/desc/tags/tag_cve_post.md index 966a80bd8..1b4ead89b 100644 --- a/openapi-specs/compute/34-02/desc/tags/tag_cve_post.md +++ b/openapi-specs/compute/34-02/desc/tags/tag_cve_post.md @@ -45,7 +45,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the source package `perl`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -72,7 +72,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2021-20305` on the binary package `gnutls`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -98,7 +98,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -120,7 +120,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `image` and to all the packages and resources. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -140,7 +140,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `host`, resource `servo-vmware71`, and to all the packages. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/tas-droplets/download_get.md b/openapi-specs/compute/34-02/desc/tas-droplets/download_get.md index db92ec66a..7fdd6e259 100644 --- a/openapi-specs/compute/34-02/desc/tas-droplets/download_get.md +++ b/openapi-specs/compute/34-02/desc/tas-droplets/download_get.md @@ -9,7 +9,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo The following cURL command downloads all TAS droplets to a CSV file called `tas_droplets.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/tas-droplets/get.md b/openapi-specs/compute/34-02/desc/tas-droplets/get.md index d820517c2..ce07f8527 100644 --- a/openapi-specs/compute/34-02/desc/tas-droplets/get.md +++ b/openapi-specs/compute/34-02/desc/tas-droplets/get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > VMware Tanzu bl The following cURL command retrieves all TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/tas-droplets/get_tas_addresses.md b/openapi-specs/compute/34-02/desc/tas-droplets/get_tas_addresses.md index 528281613..8333cd24f 100644 --- a/openapi-specs/compute/34-02/desc/tas-droplets/get_tas_addresses.md +++ b/openapi-specs/compute/34-02/desc/tas-droplets/get_tas_addresses.md @@ -9,7 +9,7 @@ Gets the Cloud Controller Addresses of scanned Tanzu Application Service (TAS) d The following cURL command retrieves the Cloud Controller Addresses of scanned TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/tas-droplets/progress_get.md b/openapi-specs/compute/34-02/desc/tas-droplets/progress_get.md index 504a21e84..507d001bf 100644 --- a/openapi-specs/compute/34-02/desc/tas-droplets/progress_get.md +++ b/openapi-specs/compute/34-02/desc/tas-droplets/progress_get.md @@ -5,7 +5,7 @@ Returns the details of the TAS Droplets ongoing scan. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/tas-droplets/scan_post.md b/openapi-specs/compute/34-02/desc/tas-droplets/scan_post.md index aad2174af..13c4eeeb9 100644 --- a/openapi-specs/compute/34-02/desc/tas-droplets/scan_post.md +++ b/openapi-specs/compute/34-02/desc/tas-droplets/scan_post.md @@ -5,7 +5,7 @@ Scans the TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/tas-droplets/stop_post.md b/openapi-specs/compute/34-02/desc/tas-droplets/stop_post.md index 5f5a019b1..53d709ec7 100644 --- a/openapi-specs/compute/34-02/desc/tas-droplets/stop_post.md +++ b/openapi-specs/compute/34-02/desc/tas-droplets/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing scan of TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/trust/data_get.md b/openapi-specs/compute/34-02/desc/trust/data_get.md index dd55d47a3..88983f139 100644 --- a/openapi-specs/compute/34-02/desc/trust/data_get.md +++ b/openapi-specs/compute/34-02/desc/trust/data_get.md @@ -5,7 +5,7 @@ Returns the trusted registries, repositories, and images. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/trust/data_put.md b/openapi-specs/compute/34-02/desc/trust/data_put.md index 0e6a0ba49..733514505 100644 --- a/openapi-specs/compute/34-02/desc/trust/data_put.md +++ b/openapi-specs/compute/34-02/desc/trust/data_put.md @@ -6,7 +6,7 @@ Specify trusted images using either the image name or layers properties. Refer to the following example cURL command that uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -19,7 +19,7 @@ To edit a trust group based on image base layers, use PUT to specify a list of S Refer to the following example that specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-02/desc/trust/get.md b/openapi-specs/compute/34-02/desc/trust/get.md index 1226cd0a3..57ff5bdb5 100644 --- a/openapi-specs/compute/34-02/desc/trust/get.md +++ b/openapi-specs/compute/34-02/desc/trust/get.md @@ -3,7 +3,7 @@ Retrieves a list of all trusted images. The following example curl command uses basic auth to retrieve all trusted images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/trust/id_delete.md b/openapi-specs/compute/34-02/desc/trust/id_delete.md index b3114775f..d63cdf71a 100644 --- a/openapi-specs/compute/34-02/desc/trust/id_delete.md +++ b/openapi-specs/compute/34-02/desc/trust/id_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to specify a image trust grou ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-02/desc/trust/id_put.md b/openapi-specs/compute/34-02/desc/trust/id_put.md index 44d2c8b8b..c98617bcd 100644 --- a/openapi-specs/compute/34-02/desc/trust/id_put.md +++ b/openapi-specs/compute/34-02/desc/trust/id_put.md @@ -9,7 +9,7 @@ For more information about handles, see the `_id` in the response body for the G The following example curl command uses basic auth to modify the image property for an existing trusted image entry, where the handle for the entry is `docker-ubuntu-group`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/34-02/desc/trust/learn_get.md b/openapi-specs/compute/34-02/desc/trust/learn_get.md index d8a3414d0..004b16b02 100644 --- a/openapi-specs/compute/34-02/desc/trust/learn_get.md +++ b/openapi-specs/compute/34-02/desc/trust/learn_get.md @@ -1,7 +1,7 @@ Returns the state of the trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/trust/learn_post.md b/openapi-specs/compute/34-02/desc/trust/learn_post.md index 094817738..008657fa2 100644 --- a/openapi-specs/compute/34-02/desc/trust/learn_post.md +++ b/openapi-specs/compute/34-02/desc/trust/learn_post.md @@ -1,7 +1,7 @@ Sets the state of trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/trust/post.md b/openapi-specs/compute/34-02/desc/trust/post.md index 1072275a1..23a324c6c 100644 --- a/openapi-specs/compute/34-02/desc/trust/post.md +++ b/openapi-specs/compute/34-02/desc/trust/post.md @@ -7,7 +7,7 @@ For more information about handles, see the `_id` key in the response body for t The following example curl command uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ To create a trust group based on image base layers, POST a list of SHA256 hashes The following example specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/users/get.md b/openapi-specs/compute/34-02/desc/users/get.md index e4e6966ec..cd5a661ba 100644 --- a/openapi-specs/compute/34-02/desc/users/get.md +++ b/openapi-specs/compute/34-02/desc/users/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Manage > Authentication > Users** in the Console UI. The following cURL command retrieves all users. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/users/id_delete.md b/openapi-specs/compute/34-02/desc/users/id_delete.md index 1cfa5642d..66a1102f9 100644 --- a/openapi-specs/compute/34-02/desc/users/id_delete.md +++ b/openapi-specs/compute/34-02/desc/users/id_delete.md @@ -17,7 +17,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes user `ID` from the system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/34-02/desc/util/osx_twistcli_arm64_get.md b/openapi-specs/compute/34-02/desc/util/osx_twistcli_arm64_get.md index b385d0d3b..a30686374 100644 --- a/openapi-specs/compute/34-02/desc/util/osx_twistcli_arm64_get.md +++ b/openapi-specs/compute/34-02/desc/util/osx_twistcli_arm64_get.md @@ -7,7 +7,7 @@ Downloads the twistcli binary executable for MacOS platforms based on ARM64 arch Refer to the following example cURL command that downloads and saves the “twistcli” binary executable for ARM64 bit MacOS platforms to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/compute/34-02/desc/util/osx_twistcli_get.md b/openapi-specs/compute/34-02/desc/util/osx_twistcli_get.md index c49f96c41..2353ea338 100644 --- a/openapi-specs/compute/34-02/desc/util/osx_twistcli_get.md +++ b/openapi-specs/compute/34-02/desc/util/osx_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **MacOS platform** hyperlink in **Manage > System > Ut The following cURL command downloads the twistcli binary executable for MacOS platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli \ diff --git a/openapi-specs/compute/34-02/desc/util/twistcli_arm64_get.md b/openapi-specs/compute/34-02/desc/util/twistcli_arm64_get.md index 7ec36d3f5..a3d7318ab 100644 --- a/openapi-specs/compute/34-02/desc/util/twistcli_arm64_get.md +++ b/openapi-specs/compute/34-02/desc/util/twistcli_arm64_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/compute/34-02/desc/util/twistcli_get.md b/openapi-specs/compute/34-02/desc/util/twistcli_get.md index f9d2d295c..08a3ae8aa 100644 --- a/openapi-specs/compute/34-02/desc/util/twistcli_get.md +++ b/openapi-specs/compute/34-02/desc/util/twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -X GET -o \ 'https:///api/v/util/twistcli' diff --git a/openapi-specs/compute/34-02/desc/util/twistlock_jenkins_plugin_get.md b/openapi-specs/compute/34-02/desc/util/twistlock_jenkins_plugin_get.md index 9fb8d4a02..c9f180e5e 100644 --- a/openapi-specs/compute/34-02/desc/util/twistlock_jenkins_plugin_get.md +++ b/openapi-specs/compute/34-02/desc/util/twistlock_jenkins_plugin_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-jenkins-plugin.hpi \ diff --git a/openapi-specs/compute/34-02/desc/util/twistlock_tas_tile_get.md b/openapi-specs/compute/34-02/desc/util/twistlock_tas_tile_get.md index fea28aaad..3fd114e2d 100644 --- a/openapi-specs/compute/34-02/desc/util/twistlock_tas_tile_get.md +++ b/openapi-specs/compute/34-02/desc/util/twistlock_tas_tile_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-tile.pivotal \ diff --git a/openapi-specs/compute/34-02/desc/util/windows_twistcli_get.md b/openapi-specs/compute/34-02/desc/util/windows_twistcli_get.md index 1c545dbbb..38c609b08 100644 --- a/openapi-specs/compute/34-02/desc/util/windows_twistcli_get.md +++ b/openapi-specs/compute/34-02/desc/util/windows_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Windows platform** hyperlink in **Manage > System > The following cURL command downloads the twistcli binary executable for Windows platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli.exe \ diff --git a/openapi-specs/compute/34-02/desc/version/get.md b/openapi-specs/compute/34-02/desc/version/get.md index 28be315e0..5787e90fd 100644 --- a/openapi-specs/compute/34-02/desc/version/get.md +++ b/openapi-specs/compute/34-02/desc/version/get.md @@ -5,7 +5,7 @@ Retrieves the version number for Console. The following cURL command retrieves the version number for Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/vms/download_get.md b/openapi-specs/compute/34-02/desc/vms/download_get.md index e65e4efc9..3cc813bc5 100644 --- a/openapi-specs/compute/34-02/desc/vms/download_get.md +++ b/openapi-specs/compute/34-02/desc/vms/download_get.md @@ -7,7 +7,7 @@ Returns all VM image scan reports in CSV format. Refer to the following example cURL command that retrieves all VM image scan reports and saves the results in a CSV file called `vm_images_scan.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/vms/get.md b/openapi-specs/compute/34-02/desc/vms/get.md index e78a28c76..03ed8deb3 100644 --- a/openapi-specs/compute/34-02/desc/vms/get.md +++ b/openapi-specs/compute/34-02/desc/vms/get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > Hosts > VM imag Refer to the following example cURL command that retrieves all VM image scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/vms/labels_get.md b/openapi-specs/compute/34-02/desc/vms/labels_get.md index 0aed1a217..f509da479 100644 --- a/openapi-specs/compute/34-02/desc/vms/labels_get.md +++ b/openapi-specs/compute/34-02/desc/vms/labels_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/34-02/desc/vms/names_get.md b/openapi-specs/compute/34-02/desc/vms/names_get.md index 1145cfa0d..9f92e0156 100644 --- a/openapi-specs/compute/34-02/desc/vms/names_get.md +++ b/openapi-specs/compute/34-02/desc/vms/names_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/34-02/desc/vms/scan_post.md b/openapi-specs/compute/34-02/desc/vms/scan_post.md index 1caa2dcaf..4d4de3ab1 100644 --- a/openapi-specs/compute/34-02/desc/vms/scan_post.md +++ b/openapi-specs/compute/34-02/desc/vms/scan_post.md @@ -5,7 +5,7 @@ Re-scans all VM images immediately. This endpoint returns the time that the scan Refer to the following example cURL command that forces Prisma Cloud to re-scan all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/34-02/desc/vms/stop_post.md b/openapi-specs/compute/34-02/desc/vms/stop_post.md index 4a74743eb..49b2b26f9 100644 --- a/openapi-specs/compute/34-02/desc/vms/stop_post.md +++ b/openapi-specs/compute/34-02/desc/vms/stop_post.md @@ -7,7 +7,7 @@ Note: It might take a few minutes for the scan to stop completely. Refer to the following example cURL command that forces Prisma Cloud to stop scanning all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/SCAP/get.md b/openapi-specs/compute/desc/SCAP/get.md index a25abe94e..f5870d822 100644 --- a/openapi-specs/compute/desc/SCAP/get.md +++ b/openapi-specs/compute/desc/SCAP/get.md @@ -3,7 +3,7 @@ This endpoint will return any SCAP datastreams uploaded to the console. This end The following is an example curl command that uses basic auth to retrieve any uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/SCAP/id_delete.md b/openapi-specs/compute/desc/SCAP/id_delete.md index 39f1b0132..52923f20a 100644 --- a/openapi-specs/compute/desc/SCAP/id_delete.md +++ b/openapi-specs/compute/desc/SCAP/id_delete.md @@ -3,7 +3,7 @@ This endpoint will delete any SCAP datastreams uploaded to the console. You can The following is an example curl command that uses basic auth to delete an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/desc/SCAP/post.md b/openapi-specs/compute/desc/SCAP/post.md index d459a0e97..c45fd6b4e 100644 --- a/openapi-specs/compute/desc/SCAP/post.md +++ b/openapi-specs/compute/desc/SCAP/post.md @@ -3,7 +3,7 @@ This endpoint will allow you to add a SCAP datastream to the console. The following is an example curl command that uses basic auth to add an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/_ping/get.md b/openapi-specs/compute/desc/_ping/get.md index 8e143ef67..b7ffdc653 100644 --- a/openapi-specs/compute/desc/_ping/get.md +++ b/openapi-specs/compute/desc/_ping/get.md @@ -5,7 +5,7 @@ Checks if Console is reachable from your network host. Refer to the following cURL example command that pings Console and prints the HTTP response code: ```bash -$ curl -k \ +$ curl \ -s \ -o /dev/null \ -w "%{http_code}\n" \ diff --git a/openapi-specs/compute/desc/agentless/get_agentless_progress.md b/openapi-specs/compute/desc/agentless/get_agentless_progress.md index b98ed9da5..78396eec6 100644 --- a/openapi-specs/compute/desc/agentless/get_agentless_progress.md +++ b/openapi-specs/compute/desc/agentless/get_agentless_progress.md @@ -5,7 +5,7 @@ Shows the progress of an ongoing scan on hosts or containers for vulnerabilities Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/agentless/post_agentless_scan.md b/openapi-specs/compute/desc/agentless/post_agentless_scan.md index f1295cdc4..e2f8a4e11 100644 --- a/openapi-specs/compute/desc/agentless/post_agentless_scan.md +++ b/openapi-specs/compute/desc/agentless/post_agentless_scan.md @@ -9,7 +9,7 @@ Make sure that you download (use the agentless/templates API) and apply the perm Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/agentless/post_agentless_stop.md b/openapi-specs/compute/desc/agentless/post_agentless_stop.md index ab83960cc..ddee6ec7a 100644 --- a/openapi-specs/compute/desc/agentless/post_agentless_stop.md +++ b/openapi-specs/compute/desc/agentless/post_agentless_stop.md @@ -5,7 +5,7 @@ Stops an ongoing scan on hosts or containers for vulnerabilities and compliance. Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/agentless/post_agentless_templates.md b/openapi-specs/compute/desc/agentless/post_agentless_templates.md index 96be32555..5159c439a 100644 --- a/openapi-specs/compute/desc/agentless/post_agentless_templates.md +++ b/openapi-specs/compute/desc/agentless/post_agentless_templates.md @@ -31,7 +31,7 @@ Add the supported cloud accounts (AWS, Azure, GCP, and OCI) in Prisma Cloud Comp Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/alert-profiles/get.md b/openapi-specs/compute/desc/alert-profiles/get.md index 82647e248..f17191ac4 100644 --- a/openapi-specs/compute/desc/alert-profiles/get.md +++ b/openapi-specs/compute/desc/alert-profiles/get.md @@ -3,7 +3,7 @@ Retrieve a list of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/alert-profiles/id_delete.md b/openapi-specs/compute/desc/alert-profiles/id_delete.md index 1a67fe20e..2cf21b57e 100644 --- a/openapi-specs/compute/desc/alert-profiles/id_delete.md +++ b/openapi-specs/compute/desc/alert-profiles/id_delete.md @@ -5,7 +5,7 @@ This method has no response data. The following example curl command deletes an existing alert profile named `PROFILE-NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/desc/alert-profiles/names_get.md b/openapi-specs/compute/desc/alert-profiles/names_get.md index cac14437b..38a1f78ca 100644 --- a/openapi-specs/compute/desc/alert-profiles/names_get.md +++ b/openapi-specs/compute/desc/alert-profiles/names_get.md @@ -3,7 +3,7 @@ Retrieve a list of only the names of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles' names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/alert-profiles/post.md b/openapi-specs/compute/desc/alert-profiles/post.md index 9fa643429..19db863d5 100644 --- a/openapi-specs/compute/desc/alert-profiles/post.md +++ b/openapi-specs/compute/desc/alert-profiles/post.md @@ -3,7 +3,7 @@ Update an existing alert profile created in the system. The following example curl command uses basic auth to add a Jira Alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/alert-profiles/test_post.md b/openapi-specs/compute/desc/alert-profiles/test_post.md index 1fc745efa..2205a6e73 100644 --- a/openapi-specs/compute/desc/alert-profiles/test_post.md +++ b/openapi-specs/compute/desc/alert-profiles/test_post.md @@ -3,7 +3,7 @@ Sends a test alert to verify successful configuration of the alert profile setti The following example curl command uses basic auth to send test alert for an email alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/application-control/get.md b/openapi-specs/compute/desc/application-control/get.md index 5bd600beb..535584284 100644 --- a/openapi-specs/compute/desc/application-control/get.md +++ b/openapi-specs/compute/desc/application-control/get.md @@ -3,7 +3,7 @@ Retrieves the host application control rules. The following example curl command uses basic auth to retrieve the control rules: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/access_delete.md b/openapi-specs/compute/desc/audits/access_delete.md index 37f33ca64..0450b534c 100644 --- a/openapi-specs/compute/desc/audits/access_delete.md +++ b/openapi-specs/compute/desc/audits/access_delete.md @@ -2,7 +2,7 @@ Deletes **all** access audits. This deletion cannot be undone. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/desc/audits/access_download_get.md b/openapi-specs/compute/desc/audits/access_download_get.md index 1700deb8d..8d8fee259 100644 --- a/openapi-specs/compute/desc/audits/access_download_get.md +++ b/openapi-specs/compute/desc/audits/access_download_get.md @@ -3,7 +3,7 @@ Returns the docker access audit events data in CSV format that are logged and ag **Note**: You can download the access events from Console under **Monitor > Events > Docker audits > Download CSV**. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/access_filters_get.md b/openapi-specs/compute/desc/audits/access_filters_get.md index 00ac061c1..4b8e9cd9b 100644 --- a/openapi-specs/compute/desc/audits/access_filters_get.md +++ b/openapi-specs/compute/desc/audits/access_filters_get.md @@ -5,7 +5,7 @@ The following example uses basic auth to list history of commands that are run o ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ The following command gives list of sudo events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -27,7 +27,7 @@ $ curl -k \ The following command gives list of SSHD events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/access_get.md b/openapi-specs/compute/desc/audits/access_get.md index 2401391c7..56e53fe12 100644 --- a/openapi-specs/compute/desc/audits/access_get.md +++ b/openapi-specs/compute/desc/audits/access_get.md @@ -8,7 +8,7 @@ You can configure Prisma Cloud Compute to log and aggregate events such as sudo Refer to the following example cURL command that gives a list of all access audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/admission_download_get.md b/openapi-specs/compute/desc/audits/admission_download_get.md index 9571c483f..d45f47c4e 100644 --- a/openapi-specs/compute/desc/audits/admission_download_get.md +++ b/openapi-specs/compute/desc/audits/admission_download_get.md @@ -4,7 +4,7 @@ Returns the access admission events data in CSV format that were alerted or bloc Refer to the following example cURL command that downloads the admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/admission_get.md b/openapi-specs/compute/desc/audits/admission_get.md index 84414496c..3640c737c 100644 --- a/openapi-specs/compute/desc/audits/admission_get.md +++ b/openapi-specs/compute/desc/audits/admission_get.md @@ -4,7 +4,7 @@ Returns all activities that were alerted or blocked by Defender functioning as O Refer to the following example cURL command that gives a list of all admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/firewall_network_container_download_get.md b/openapi-specs/compute/desc/audits/firewall_network_container_download_get.md index 29029ac6d..434e09acd 100644 --- a/openapi-specs/compute/desc/audits/firewall_network_container_download_get.md +++ b/openapi-specs/compute/desc/audits/firewall_network_container_download_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/firewall_network_container_get.md b/openapi-specs/compute/desc/audits/firewall_network_container_get.md index 454558a44..be03b2c45 100644 --- a/openapi-specs/compute/desc/audits/firewall_network_container_get.md +++ b/openapi-specs/compute/desc/audits/firewall_network_container_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/firewall_network_host_download_get.md b/openapi-specs/compute/desc/audits/firewall_network_host_download_get.md index 768dd00d7..e83e8e1c3 100644 --- a/openapi-specs/compute/desc/audits/firewall_network_host_download_get.md +++ b/openapi-specs/compute/desc/audits/firewall_network_host_download_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/firewall_network_host_get.md b/openapi-specs/compute/desc/audits/firewall_network_host_get.md index e5dc4c399..6cbda0d4b 100644 --- a/openapi-specs/compute/desc/audits/firewall_network_host_get.md +++ b/openapi-specs/compute/desc/audits/firewall_network_host_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/incidents_archive_patch.md b/openapi-specs/compute/desc/audits/incidents_archive_patch.md index a1127a001..d1f42eedd 100644 --- a/openapi-specs/compute/desc/audits/incidents_archive_patch.md +++ b/openapi-specs/compute/desc/audits/incidents_archive_patch.md @@ -7,7 +7,7 @@ You can get an incident ID from the list of incidents using the endpoint GET /ap Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/compute/desc/audits/incidents_download_get.md b/openapi-specs/compute/desc/audits/incidents_download_get.md index 2266c3471..5958756bf 100644 --- a/openapi-specs/compute/desc/audits/incidents_download_get.md +++ b/openapi-specs/compute/desc/audits/incidents_download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the **CSV** hyperlink in **Monitor > Runtime > Incident ex The following cURL command downloads all incidents and saves the result in a CSV file called `incidents.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/incidents_filters_get.md b/openapi-specs/compute/desc/audits/incidents_filters_get.md index 7d1c6f303..856881c90 100644 --- a/openapi-specs/compute/desc/audits/incidents_filters_get.md +++ b/openapi-specs/compute/desc/audits/incidents_filters_get.md @@ -3,7 +3,7 @@ This endpoint lists the incident categories found in your environment. The following example lists incident filters. ```bash -$ curl -k \ +$ curl \ -u \ https://console:8083/api/v1/audits/incidents/filters ``` diff --git a/openapi-specs/compute/desc/audits/incidents_get.md b/openapi-specs/compute/desc/audits/incidents_get.md index 7724a08c1..9b9451821 100644 --- a/openapi-specs/compute/desc/audits/incidents_get.md +++ b/openapi-specs/compute/desc/audits/incidents_get.md @@ -9,7 +9,7 @@ This endpoint maps to the table in **Monitor > Runtime > Incident explorer** in Refer to the following example cURL command that retrieves a list of unacknowledged incidents (not in the archived state): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/kubernetes_download_get.md b/openapi-specs/compute/desc/audits/kubernetes_download_get.md index 6008bd92a..62992095c 100644 --- a/openapi-specs/compute/desc/audits/kubernetes_download_get.md +++ b/openapi-specs/compute/desc/audits/kubernetes_download_get.md @@ -7,7 +7,7 @@ Returns the audit events data that occur in an integrated Kubernetes cluster tha Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/kubernetes_get.md b/openapi-specs/compute/desc/audits/kubernetes_get.md index e1ecb8a88..2e3f51b71 100644 --- a/openapi-specs/compute/desc/audits/kubernetes_get.md +++ b/openapi-specs/compute/desc/audits/kubernetes_get.md @@ -7,7 +7,7 @@ Retrieves events that occur in an integrated Kubernetes cluster that you configu Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/mgmt_download_get.md b/openapi-specs/compute/desc/audits/mgmt_download_get.md index ae3ef45b6..bcee17342 100644 --- a/openapi-specs/compute/desc/audits/mgmt_download_get.md +++ b/openapi-specs/compute/desc/audits/mgmt_download_get.md @@ -10,7 +10,7 @@ Management audits are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/mgmt_filters_get.md b/openapi-specs/compute/desc/audits/mgmt_filters_get.md index 854977b99..f910a4c2a 100644 --- a/openapi-specs/compute/desc/audits/mgmt_filters_get.md +++ b/openapi-specs/compute/desc/audits/mgmt_filters_get.md @@ -6,7 +6,7 @@ Use these filters to query management audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/mgmt_get.md b/openapi-specs/compute/desc/audits/mgmt_get.md index 5b586cb5e..abe802348 100644 --- a/openapi-specs/compute/desc/audits/mgmt_get.md +++ b/openapi-specs/compute/desc/audits/mgmt_get.md @@ -10,7 +10,7 @@ Management audit events are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/runtime_app_embedded_download_get.md b/openapi-specs/compute/desc/audits/runtime_app_embedded_download_get.md index f3d844ead..ec5ae0f2a 100644 --- a/openapi-specs/compute/desc/audits/runtime_app_embedded_download_get.md +++ b/openapi-specs/compute/desc/audits/runtime_app_embedded_download_get.md @@ -5,7 +5,7 @@ Returns the app-embedded runtime audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/runtime_app_embedded_get.md b/openapi-specs/compute/desc/audits/runtime_app_embedded_get.md index c1d72acfa..51a43b7f5 100644 --- a/openapi-specs/compute/desc/audits/runtime_app_embedded_get.md +++ b/openapi-specs/compute/desc/audits/runtime_app_embedded_get.md @@ -5,7 +5,7 @@ Retrieves all app-embedded runtime audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/runtime_container_delete.md b/openapi-specs/compute/desc/audits/runtime_container_delete.md index ddc8e82d6..62050c71f 100644 --- a/openapi-specs/compute/desc/audits/runtime_container_delete.md +++ b/openapi-specs/compute/desc/audits/runtime_container_delete.md @@ -3,7 +3,7 @@ Deletes all container runtime audits. The following example curl command uses basic auth to delete all the audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/desc/audits/runtime_container_download_get.md b/openapi-specs/compute/desc/audits/runtime_container_download_get.md index 20e673b5e..81286d929 100644 --- a/openapi-specs/compute/desc/audits/runtime_container_download_get.md +++ b/openapi-specs/compute/desc/audits/runtime_container_download_get.md @@ -6,7 +6,7 @@ Returns the container audit events data in CSV format when a runtime sensor such Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o \ diff --git a/openapi-specs/compute/desc/audits/runtime_container_get.md b/openapi-specs/compute/desc/audits/runtime_container_get.md index 11beffb24..a6b6ba484 100644 --- a/openapi-specs/compute/desc/audits/runtime_container_get.md +++ b/openapi-specs/compute/desc/audits/runtime_container_get.md @@ -7,7 +7,7 @@ Retrieves all container audit events when a runtime sensor such as process, netw Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/runtime_container_timeslice_get.md b/openapi-specs/compute/desc/audits/runtime_container_timeslice_get.md index f65d477af..01df48f28 100644 --- a/openapi-specs/compute/desc/audits/runtime_container_timeslice_get.md +++ b/openapi-specs/compute/desc/audits/runtime_container_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/runtime_file-integrity_download_get.md b/openapi-specs/compute/desc/audits/runtime_file-integrity_download_get.md index 99ec70c52..234c3ce32 100644 --- a/openapi-specs/compute/desc/audits/runtime_file-integrity_download_get.md +++ b/openapi-specs/compute/desc/audits/runtime_file-integrity_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for file-integrity checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/runtime_file-integrity_get.md b/openapi-specs/compute/desc/audits/runtime_file-integrity_get.md index 53fec9f9f..c31904422 100644 --- a/openapi-specs/compute/desc/audits/runtime_file-integrity_get.md +++ b/openapi-specs/compute/desc/audits/runtime_file-integrity_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for file-integrity checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/runtime_host_delete.md b/openapi-specs/compute/desc/audits/runtime_host_delete.md index 0ab1c877e..2ada9b15a 100644 --- a/openapi-specs/compute/desc/audits/runtime_host_delete.md +++ b/openapi-specs/compute/desc/audits/runtime_host_delete.md @@ -3,7 +3,7 @@ Deletes all host audits from the database. The following example curl command uses basic auth to delete all host audits: ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/audits/runtime/host diff --git a/openapi-specs/compute/desc/audits/runtime_host_download_get.md b/openapi-specs/compute/desc/audits/runtime_host_download_get.md index 4d0454f56..d85cc39d0 100644 --- a/openapi-specs/compute/desc/audits/runtime_host_download_get.md +++ b/openapi-specs/compute/desc/audits/runtime_host_download_get.md @@ -5,7 +5,7 @@ Returns the runtime host audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/runtime_host_get.md b/openapi-specs/compute/desc/audits/runtime_host_get.md index 044b8b42d..e063550d6 100644 --- a/openapi-specs/compute/desc/audits/runtime_host_get.md +++ b/openapi-specs/compute/desc/audits/runtime_host_get.md @@ -5,7 +5,7 @@ Retrieves the runtime host audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/runtime_host_timeslice_get.md b/openapi-specs/compute/desc/audits/runtime_host_timeslice_get.md index 8933efa74..aafd869b8 100644 --- a/openapi-specs/compute/desc/audits/runtime_host_timeslice_get.md +++ b/openapi-specs/compute/desc/audits/runtime_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/runtime_log-inspection_download_get.md b/openapi-specs/compute/desc/audits/runtime_log-inspection_download_get.md index f047ed96f..0aa1a5710 100644 --- a/openapi-specs/compute/desc/audits/runtime_log-inspection_download_get.md +++ b/openapi-specs/compute/desc/audits/runtime_log-inspection_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for log inspection checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/runtime_log-inspection_get.md b/openapi-specs/compute/desc/audits/runtime_log-inspection_get.md index 49f0d7be4..8292b623e 100644 --- a/openapi-specs/compute/desc/audits/runtime_log-inspection_get.md +++ b/openapi-specs/compute/desc/audits/runtime_log-inspection_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for log inspection checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/runtime_rasp_delete.md b/openapi-specs/compute/desc/audits/runtime_rasp_delete.md index 688e04038..14315c55b 100644 --- a/openapi-specs/compute/desc/audits/runtime_rasp_delete.md +++ b/openapi-specs/compute/desc/audits/runtime_rasp_delete.md @@ -1,7 +1,7 @@ Deletes all RASP Defender runtime audits. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/desc/audits/runtime_rasp_download_get.md b/openapi-specs/compute/desc/audits/runtime_rasp_download_get.md index 303c75858..11a85100d 100644 --- a/openapi-specs/compute/desc/audits/runtime_rasp_download_get.md +++ b/openapi-specs/compute/desc/audits/runtime_rasp_download_get.md @@ -1,7 +1,7 @@ Returns CSV data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/runtime_rasp_get.md b/openapi-specs/compute/desc/audits/runtime_rasp_get.md index 229d908b1..0475cb149 100644 --- a/openapi-specs/compute/desc/audits/runtime_rasp_get.md +++ b/openapi-specs/compute/desc/audits/runtime_rasp_get.md @@ -1,7 +1,7 @@ Returns JSON data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/runtime_serverless_delete.md b/openapi-specs/compute/desc/audits/runtime_serverless_delete.md index 99ada0515..e27ebe858 100644 --- a/openapi-specs/compute/desc/audits/runtime_serverless_delete.md +++ b/openapi-specs/compute/desc/audits/runtime_serverless_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to delete the current audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/desc/audits/runtime_serverless_download_get.md b/openapi-specs/compute/desc/audits/runtime_serverless_download_get.md index f829d2342..91693c145 100644 --- a/openapi-specs/compute/desc/audits/runtime_serverless_download_get.md +++ b/openapi-specs/compute/desc/audits/runtime_serverless_download_get.md @@ -5,7 +5,7 @@ Returns the scan audit events data in CSV format for any configured serverless f Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/runtime_serverless_filters_get.md b/openapi-specs/compute/desc/audits/runtime_serverless_filters_get.md index b9bf38610..babda78dd 100644 --- a/openapi-specs/compute/desc/audits/runtime_serverless_filters_get.md +++ b/openapi-specs/compute/desc/audits/runtime_serverless_filters_get.md @@ -2,7 +2,7 @@ Returns all serverless filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/runtime_serverless_get.md b/openapi-specs/compute/desc/audits/runtime_serverless_get.md index 045946886..f6aeb748e 100644 --- a/openapi-specs/compute/desc/audits/runtime_serverless_get.md +++ b/openapi-specs/compute/desc/audits/runtime_serverless_get.md @@ -5,7 +5,7 @@ Retrieves all scan events for any configured serverless functions in Prisma Clou Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/runtime_serverless_timeslice_get.md b/openapi-specs/compute/desc/audits/runtime_serverless_timeslice_get.md index 863890174..a2456cec0 100644 --- a/openapi-specs/compute/desc/audits/runtime_serverless_timeslice_get.md +++ b/openapi-specs/compute/desc/audits/runtime_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/trust_delete.md b/openapi-specs/compute/desc/audits/trust_delete.md index 0bfb2bd81..4aaeef3fe 100644 --- a/openapi-specs/compute/desc/audits/trust_delete.md +++ b/openapi-specs/compute/desc/audits/trust_delete.md @@ -1,7 +1,7 @@ Deletes all the trust audits from the events page in Console. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/desc/audits/trust_download_get.md b/openapi-specs/compute/desc/audits/trust_download_get.md index 21c0e55a2..234089449 100644 --- a/openapi-specs/compute/desc/audits/trust_download_get.md +++ b/openapi-specs/compute/desc/audits/trust_download_get.md @@ -5,7 +5,7 @@ Returns the trust audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/trust_get.md b/openapi-specs/compute/desc/audits/trust_get.md index 8fb3a341d..de7d47e96 100644 --- a/openapi-specs/compute/desc/audits/trust_get.md +++ b/openapi-specs/compute/desc/audits/trust_get.md @@ -4,7 +4,7 @@ Retrieves all the trust audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/waas_agentless_download_get.md b/openapi-specs/compute/desc/audits/waas_agentless_download_get.md index bbfcd12f5..f930ef6b3 100644 --- a/openapi-specs/compute/desc/audits/waas_agentless_download_get.md +++ b/openapi-specs/compute/desc/audits/waas_agentless_download_get.md @@ -7,7 +7,7 @@ Returns the agentless Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/waas_agentless_get.md b/openapi-specs/compute/desc/audits/waas_agentless_get.md index ad40ae497..b257b0385 100644 --- a/openapi-specs/compute/desc/audits/waas_agentless_get.md +++ b/openapi-specs/compute/desc/audits/waas_agentless_get.md @@ -7,7 +7,7 @@ Retrieves all agentless Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/waas_agentless_timeslice_get.md b/openapi-specs/compute/desc/audits/waas_agentless_timeslice_get.md index 007c6dba3..3eaf34b25 100644 --- a/openapi-specs/compute/desc/audits/waas_agentless_timeslice_get.md +++ b/openapi-specs/compute/desc/audits/waas_agentless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/waas_app_embedded_download_get.md b/openapi-specs/compute/desc/audits/waas_app_embedded_download_get.md index 149c10376..c94aa87b0 100644 --- a/openapi-specs/compute/desc/audits/waas_app_embedded_download_get.md +++ b/openapi-specs/compute/desc/audits/waas_app_embedded_download_get.md @@ -6,7 +6,7 @@ Returns the app-embedded WAAS audit events data in CSV format for the specified Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/waas_app_embedded_get.md b/openapi-specs/compute/desc/audits/waas_app_embedded_get.md index 400fa447d..6318fb299 100644 --- a/openapi-specs/compute/desc/audits/waas_app_embedded_get.md +++ b/openapi-specs/compute/desc/audits/waas_app_embedded_get.md @@ -6,7 +6,7 @@ Returns all app-embedded WAAS audit events for the specified query parameters. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/waas_app_embedded_timeslice_get.md b/openapi-specs/compute/desc/audits/waas_app_embedded_timeslice_get.md index 79a60038e..42a76d08c 100644 --- a/openapi-specs/compute/desc/audits/waas_app_embedded_timeslice_get.md +++ b/openapi-specs/compute/desc/audits/waas_app_embedded_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the app-embedded WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/waas_container_download_get.md b/openapi-specs/compute/desc/audits/waas_container_download_get.md index 9a5e04fad..7d26c34f4 100644 --- a/openapi-specs/compute/desc/audits/waas_container_download_get.md +++ b/openapi-specs/compute/desc/audits/waas_container_download_get.md @@ -6,7 +6,7 @@ Returns the container Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that downloads the WAAS container audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/waas_container_get.md b/openapi-specs/compute/desc/audits/waas_container_get.md index ac0df80fd..c1ad08f3c 100644 --- a/openapi-specs/compute/desc/audits/waas_container_get.md +++ b/openapi-specs/compute/desc/audits/waas_container_get.md @@ -6,7 +6,7 @@ Retrieves all container Web-Application and API Security (WAAS) audits. Refer to the following example cURL command that retrieves all container WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/waas_container_timeslice_get.md b/openapi-specs/compute/desc/audits/waas_container_timeslice_get.md index a56b4c48f..be56260d6 100644 --- a/openapi-specs/compute/desc/audits/waas_container_timeslice_get.md +++ b/openapi-specs/compute/desc/audits/waas_container_timeslice_get.md @@ -11,7 +11,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the container WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s):: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/waas_host_download_get.md b/openapi-specs/compute/desc/audits/waas_host_download_get.md index 4bc66202b..71692e682 100644 --- a/openapi-specs/compute/desc/audits/waas_host_download_get.md +++ b/openapi-specs/compute/desc/audits/waas_host_download_get.md @@ -7,7 +7,7 @@ Returns the host Web-Application and API Security (WAAS) audit events data in CS Refer to the following example cURL command that downloads the host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/waas_host_get.md b/openapi-specs/compute/desc/audits/waas_host_get.md index 14c967594..f6e3df050 100644 --- a/openapi-specs/compute/desc/audits/waas_host_get.md +++ b/openapi-specs/compute/desc/audits/waas_host_get.md @@ -7,7 +7,7 @@ Retrieves all host Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/waas_host_timeslice_get.md b/openapi-specs/compute/desc/audits/waas_host_timeslice_get.md index e28ed7b7a..67b3a54c3 100644 --- a/openapi-specs/compute/desc/audits/waas_host_timeslice_get.md +++ b/openapi-specs/compute/desc/audits/waas_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves host WAAS audit events for a specific time frame: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/waas_serverless_download_get.md b/openapi-specs/compute/desc/audits/waas_serverless_download_get.md index da05504df..0c0dbe698 100644 --- a/openapi-specs/compute/desc/audits/waas_serverless_download_get.md +++ b/openapi-specs/compute/desc/audits/waas_serverless_download_get.md @@ -7,7 +7,7 @@ Returns the serverless function Web-Application and API Security (WAAS) audit ev Refer to the following example cURL command that downloads the serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/waas_serverless_get.md b/openapi-specs/compute/desc/audits/waas_serverless_get.md index fe482a3f3..82488f7ee 100644 --- a/openapi-specs/compute/desc/audits/waas_serverless_get.md +++ b/openapi-specs/compute/desc/audits/waas_serverless_get.md @@ -7,7 +7,7 @@ Retrieves all serverless function Web-Application and API Security (WAAS) audit Refer to the following example cURL command that retrieves all serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/audits/waas_serverless_timeslice_get.md b/openapi-specs/compute/desc/audits/waas_serverless_timeslice_get.md index ec9ff3df1..a0a9a1368 100644 --- a/openapi-specs/compute/desc/audits/waas_serverless_timeslice_get.md +++ b/openapi-specs/compute/desc/audits/waas_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the serverless WAAS audit events for a : ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/authenticate-client/post.md b/openapi-specs/compute/desc/authenticate-client/post.md index bc493d04e..ce6f00afe 100644 --- a/openapi-specs/compute/desc/authenticate-client/post.md +++ b/openapi-specs/compute/desc/authenticate-client/post.md @@ -8,7 +8,7 @@ This endpoint checks the supplied client certificate and authorizes the user bas Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X POST \ --cert \ https:///api/v/authenticate-client diff --git a/openapi-specs/compute/desc/authenticate/post.md b/openapi-specs/compute/desc/authenticate/post.md index cb018de64..4f85c5d34 100644 --- a/openapi-specs/compute/desc/authenticate/post.md +++ b/openapi-specs/compute/desc/authenticate/post.md @@ -9,7 +9,7 @@ You can set the validity period in Console under **Manage > Authentication > Log Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H "Content-Type: application/json" \ -X POST \ -d \ diff --git a/openapi-specs/compute/desc/authenticate/renew_get.md b/openapi-specs/compute/desc/authenticate/renew_get.md index 6040d58e1..3458b500a 100644 --- a/openapi-specs/compute/desc/authenticate/renew_get.md +++ b/openapi-specs/compute/desc/authenticate/renew_get.md @@ -5,7 +5,7 @@ Renews an old (unexpired) access token and returns a new token. The following cURL command retrieves a new access token using an old access token. ```bash -$ curl -k \ +$ curl \ -H "Authorization: Bearer " \ https:///api/v1/authenticate/renew ``` diff --git a/openapi-specs/compute/desc/certs/capem_get.md b/openapi-specs/compute/desc/certs/capem_get.md index f0f0f1bf3..945476c9b 100644 --- a/openapi-specs/compute/desc/certs/capem_get.md +++ b/openapi-specs/compute/desc/certs/capem_get.md @@ -5,7 +5,7 @@ Retrieves the Base64-encoded SSL root certificate self-signed by primary certifi Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/certs/client-certs_get.md b/openapi-specs/compute/desc/certs/client-certs_get.md index d099b3e3d..279d196b1 100644 --- a/openapi-specs/compute/desc/certs/client-certs_get.md +++ b/openapi-specs/compute/desc/certs/client-certs_get.md @@ -3,7 +3,7 @@ Downloads a script that installs a client certificate, client private key, and c The following example curl command uses basic auth to download and run the install script for your client certs: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/certs/client-certs.sh | sh diff --git a/openapi-specs/compute/desc/certs/server-certs_get.md b/openapi-specs/compute/desc/certs/server-certs_get.md index 0bb13f51d..118a4d9b0 100644 --- a/openapi-specs/compute/desc/certs/server-certs_get.md +++ b/openapi-specs/compute/desc/certs/server-certs_get.md @@ -12,7 +12,7 @@ Retrieves the server certificate bundle from Prisma Cloud Compute that contains Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -u \ -X GET \ diff --git a/openapi-specs/compute/desc/cloud/compliance_download_get.md b/openapi-specs/compute/desc/cloud/compliance_download_get.md index 7b1ec9fea..14f2725b1 100644 --- a/openapi-specs/compute/desc/cloud/compliance_download_get.md +++ b/openapi-specs/compute/desc/cloud/compliance_download_get.md @@ -2,7 +2,7 @@ Download all cloud scan data in CSV format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/desc/cloud/compliance_get.md b/openapi-specs/compute/desc/cloud/compliance_get.md index 48c2fe5bb..ad47e0998 100644 --- a/openapi-specs/compute/desc/cloud/compliance_get.md +++ b/openapi-specs/compute/desc/cloud/compliance_get.md @@ -2,7 +2,7 @@ Returns a list of all cloud compliance scan results. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/cloud/compliance_scan_post.md b/openapi-specs/compute/desc/cloud/compliance_scan_post.md index 7f87bf1f4..7321c3b9d 100644 --- a/openapi-specs/compute/desc/cloud/compliance_scan_post.md +++ b/openapi-specs/compute/desc/cloud/compliance_scan_post.md @@ -2,7 +2,7 @@ Initiates a new cloud compliance scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/cloud/compliance_stop_post.md b/openapi-specs/compute/desc/cloud/compliance_stop_post.md index df0febb56..60c31dc51 100644 --- a/openapi-specs/compute/desc/cloud/compliance_stop_post.md +++ b/openapi-specs/compute/desc/cloud/compliance_stop_post.md @@ -2,7 +2,7 @@ Terminates a cloud compliance scan that's in progress.. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/cloud/discovery_download_get.md b/openapi-specs/compute/desc/cloud/discovery_download_get.md index 44d60a113..a667c8471 100644 --- a/openapi-specs/compute/desc/cloud/discovery_download_get.md +++ b/openapi-specs/compute/desc/cloud/discovery_download_get.md @@ -5,7 +5,7 @@ Downloads all cloud scan data in a CSV file. Refer to the following cURL example command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/desc/cloud/discovery_entities_get.md b/openapi-specs/compute/desc/cloud/discovery_entities_get.md index a7abbdfb6..85f1be971 100644 --- a/openapi-specs/compute/desc/cloud/discovery_entities_get.md +++ b/openapi-specs/compute/desc/cloud/discovery_entities_get.md @@ -7,7 +7,7 @@ Use this API endpoint along with the `GET, api/vVERSION/cloud/discovery` to get Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/cloud/discovery_get.md b/openapi-specs/compute/desc/cloud/discovery_get.md index 28025f140..c2b4c6e3c 100644 --- a/openapi-specs/compute/desc/cloud/discovery_get.md +++ b/openapi-specs/compute/desc/cloud/discovery_get.md @@ -8,7 +8,7 @@ Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/cloud/discovery_scan_post.md b/openapi-specs/compute/desc/cloud/discovery_scan_post.md index 51799ebdb..0717096f8 100644 --- a/openapi-specs/compute/desc/cloud/discovery_scan_post.md +++ b/openapi-specs/compute/desc/cloud/discovery_scan_post.md @@ -5,7 +5,7 @@ Initiates a new cloud discovery scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/cloud/discovery_stop_post.md b/openapi-specs/compute/desc/cloud/discovery_stop_post.md index 6a6c7a5a5..73dbf46e7 100644 --- a/openapi-specs/compute/desc/cloud/discovery_stop_post.md +++ b/openapi-specs/compute/desc/cloud/discovery_stop_post.md @@ -5,7 +5,7 @@ Terminates a cloud discovery scan that's in progress. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/cloud/discovery_vms_get.md b/openapi-specs/compute/desc/cloud/discovery_vms_get.md index 6766f4e5a..2264a27fe 100644 --- a/openapi-specs/compute/desc/cloud/discovery_vms_get.md +++ b/openapi-specs/compute/desc/cloud/discovery_vms_get.md @@ -5,7 +5,7 @@ Returns the discovered cloud VM instances. Refer to the following example cURL command that retrieves all the discovered cloud VM instances: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/coderepos/download_get.md b/openapi-specs/compute/desc/coderepos/download_get.md index 4ec0197bb..b06dd9f17 100644 --- a/openapi-specs/compute/desc/coderepos/download_get.md +++ b/openapi-specs/compute/desc/coderepos/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Code re The following cURL command generates a CSV file containing the reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/coderepos/get.md b/openapi-specs/compute/desc/coderepos/get.md index 54c4e99bf..42dc16fb6 100644 --- a/openapi-specs/compute/desc/coderepos/get.md +++ b/openapi-specs/compute/desc/coderepos/get.md @@ -10,7 +10,7 @@ This endpoint maps to the **Code repositories** table in **Monitor > Vulnerabili The following cURL command retrieves all code repository scan reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/collections/get.md b/openapi-specs/compute/desc/collections/get.md index 99120d17d..5a9e8a50c 100755 --- a/openapi-specs/compute/desc/collections/get.md +++ b/openapi-specs/compute/desc/collections/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table in **Manage > Collections and Tags > Collections Refer to the following example cURL command that returns a list of collections: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/collections/name_delete.md b/openapi-specs/compute/desc/collections/name_delete.md index 3e2debd01..033358000 100755 --- a/openapi-specs/compute/desc/collections/name_delete.md +++ b/openapi-specs/compute/desc/collections/name_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that deletes a collection with the name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/desc/collections/name_usages_get.md b/openapi-specs/compute/desc/collections/name_usages_get.md index 5c9c40424..89e383cce 100755 --- a/openapi-specs/compute/desc/collections/name_usages_get.md +++ b/openapi-specs/compute/desc/collections/name_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that retrieves all policies with name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/containers/count_get.md b/openapi-specs/compute/desc/containers/count_get.md index 4c6ecdcb4..aca59a913 100644 --- a/openapi-specs/compute/desc/containers/count_get.md +++ b/openapi-specs/compute/desc/containers/count_get.md @@ -5,7 +5,7 @@ Returns an integer representing the number of containers in your environment. Refer to the following example cURL command that returns the number of containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/containers/download_get.md b/openapi-specs/compute/desc/containers/download_get.md index 5c0811d7c..5ed3fec35 100644 --- a/openapi-specs/compute/desc/containers/download_get.md +++ b/openapi-specs/compute/desc/containers/download_get.md @@ -9,7 +9,7 @@ You can download the container scan reports in CSV format in Console under **Mon Refer to the following example cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/containers/filters_get.md b/openapi-specs/compute/desc/containers/filters_get.md index c8a1dfca4..6c2777819 100644 --- a/openapi-specs/compute/desc/containers/filters_get.md +++ b/openapi-specs/compute/desc/containers/filters_get.md @@ -1,7 +1,7 @@ Returns all container filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/containers/get.md b/openapi-specs/compute/desc/containers/get.md index 4cacdde60..3de9dd4af 100644 --- a/openapi-specs/compute/desc/containers/get.md +++ b/openapi-specs/compute/desc/containers/get.md @@ -16,7 +16,7 @@ Refer to the following available options for the `fields` query parameters: Refer to the following example cURL command that retrieves a scan report for all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -26,7 +26,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a scan report for a container with the collection ``: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/containers/labels_get.md b/openapi-specs/compute/desc/containers/labels_get.md index eb40a748d..7a63ab6fb 100644 --- a/openapi-specs/compute/desc/containers/labels_get.md +++ b/openapi-specs/compute/desc/containers/labels_get.md @@ -1,7 +1,7 @@ Returns an array of strings containing all of the labels. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/containers/names_get.md b/openapi-specs/compute/desc/containers/names_get.md index 8b32465d5..9025e2e10 100644 --- a/openapi-specs/compute/desc/containers/names_get.md +++ b/openapi-specs/compute/desc/containers/names_get.md @@ -5,7 +5,7 @@ Returns an array of strings containing all container names. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/containers/scan_post.md b/openapi-specs/compute/desc/containers/scan_post.md index 6b2bdaaba..56137cf64 100644 --- a/openapi-specs/compute/desc/containers/scan_post.md +++ b/openapi-specs/compute/desc/containers/scan_post.md @@ -4,7 +4,7 @@ This endpoint returns the time that the scans were initiated. The following example command uses curl and basic auth to force Prisma Cloud Compute to re-scan all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/credentials/get.md b/openapi-specs/compute/desc/credentials/get.md index ee4309dee..b807ce8f3 100644 --- a/openapi-specs/compute/desc/credentials/get.md +++ b/openapi-specs/compute/desc/credentials/get.md @@ -6,7 +6,7 @@ This endpoint maps to **Manage > Authentication > Credentials store** in the Con Refer to the following example cURL command that retrieves all credentials: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/credentials/id_delete.md b/openapi-specs/compute/desc/credentials/id_delete.md index e5c70259e..27f090158 100644 --- a/openapi-specs/compute/desc/credentials/id_delete.md +++ b/openapi-specs/compute/desc/credentials/id_delete.md @@ -14,7 +14,7 @@ To invoke this endpoint in the Prisma Cloud Compute user interface: Refer to the following example cURL command that deletes an existing credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/desc/credentials/id_usages_get.md b/openapi-specs/compute/desc/credentials/id_usages_get.md index 76c1099aa..ca2ce6216 100644 --- a/openapi-specs/compute/desc/credentials/id_usages_get.md +++ b/openapi-specs/compute/desc/credentials/id_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following cURL command that retrieves all usages for a credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/curl_examples.md b/openapi-specs/compute/desc/curl_examples.md index 3d4fcd468..745d21db3 100644 --- a/openapi-specs/compute/desc/curl_examples.md +++ b/openapi-specs/compute/desc/curl_examples.md @@ -6,7 +6,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -17,7 +17,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -29,7 +29,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/compute/desc/custom-compliance/get.md b/openapi-specs/compute/desc/custom-compliance/get.md index 9022a87b7..9dddcff4e 100644 --- a/openapi-specs/compute/desc/custom-compliance/get.md +++ b/openapi-specs/compute/desc/custom-compliance/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example curl command that gets the list of custom compliance checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/custom-compliance/id_delete.md b/openapi-specs/compute/desc/custom-compliance/id_delete.md index 72c7183ee..f6536e51d 100644 --- a/openapi-specs/compute/desc/custom-compliance/id_delete.md +++ b/openapi-specs/compute/desc/custom-compliance/id_delete.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example cURL command that uses basic auth to delete the compliance check with id 9000: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/desc/custom-compliance/put.md b/openapi-specs/compute/desc/custom-compliance/put.md index 480e41b54..b8760a11f 100644 --- a/openapi-specs/compute/desc/custom-compliance/put.md +++ b/openapi-specs/compute/desc/custom-compliance/put.md @@ -21,7 +21,7 @@ Create `custom_check.json` file (example): Refer to the following example curl command that uses basic auth to update the checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/desc/custom-rules/get.md b/openapi-specs/compute/desc/custom-rules/get.md index f0385f81a..f77924be8 100644 --- a/openapi-specs/compute/desc/custom-rules/get.md +++ b/openapi-specs/compute/desc/custom-rules/get.md @@ -7,7 +7,7 @@ This endpoint maps to the policy table in **Defend > Custom rules** in the Conso Refer to the following example cURL command that retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/custom-rules/id_delete.md b/openapi-specs/compute/desc/custom-rules/id_delete.md index c0d6dc8b0..01412abf3 100644 --- a/openapi-specs/compute/desc/custom-rules/id_delete.md +++ b/openapi-specs/compute/desc/custom-rules/id_delete.md @@ -5,7 +5,7 @@ Deletes a custom rule. Refer to the following example cURL command that deletes a custom rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/desc/cves/distribution_get.md b/openapi-specs/compute/desc/cves/distribution_get.md index aecddce23..7365e1a5e 100644 --- a/openapi-specs/compute/desc/cves/distribution_get.md +++ b/openapi-specs/compute/desc/cves/distribution_get.md @@ -3,7 +3,7 @@ Retrieves CVEs from the vulnerability database grouped into distribution where y The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/cves/get.md b/openapi-specs/compute/desc/cves/get.md index 469ea4b28..f81223298 100644 --- a/openapi-specs/compute/desc/cves/get.md +++ b/openapi-specs/compute/desc/cves/get.md @@ -6,7 +6,7 @@ A null response indicates that the CVE is not in our database. The following example curl command queries the Prisma Cloud Compute database for `CVE-2018-1102`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/defenders/app_embedded_post.md b/openapi-specs/compute/desc/defenders/app_embedded_post.md index 9167469d0..7999cbadb 100644 --- a/openapi-specs/compute/desc/defenders/app_embedded_post.md +++ b/openapi-specs/compute/desc/defenders/app_embedded_post.md @@ -5,7 +5,7 @@ Creates an augmented Dockerfile with Defender and dependencies included as a ZIP Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/defenders/daemonset_yaml_get.md b/openapi-specs/compute/desc/defenders/daemonset_yaml_get.md index 678901a8a..b68869081 100644 --- a/openapi-specs/compute/desc/defenders/daemonset_yaml_get.md +++ b/openapi-specs/compute/desc/defenders/daemonset_yaml_get.md @@ -10,7 +10,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https://:8083/api/v1/defenders/daemonset.yaml?consoleaddr=&listener=none&namespace=twistlock&orchestration=kubernetes' diff --git a/openapi-specs/compute/desc/defenders/daemonset_yaml_post.md b/openapi-specs/compute/desc/defenders/daemonset_yaml_post.md index 268e3ba81..af006122b 100644 --- a/openapi-specs/compute/desc/defenders/daemonset_yaml_post.md +++ b/openapi-specs/compute/desc/defenders/daemonset_yaml_post.md @@ -5,7 +5,7 @@ Creates a DaemonSet deployment file in YAML format that you can use to deploy De Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/defenders/download_get.md b/openapi-specs/compute/desc/defenders/download_get.md index 2d9435506..67f08c0e5 100644 --- a/openapi-specs/compute/desc/defenders/download_get.md +++ b/openapi-specs/compute/desc/defenders/download_get.md @@ -8,7 +8,7 @@ Use the query parameters to filter what data is returned. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o \ diff --git a/openapi-specs/compute/desc/defenders/fargate_json_post.md b/openapi-specs/compute/desc/defenders/fargate_json_post.md index 5128e90a1..e2e4e85ab 100644 --- a/openapi-specs/compute/desc/defenders/fargate_json_post.md +++ b/openapi-specs/compute/desc/defenders/fargate_json_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command: Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -23,7 +23,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/defenders/fargate_yaml_post.md b/openapi-specs/compute/desc/defenders/fargate_yaml_post.md index 9a8306a1b..95560526a 100644 --- a/openapi-specs/compute/desc/defenders/fargate_yaml_post.md +++ b/openapi-specs/compute/desc/defenders/fargate_yaml_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.yaml` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/yaml' \ -X POST \ diff --git a/openapi-specs/compute/desc/defenders/get.md b/openapi-specs/compute/desc/defenders/get.md index 471e7ef9d..8d2f5cd4c 100644 --- a/openapi-specs/compute/desc/defenders/get.md +++ b/openapi-specs/compute/desc/defenders/get.md @@ -7,7 +7,7 @@ This endpoint maps to the UI Console page in **Manage > Defenders > Defenders**. Refer to the following example cURL command that retrieves all deployed Defenders. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/defenders/helm_get.md b/openapi-specs/compute/desc/defenders/helm_get.md index b11f9c4b9..487c8b7e8 100644 --- a/openapi-specs/compute/desc/defenders/helm_get.md +++ b/openapi-specs/compute/desc/defenders/helm_get.md @@ -13,7 +13,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o twistlock-defender-helm.tar.gz \ diff --git a/openapi-specs/compute/desc/defenders/helm_post.md b/openapi-specs/compute/desc/defenders/helm_post.md index 2046e63eb..fb76807ae 100644 --- a/openapi-specs/compute/desc/defenders/helm_post.md +++ b/openapi-specs/compute/desc/defenders/helm_post.md @@ -5,7 +5,7 @@ Creates a Helm deployment file that you can use to deploy Defenders to your clus Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/defenders/id_delete.md b/openapi-specs/compute/desc/defenders/id_delete.md index f637ef850..e3ac52daf 100644 --- a/openapi-specs/compute/desc/defenders/id_delete.md +++ b/openapi-specs/compute/desc/defenders/id_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes an existing Defender on a host. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/desc/defenders/id_features_post.md b/openapi-specs/compute/desc/defenders/id_features_post.md index ec8e4c5f3..9b42f5fa0 100644 --- a/openapi-specs/compute/desc/defenders/id_features_post.md +++ b/openapi-specs/compute/desc/defenders/id_features_post.md @@ -3,7 +3,7 @@ Updates a deployed Defender's configuration. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/defenders/id_restart_post.md b/openapi-specs/compute/desc/defenders/id_restart_post.md index da0cc7811..7296a186b 100644 --- a/openapi-specs/compute/desc/defenders/id_restart_post.md +++ b/openapi-specs/compute/desc/defenders/id_restart_post.md @@ -3,7 +3,7 @@ Restarts Defender on a given host. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/defenders/id_upgrade_post.md b/openapi-specs/compute/desc/defenders/id_upgrade_post.md index f0d30d1e9..3e63c6414 100644 --- a/openapi-specs/compute/desc/defenders/id_upgrade_post.md +++ b/openapi-specs/compute/desc/defenders/id_upgrade_post.md @@ -7,7 +7,7 @@ Upgrades Defender on ``. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/defenders/image-name_get.md b/openapi-specs/compute/desc/defenders/image-name_get.md index e81ba3e19..19f360c07 100644 --- a/openapi-specs/compute/desc/defenders/image-name_get.md +++ b/openapi-specs/compute/desc/defenders/image-name_get.md @@ -5,7 +5,7 @@ Returns the full Docker image name for Defender. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/defenders/install-bundle_get.md b/openapi-specs/compute/desc/defenders/install-bundle_get.md index 882d0cd53..9b09e733f 100644 --- a/openapi-specs/compute/desc/defenders/install-bundle_get.md +++ b/openapi-specs/compute/desc/defenders/install-bundle_get.md @@ -5,7 +5,7 @@ Returns the certificate bundle that Defender needs to securely connect to Consol Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/defenders/names_get.md b/openapi-specs/compute/desc/defenders/names_get.md index 728eb6364..6339c1483 100644 --- a/openapi-specs/compute/desc/defenders/names_get.md +++ b/openapi-specs/compute/desc/defenders/names_get.md @@ -5,7 +5,7 @@ Retrieves a list of Defender hostnames that can be used as the `{id}` query para Refer to the following example cURL command that retrieves a list of all Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -15,7 +15,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of connected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -25,7 +25,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of disconnected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -37,7 +37,7 @@ The endpoint enlists all the connected and disconnected Defenders if do not spec Refer to the following example cURL command that retrieves a list of Defenders by type: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/defenders/rasp_post.md b/openapi-specs/compute/desc/defenders/rasp_post.md index 526a9e112..e110044dd 100644 --- a/openapi-specs/compute/desc/defenders/rasp_post.md +++ b/openapi-specs/compute/desc/defenders/rasp_post.md @@ -7,7 +7,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o rasp-defender.zip diff --git a/openapi-specs/compute/desc/defenders/serverless-bundle_post.md b/openapi-specs/compute/desc/defenders/serverless-bundle_post.md index df4f13e6a..7533e436b 100644 --- a/openapi-specs/compute/desc/defenders/serverless-bundle_post.md +++ b/openapi-specs/compute/desc/defenders/serverless-bundle_post.md @@ -5,7 +5,7 @@ Downloads a ZIP file with serverless Defender bundle. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/octet-stream' \ -o serverless_bundle.zip \ diff --git a/openapi-specs/compute/desc/defenders/summary_get.md b/openapi-specs/compute/desc/defenders/summary_get.md index 08be4ebc4..e308ef64b 100644 --- a/openapi-specs/compute/desc/defenders/summary_get.md +++ b/openapi-specs/compute/desc/defenders/summary_get.md @@ -6,7 +6,7 @@ Lists the number of Defenders in each defender category. Refer to the following example cURL command that retrieves a summary of Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/defenders/upgrade_post.md b/openapi-specs/compute/desc/defenders/upgrade_post.md index 2f0b4d39e..eacd6b779 100644 --- a/openapi-specs/compute/desc/defenders/upgrade_post.md +++ b/openapi-specs/compute/desc/defenders/upgrade_post.md @@ -9,7 +9,7 @@ To upgrade Serverless and Fargate Defenders, re-embed them. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/deployment/daemonsets_deploy_post.md b/openapi-specs/compute/desc/deployment/daemonsets_deploy_post.md index 94ec9386b..b60f28346 100644 --- a/openapi-specs/compute/desc/deployment/daemonsets_deploy_post.md +++ b/openapi-specs/compute/desc/deployment/daemonsets_deploy_post.md @@ -5,7 +5,7 @@ It identifies the cluster's API server, user, and credentials. Use the various request parameters to control the properties of the deployed DaemonSet. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/deployment/daemonsets_get.md b/openapi-specs/compute/desc/deployment/daemonsets_get.md index a0b7f3798..0385acf75 100644 --- a/openapi-specs/compute/desc/deployment/daemonsets_get.md +++ b/openapi-specs/compute/desc/deployment/daemonsets_get.md @@ -3,7 +3,7 @@ You must specify a `credentialID`, of type `kubeconfig`, which identifies your c Credentials are managed in Console's credentials store (`/api/v1/credentials`). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/feeds/custom-vulnerabilities_get.md b/openapi-specs/compute/desc/feeds/custom-vulnerabilities_get.md index 71834f19d..d661acf55 100644 --- a/openapi-specs/compute/desc/feeds/custom-vulnerabilities_get.md +++ b/openapi-specs/compute/desc/feeds/custom-vulnerabilities_get.md @@ -11,7 +11,7 @@ Vulnerability rules can be created using the Prisma Cloud Compute. Refer to the following cURL command that retrieves a list of all the custom vulnerabilities and associated rules. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/feeds/custom-vulnerabilities_put.md b/openapi-specs/compute/desc/feeds/custom-vulnerabilities_put.md index 4fe1c1898..149ada978 100644 --- a/openapi-specs/compute/desc/feeds/custom-vulnerabilities_put.md +++ b/openapi-specs/compute/desc/feeds/custom-vulnerabilities_put.md @@ -5,7 +5,7 @@ Updates all the custom vulnerabilities and associated rules simultaneously for h Refer to the following cURL command that updates a vulnerability for a library named `internal-lib`, and specifies that its versions `1.1` to `1.8` are known to be vulnerable. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -37,7 +37,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: **Note:** You will need `jq` to execute this command. ``` - $ curl -k \ + $ curl \ -u \ https:///api/v/feeds/custom/custom-vulnerabilities \ | jq '.' > custom_vulnerability_rules.json @@ -66,7 +66,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 3. Update the rules by pushing the new JSON payload. **Note:** Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -77,7 +77,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 4. Run the cURL command for the `GET /api/vVERSION/feeds/custom/custom-vulnerabilities` endpoint and you can see that the previously installed rules are now overwritten with your new rules. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/feeds/custom_vulnerabilities_digest_get.md b/openapi-specs/compute/desc/feeds/custom_vulnerabilities_digest_get.md index 0eb501d9b..02af9a3ab 100644 --- a/openapi-specs/compute/desc/feeds/custom_vulnerabilities_digest_get.md +++ b/openapi-specs/compute/desc/feeds/custom_vulnerabilities_digest_get.md @@ -5,7 +5,7 @@ Returns the unique digest for the custom vulnerabilities and associated rules fo The following cURL command retrieves the digest for the configured custom vulnerabilities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/feeds/cve_allow_list_digest_get.md b/openapi-specs/compute/desc/feeds/cve_allow_list_digest_get.md index e27f21251..911a07fd9 100644 --- a/openapi-specs/compute/desc/feeds/cve_allow_list_digest_get.md +++ b/openapi-specs/compute/desc/feeds/cve_allow_list_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the Common Vulnerabilities and Exposures (CVE) a The following cURL command retrieves the digest for the configured CVE allow list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/feeds/cve_allow_list_get.md b/openapi-specs/compute/desc/feeds/cve_allow_list_get.md index 34fb2c7f8..d73ce17c2 100644 --- a/openapi-specs/compute/desc/feeds/cve_allow_list_get.md +++ b/openapi-specs/compute/desc/feeds/cve_allow_list_get.md @@ -5,7 +5,7 @@ Retrieves the globally allow-listed Common Vulnerabilities and Exposures (CVE). The following cURL command retrieves the globally allow-listed CVEs. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/feeds/cve_allow_list_put.md b/openapi-specs/compute/desc/feeds/cve_allow_list_put.md index 850016965..c4e2ce0af 100644 --- a/openapi-specs/compute/desc/feeds/cve_allow_list_put.md +++ b/openapi-specs/compute/desc/feeds/cve_allow_list_put.md @@ -7,7 +7,7 @@ Globally allow-lists a set of Common Vulnerabilities and Exposures (CVE). The following cURL command installs a global CVE allow-list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/desc/feeds/ips_digest_get.md b/openapi-specs/compute/desc/feeds/ips_digest_get.md index d059271ea..ae2a09915 100644 --- a/openapi-specs/compute/desc/feeds/ips_digest_get.md +++ b/openapi-specs/compute/desc/feeds/ips_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the list of suspicious or high risk IP endpoints The following cURL command retrieves the digest for the banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/feeds/ips_get.md b/openapi-specs/compute/desc/feeds/ips_get.md index 381257d47..f51c577a7 100644 --- a/openapi-specs/compute/desc/feeds/ips_get.md +++ b/openapi-specs/compute/desc/feeds/ips_get.md @@ -5,7 +5,7 @@ Retrieves the customized list of block-listed suspicious or high-risk IP address The following cURL command retrieves the list of globally block-listed suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/feeds/ips_put.md b/openapi-specs/compute/desc/feeds/ips_put.md index 6f8fc2419..5bf791044 100644 --- a/openapi-specs/compute/desc/feeds/ips_put.md +++ b/openapi-specs/compute/desc/feeds/ips_put.md @@ -7,7 +7,7 @@ Bans a custom list of suspicious or high-risk IP addresses. The following cURL command installs a custom list of banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/desc/feeds/malware_digest_get.md b/openapi-specs/compute/desc/feeds/malware_digest_get.md index 005c476a2..522a59aef 100644 --- a/openapi-specs/compute/desc/feeds/malware_digest_get.md +++ b/openapi-specs/compute/desc/feeds/malware_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for all the MD5 signatures of malicious executables The following cURL command retrieves the digest for the configured list for the MD5 signatures of malicious executables. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/feeds/malware_get.md b/openapi-specs/compute/desc/feeds/malware_get.md index 2a7aa128b..72bee6594 100644 --- a/openapi-specs/compute/desc/feeds/malware_get.md +++ b/openapi-specs/compute/desc/feeds/malware_get.md @@ -5,7 +5,7 @@ Returns the customized list of MD5 signatures of malicious executables. Refer to the following cURL command that retrieves the list of MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/feeds/malware_put.md b/openapi-specs/compute/desc/feeds/malware_put.md index 7e6ec5da0..176304cb9 100644 --- a/openapi-specs/compute/desc/feeds/malware_put.md +++ b/openapi-specs/compute/desc/feeds/malware_put.md @@ -7,7 +7,7 @@ Creates a custom list of malware MD5 signatures of malicious executables. Refer to the following cURL command that installs a custom list of malware MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/desc/feeds/refresh_post.md b/openapi-specs/compute/desc/feeds/refresh_post.md index a83c40d10..1c756edae 100644 --- a/openapi-specs/compute/desc/feeds/refresh_post.md +++ b/openapi-specs/compute/desc/feeds/refresh_post.md @@ -1,7 +1,7 @@ Triggers Console to refresh its data from the **Intelligence Stream** ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/forensic/activities_download_get.md b/openapi-specs/compute/desc/forensic/activities_download_get.md index 8a2dbd926..1918e3790 100644 --- a/openapi-specs/compute/desc/forensic/activities_download_get.md +++ b/openapi-specs/compute/desc/forensic/activities_download_get.md @@ -3,7 +3,7 @@ Downloads all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/desc/forensic/activities_get.md b/openapi-specs/compute/desc/forensic/activities_get.md index c8fb1d0cd..c0761aa60 100644 --- a/openapi-specs/compute/desc/forensic/activities_get.md +++ b/openapi-specs/compute/desc/forensic/activities_get.md @@ -3,7 +3,7 @@ Retrieves all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/groups/get.md b/openapi-specs/compute/desc/groups/get.md index 6a0daa2eb..34a2711e0 100644 --- a/openapi-specs/compute/desc/groups/get.md +++ b/openapi-specs/compute/desc/groups/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups. ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/desc/groups/id_delete.md b/openapi-specs/compute/desc/groups/id_delete.md index 5962a1135..0c3cfa1cd 100644 --- a/openapi-specs/compute/desc/groups/id_delete.md +++ b/openapi-specs/compute/desc/groups/id_delete.md @@ -13,7 +13,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes a collection with the name `{id}`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/desc/groups/names.md b/openapi-specs/compute/desc/groups/names.md index 80f34f536..9c2dd1089 100644 --- a/openapi-specs/compute/desc/groups/names.md +++ b/openapi-specs/compute/desc/groups/names.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/desc/groups/post.md b/openapi-specs/compute/desc/groups/post.md index d0fc23a6d..ebad011f4 100644 --- a/openapi-specs/compute/desc/groups/post.md +++ b/openapi-specs/compute/desc/groups/post.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that creates a new group named `my-group`: ```bash -$ curl -k \ +$ curl \ -X POST \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/desc/high-availability/get.md b/openapi-specs/compute/desc/high-availability/get.md index a988d47ef..83d5d9b46 100644 --- a/openapi-specs/compute/desc/high-availability/get.md +++ b/openapi-specs/compute/desc/high-availability/get.md @@ -3,7 +3,7 @@ Returns the status of high high availability. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/desc/hosts/download_get.md b/openapi-specs/compute/desc/hosts/download_get.md index ab691fb49..34e546573 100644 --- a/openapi-specs/compute/desc/hosts/download_get.md +++ b/openapi-specs/compute/desc/hosts/download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Hosts > Refer to the following example cURL command that downloads all host scan reports to a CSV file called `hosts_report.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o hosts_report.csv \ diff --git a/openapi-specs/compute/desc/hosts/filters_get.md b/openapi-specs/compute/desc/hosts/filters_get.md index 4bf6df5e6..a39ec8a97 100644 --- a/openapi-specs/compute/desc/hosts/filters_get.md +++ b/openapi-specs/compute/desc/hosts/filters_get.md @@ -3,7 +3,7 @@ Returns host filters such as distribution and host name. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/hosts/get.md b/openapi-specs/compute/desc/hosts/get.md index 43020558a..9bdf69c6c 100644 --- a/openapi-specs/compute/desc/hosts/get.md +++ b/openapi-specs/compute/desc/hosts/get.md @@ -37,7 +37,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following cURL command that retrieves all host scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/hosts/info_get.md b/openapi-specs/compute/desc/hosts/info_get.md index 5b3903b7e..523024735 100644 --- a/openapi-specs/compute/desc/hosts/info_get.md +++ b/openapi-specs/compute/desc/hosts/info_get.md @@ -5,7 +5,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/hosts/scan_post.md b/openapi-specs/compute/desc/hosts/scan_post.md index 6b72cbfa3..0e0e7b074 100644 --- a/openapi-specs/compute/desc/hosts/scan_post.md +++ b/openapi-specs/compute/desc/hosts/scan_post.md @@ -3,7 +3,7 @@ Re-scan all hosts immediately. Refer to the following example command that forces Prisma Cloud Compute to re-scan all hosts: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/hosts/scan diff --git a/openapi-specs/compute/desc/images/defender_layer_get.md b/openapi-specs/compute/desc/images/defender_layer_get.md index 1dfe3633d..4bb88d62c 100644 --- a/openapi-specs/compute/desc/images/defender_layer_get.md +++ b/openapi-specs/compute/desc/images/defender_layer_get.md @@ -5,7 +5,7 @@ Returns the the Prisma Cloud Compute Defender in as a layer that can be used in Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/compute/desc/images/defender_rasp_get.md b/openapi-specs/compute/desc/images/defender_rasp_get.md index a8e145ff7..260e271a1 100644 --- a/openapi-specs/compute/desc/images/defender_rasp_get.md +++ b/openapi-specs/compute/desc/images/defender_rasp_get.md @@ -3,7 +3,7 @@ Returns the the Prisma Cloud Compute Defender as the RASP Defender A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/compute/desc/images/download_get.md b/openapi-specs/compute/desc/images/download_get.md index c7b987aeb..9b8011af9 100644 --- a/openapi-specs/compute/desc/images/download_get.md +++ b/openapi-specs/compute/desc/images/download_get.md @@ -16,7 +16,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -27,7 +27,7 @@ $ curl -k \ Refer to the following example cURL command that might be useful for developers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/images/get.md b/openapi-specs/compute/desc/images/get.md index 3f594c6c8..dcef1b0a4 100644 --- a/openapi-specs/compute/desc/images/get.md +++ b/openapi-specs/compute/desc/images/get.md @@ -26,7 +26,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following cURL command that retrieves a compact scan report for all images: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -36,7 +36,7 @@ $ curl -k \ Refer to the following cURL command that retrieves a compact scan report for an Ubuntu image: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -47,7 +47,7 @@ The name query is synonymous with the filter images text field in the Console UI Refer to the following cURL command that retrieves the scan report for an image with the matching SHA-256 hash: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/images/names_get.md b/openapi-specs/compute/desc/images/names_get.md index 3a234df98..311b33574 100644 --- a/openapi-specs/compute/desc/images/names_get.md +++ b/openapi-specs/compute/desc/images/names_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/desc/images/scan_post.md b/openapi-specs/compute/desc/images/scan_post.md index 8d802727a..36278249b 100644 --- a/openapi-specs/compute/desc/images/scan_post.md +++ b/openapi-specs/compute/desc/images/scan_post.md @@ -5,7 +5,7 @@ Re-scan all images immediately. This endpoint returns the time that the scans we Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all images: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/images/scan diff --git a/openapi-specs/compute/desc/images/twistlock_defender_tar_gz_get.md b/openapi-specs/compute/desc/images/twistlock_defender_tar_gz_get.md index 7852e12ba..36fb66ae8 100644 --- a/openapi-specs/compute/desc/images/twistlock_defender_tar_gz_get.md +++ b/openapi-specs/compute/desc/images/twistlock_defender_tar_gz_get.md @@ -1,7 +1,7 @@ Download the Container Defender image for Linux platforms. ```bash -$ curl -k \ +$ curl \ -u \ -H "Content-Type: application/octet-stream" \ -o twistlock_defender.tar.gz \ diff --git a/openapi-specs/compute/desc/intro.md b/openapi-specs/compute/desc/intro.md index 9038a3734..5b4ed5864 100644 --- a/openapi-specs/compute/desc/intro.md +++ b/openapi-specs/compute/desc/intro.md @@ -47,7 +47,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -58,7 +58,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -70,7 +70,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/compute/desc/kubernetes/scan_post.md b/openapi-specs/compute/desc/kubernetes/scan_post.md index 15d614c1a..ab74d5d96 100644 --- a/openapi-specs/compute/desc/kubernetes/scan_post.md +++ b/openapi-specs/compute/desc/kubernetes/scan_post.md @@ -3,7 +3,7 @@ This endpoint will trigger a Kubernetes scan. The following example curl command uses basic auth to initiate this scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/logs/console_get.md b/openapi-specs/compute/desc/logs/console_get.md index 80ece6611..113543540 100644 --- a/openapi-specs/compute/desc/logs/console_get.md +++ b/openapi-specs/compute/desc/logs/console_get.md @@ -3,7 +3,7 @@ Retrieves the latest Console log messages. The following example curl command retrieves the 10 latest Console log messages: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/logs/defender_download_get.md b/openapi-specs/compute/desc/logs/defender_download_get.md index 5d6718db0..05bbc6a75 100644 --- a/openapi-specs/compute/desc/logs/defender_download_get.md +++ b/openapi-specs/compute/desc/logs/defender_download_get.md @@ -5,7 +5,7 @@ The hostname can be returned from the endpoint `/defenders/names` The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/logs/defender_get.md b/openapi-specs/compute/desc/logs/defender_get.md index 1e733a746..f2e3b25df 100644 --- a/openapi-specs/compute/desc/logs/defender_get.md +++ b/openapi-specs/compute/desc/logs/defender_get.md @@ -7,7 +7,7 @@ Note that you must quote the URL when running the following command. Otherwise the shell misinterprets the ampersand (`&`) as the end of the command, and puts the curl command in the background. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/logs/system_download_get.md b/openapi-specs/compute/desc/logs/system_download_get.md index 1e5b5b873..43bb0abce 100644 --- a/openapi-specs/compute/desc/logs/system_download_get.md +++ b/openapi-specs/compute/desc/logs/system_download_get.md @@ -4,7 +4,7 @@ This endpoint will return the system debug logs with `tar.gz` file extension. The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/pcf-droplets/addresses_get.md b/openapi-specs/compute/desc/pcf-droplets/addresses_get.md index 257a47455..bb3365015 100644 --- a/openapi-specs/compute/desc/pcf-droplets/addresses_get.md +++ b/openapi-specs/compute/desc/pcf-droplets/addresses_get.md @@ -5,7 +5,7 @@ You can also add optional query parameters to this API call, in this example `cl The following example curl command retrieves the list of addresses: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/pcf-droplets/download_get.md b/openapi-specs/compute/desc/pcf-droplets/download_get.md index ad761e744..ac8546a25 100644 --- a/openapi-specs/compute/desc/pcf-droplets/download_get.md +++ b/openapi-specs/compute/desc/pcf-droplets/download_get.md @@ -3,7 +3,7 @@ This endpoint will download the list of configured cloud controller addresses co The following example curl command retrieves the list of addresses and outputs it to a file call `PCF_blobstores.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/pcf-droplets/get.md b/openapi-specs/compute/desc/pcf-droplets/get.md index 930d16948..aad607cba 100644 --- a/openapi-specs/compute/desc/pcf-droplets/get.md +++ b/openapi-specs/compute/desc/pcf-droplets/get.md @@ -3,7 +3,7 @@ This endpoint will return the full metadata of PCF blobstore from page **Monitor The following example curl command will retrieve this: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/pcf-droplets/scan_post.md b/openapi-specs/compute/desc/pcf-droplets/scan_post.md index 34e75b26c..d9c9df4dd 100644 --- a/openapi-specs/compute/desc/pcf-droplets/scan_post.md +++ b/openapi-specs/compute/desc/pcf-droplets/scan_post.md @@ -3,7 +3,7 @@ This endpoint will kick off a scan of the any PCF Blobstores you have configured Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/pcf-droplets/stop_post.md b/openapi-specs/compute/desc/pcf-droplets/stop_post.md index 94c376972..2c4d5264a 100644 --- a/openapi-specs/compute/desc/pcf-droplets/stop_post.md +++ b/openapi-specs/compute/desc/pcf-droplets/stop_post.md @@ -3,7 +3,7 @@ This endpoint will instruct the PFC Defenders to stop scanning. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/policies/compliance_ci_images_get.md b/openapi-specs/compute/desc/policies/compliance_ci_images_get.md index f97130a97..9a2b2abf5 100644 --- a/openapi-specs/compute/desc/policies/compliance_ci_images_get.md +++ b/openapi-specs/compute/desc/policies/compliance_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > CI** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/policies/compliance_ci_serverless_get.md b/openapi-specs/compute/desc/policies/compliance_ci_serverless_get.md index 59195f070..2f30e2d74 100644 --- a/openapi-specs/compute/desc/policies/compliance_ci_serverless_get.md +++ b/openapi-specs/compute/desc/policies/compliance_ci_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Functions > CI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/policies/compliance_container_get.md b/openapi-specs/compute/desc/policies/compliance_container_get.md index 7f10245ea..657d4f2dd 100644 --- a/openapi-specs/compute/desc/policies/compliance_container_get.md +++ b/openapi-specs/compute/desc/policies/compliance_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > Deployed** Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/policies/compliance_container_impacted_get.md b/openapi-specs/compute/desc/policies/compliance_container_impacted_get.md index 607bfa3c8..de9e0ee77 100644 --- a/openapi-specs/compute/desc/policies/compliance_container_impacted_get.md +++ b/openapi-specs/compute/desc/policies/compliance_container_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of containers captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/compliance/container/impacted?ruleName=' diff --git a/openapi-specs/compute/desc/policies/compliance_host_get.md b/openapi-specs/compute/desc/policies/compliance_host_get.md index c029ecf7f..a5e429af5 100755 --- a/openapi-specs/compute/desc/policies/compliance_host_get.md +++ b/openapi-specs/compute/desc/policies/compliance_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Hosts > Running hosts** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/policies/compliance_serverless_get.md b/openapi-specs/compute/desc/policies/compliance_serverless_get.md index c7de886c1..f559179f6 100755 --- a/openapi-specs/compute/desc/policies/compliance_serverless_get.md +++ b/openapi-specs/compute/desc/policies/compliance_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Functions > Functions** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/policies/compliance_vms_get.md b/openapi-specs/compute/desc/policies/compliance_vms_get.md index f7d7e1a49..b61d20d9d 100755 --- a/openapi-specs/compute/desc/policies/compliance_vms_get.md +++ b/openapi-specs/compute/desc/policies/compliance_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Hosts > VM ima The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/policies/compliance_vms_impacted_get.md b/openapi-specs/compute/desc/policies/compliance_vms_impacted_get.md index 9cf5b9d03..4ac3f2832 100644 --- a/openapi-specs/compute/desc/policies/compliance_vms_impacted_get.md +++ b/openapi-specs/compute/desc/policies/compliance_vms_impacted_get.md @@ -8,7 +8,7 @@ Use query parameters to retrieve the list of impacted resources by *account ID*, Refer to the following example cURL command, which retrieves a list of impacted resources: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/policies/docker_get.md b/openapi-specs/compute/desc/policies/docker_get.md index f56872c67..e8ab3d5bb 100644 --- a/openapi-specs/compute/desc/policies/docker_get.md +++ b/openapi-specs/compute/desc/policies/docker_get.md @@ -3,7 +3,7 @@ Retrieves a list of all access control rules for Docker Engine commands. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/policies/docker_put.md b/openapi-specs/compute/desc/policies/docker_put.md index 860e2bb1e..a5d0c0230 100644 --- a/openapi-specs/compute/desc/policies/docker_put.md +++ b/openapi-specs/compute/desc/policies/docker_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove Docker access control rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/docker \ | jq '.' > docker_access_control_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove Docker access control rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/desc/policies/firewall_app-embedded_get.md b/openapi-specs/compute/desc/policies/firewall_app-embedded_get.md index 3da2a7cd6..4e59c4c21 100644 --- a/openapi-specs/compute/desc/policies/firewall_app-embedded_get.md +++ b/openapi-specs/compute/desc/policies/firewall_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > App-Embedded** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/policies/firewall_app_container_get.md b/openapi-specs/compute/desc/policies/firewall_app_container_get.md index 3b8c157fa..f0486aa4c 100644 --- a/openapi-specs/compute/desc/policies/firewall_app_container_get.md +++ b/openapi-specs/compute/desc/policies/firewall_app_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Container** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/container' diff --git a/openapi-specs/compute/desc/policies/firewall_app_host_get.md b/openapi-specs/compute/desc/policies/firewall_app_host_get.md index adb90128a..75c22add4 100644 --- a/openapi-specs/compute/desc/policies/firewall_app_host_get.md +++ b/openapi-specs/compute/desc/policies/firewall_app_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Host** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/policies/firewall_app_network_list_get.md b/openapi-specs/compute/desc/policies/firewall_app_network_list_get.md index 13f7fb450..5a1f87d85 100644 --- a/openapi-specs/compute/desc/policies/firewall_app_network_list_get.md +++ b/openapi-specs/compute/desc/policies/firewall_app_network_list_get.md @@ -11,7 +11,7 @@ This endpoint maps to **Defend > WAAS > Network lists** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/network-list' diff --git a/openapi-specs/compute/desc/policies/firewall_app_out-of-band_get.md b/openapi-specs/compute/desc/policies/firewall_app_out-of-band_get.md index d4f72d041..9ae662687 100644 --- a/openapi-specs/compute/desc/policies/firewall_app_out-of-band_get.md +++ b/openapi-specs/compute/desc/policies/firewall_app_out-of-band_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/policies/firewall_app_out-of-band_impacted_get.md b/openapi-specs/compute/desc/policies/firewall_app_out-of-band_impacted_get.md index 25d2c6691..96a427f94 100644 --- a/openapi-specs/compute/desc/policies/firewall_app_out-of-band_impacted_get.md +++ b/openapi-specs/compute/desc/policies/firewall_app_out-of-band_impacted_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/policies/firewall_app_rasp_get.md b/openapi-specs/compute/desc/policies/firewall_app_rasp_get.md index 15d481cf3..a201d3beb 100644 --- a/openapi-specs/compute/desc/policies/firewall_app_rasp_get.md +++ b/openapi-specs/compute/desc/policies/firewall_app_rasp_get.md @@ -1,7 +1,7 @@ Retrieves a list of all application firewall (CNAF) rules for RASP. ``` -$ curl -k \ +$ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp ``` diff --git a/openapi-specs/compute/desc/policies/firewall_app_rasp_put.md b/openapi-specs/compute/desc/policies/firewall_app_rasp_put.md index 04ba86483..1101c7690 100644 --- a/openapi-specs/compute/desc/policies/firewall_app_rasp_put.md +++ b/openapi-specs/compute/desc/policies/firewall_app_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp \ | jq '.' > app_firewall_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/desc/policies/firewall_app_serverless_get.md b/openapi-specs/compute/desc/policies/firewall_app_serverless_get.md index d19e909f3..90cac0015 100644 --- a/openapi-specs/compute/desc/policies/firewall_app_serverless_get.md +++ b/openapi-specs/compute/desc/policies/firewall_app_serverless_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Serverless** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/serverless' diff --git a/openapi-specs/compute/desc/policies/firewall_network_container_get.md b/openapi-specs/compute/desc/policies/firewall_network_container_get.md index 3f1343b53..82e656818 100644 --- a/openapi-specs/compute/desc/policies/firewall_network_container_get.md +++ b/openapi-specs/compute/desc/policies/firewall_network_container_get.md @@ -4,7 +4,7 @@ Retrieves a list of all CNNS container and host rules. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/policies/firewall_network_container_put.md b/openapi-specs/compute/desc/policies/firewall_network_container_put.md index fd9263430..cffb3f1c4 100644 --- a/openapi-specs/compute/desc/policies/firewall_network_container_put.md +++ b/openapi-specs/compute/desc/policies/firewall_network_container_put.md @@ -9,7 +9,7 @@ The procedure to add, edit, or remove rules is: Refer to the following example cURL command that retrieves a list of all rules, pretty-print the JSON response, and save the results to a file: ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -26,7 +26,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/desc/policies/firewall_network_entities_get.md b/openapi-specs/compute/desc/policies/firewall_network_entities_get.md index 757121f70..28ed8dbcb 100644 --- a/openapi-specs/compute/desc/policies/firewall_network_entities_get.md +++ b/openapi-specs/compute/desc/policies/firewall_network_entities_get.md @@ -1,7 +1,7 @@ Retrieves a list of all CNNF network objects. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/policies/firewall_network_entities_put.md b/openapi-specs/compute/desc/policies/firewall_network_entities_put.md index 83c023286..39044ee10 100644 --- a/openapi-specs/compute/desc/policies/firewall_network_entities_put.md +++ b/openapi-specs/compute/desc/policies/firewall_network_entities_put.md @@ -3,7 +3,7 @@ Updates the list of CNNF network objects. The following example curl command updates the network objects. There is an example of all three types (images,subnets, and applications ): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/desc/policies/policies.md b/openapi-specs/compute/desc/policies/policies.md index 69768c03d..97be7b616 100644 --- a/openapi-specs/compute/desc/policies/policies.md +++ b/openapi-specs/compute/desc/policies/policies.md @@ -21,7 +21,7 @@ To add, edit, or remove vulnerability rules from a policy: For example, the following cURL command uses basic auth to retrieve a list of all image vulnerability rules, pretty-prints the JSON response, and saves the results to a `vulnerability_rules.json` file. ```bash - $ curl -k \ + $ curl \ -u \ https:///api/v1/policies/runtime/host \ | jq '.' > vulnerability_rules.json @@ -36,7 +36,7 @@ To add, edit, or remove vulnerability rules from a policy: **Note:** Remember to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -107,7 +107,7 @@ Use the `PUT` method to delete all rules by submitting an empty JSON object. For example, to delete all host runtime rules: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/desc/policies/runtime_app-embedded_get.md b/openapi-specs/compute/desc/policies/runtime_app-embedded_get.md index fcf0ba8b9..517b741bb 100755 --- a/openapi-specs/compute/desc/policies/runtime_app-embedded_get.md +++ b/openapi-specs/compute/desc/policies/runtime_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > App-Embedded policy** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/policies/runtime_container_get.md b/openapi-specs/compute/desc/policies/runtime_container_get.md index f1b50b727..65cd10660 100644 --- a/openapi-specs/compute/desc/policies/runtime_container_get.md +++ b/openapi-specs/compute/desc/policies/runtime_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Container policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/policies/runtime_container_impacted_get.md b/openapi-specs/compute/desc/policies/runtime_container_impacted_get.md index 195f75547..e026d33b9 100644 --- a/openapi-specs/compute/desc/policies/runtime_container_impacted_get.md +++ b/openapi-specs/compute/desc/policies/runtime_container_impacted_get.md @@ -6,7 +6,7 @@ In the Console UI, you can see how it works by going to the **Defend > Runtime > Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ $ curl -k \ For additional help with your `ruleName`: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/policies/runtime_host_get.md b/openapi-specs/compute/desc/policies/runtime_host_get.md index 38800596c..559ef690a 100644 --- a/openapi-specs/compute/desc/policies/runtime_host_get.md +++ b/openapi-specs/compute/desc/policies/runtime_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Host policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/policies/runtime_rasp_get.md b/openapi-specs/compute/desc/policies/runtime_rasp_get.md index 5b7a76457..55a6ff05b 100644 --- a/openapi-specs/compute/desc/policies/runtime_rasp_get.md +++ b/openapi-specs/compute/desc/policies/runtime_rasp_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your RASP runtime policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/policies/runtime_rasp_put.md b/openapi-specs/compute/desc/policies/runtime_rasp_put.md index bba60ba81..f71fb4b93 100644 --- a/openapi-specs/compute/desc/policies/runtime_rasp_put.md +++ b/openapi-specs/compute/desc/policies/runtime_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve the rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET @@ -24,7 +24,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -H "Content-Type:application/json" \ -X PUT \ diff --git a/openapi-specs/compute/desc/policies/runtime_serverless_get.md b/openapi-specs/compute/desc/policies/runtime_serverless_get.md index 44326bbf6..c98489e16 100644 --- a/openapi-specs/compute/desc/policies/runtime_serverless_get.md +++ b/openapi-specs/compute/desc/policies/runtime_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Serverless policy** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/policies/secrets_get.md b/openapi-specs/compute/desc/policies/secrets_get.md index 89e6b9c0e..cb4ecb37c 100644 --- a/openapi-specs/compute/desc/policies/secrets_get.md +++ b/openapi-specs/compute/desc/policies/secrets_get.md @@ -3,7 +3,7 @@ Retrieves a list of all secrets rules. The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/policies/secrets diff --git a/openapi-specs/compute/desc/policies/secrets_put.md b/openapi-specs/compute/desc/policies/secrets_put.md index 1e8877ca1..04fd41f24 100644 --- a/openapi-specs/compute/desc/policies/secrets_put.md +++ b/openapi-specs/compute/desc/policies/secrets_put.md @@ -10,7 +10,7 @@ The procedure to add, edit, or remove secrets rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/secrets \ | jq '.' > secrets_rules.json @@ -24,7 +24,7 @@ The procedure to add, edit, or remove secrets rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/compute/desc/policies/trust_get.md b/openapi-specs/compute/desc/policies/trust_get.md index 8de1ba409..0805d6777 100644 --- a/openapi-specs/compute/desc/policies/trust_get.md +++ b/openapi-specs/compute/desc/policies/trust_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/policies/trust_put.md b/openapi-specs/compute/desc/policies/trust_put.md index fccd4b91e..7fec72031 100644 --- a/openapi-specs/compute/desc/policies/trust_put.md +++ b/openapi-specs/compute/desc/policies/trust_put.md @@ -1,7 +1,7 @@ Updates the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/desc/policies/vulnerability_ci_images_get.md b/openapi-specs/compute/desc/policies/vulnerability_ci_images_get.md index abc3da8fa..ce0d50a29 100644 --- a/openapi-specs/compute/desc/policies/vulnerability_ci_images_get.md +++ b/openapi-specs/compute/desc/policies/vulnerability_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/policies/vulnerability_ci_serverless_get.md b/openapi-specs/compute/desc/policies/vulnerability_ci_serverless_get.md index 958c86495..6fb5f93ce 100644 --- a/openapi-specs/compute/desc/policies/vulnerability_ci_serverless_get.md +++ b/openapi-specs/compute/desc/policies/vulnerability_ci_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/policies/vulnerability_coderepos_get.md b/openapi-specs/compute/desc/policies/vulnerability_coderepos_get.md index 08dfed8e1..a4ac62f33 100644 --- a/openapi-specs/compute/desc/policies/vulnerability_coderepos_get.md +++ b/openapi-specs/compute/desc/policies/vulnerability_coderepos_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Code repositories** in the Co Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/vulnerability/coderepos' diff --git a/openapi-specs/compute/desc/policies/vulnerability_coderepos_impacted_get.md b/openapi-specs/compute/desc/policies/vulnerability_coderepos_impacted_get.md index a401a12c4..e64ef768e 100644 --- a/openapi-specs/compute/desc/policies/vulnerability_coderepos_impacted_get.md +++ b/openapi-specs/compute/desc/policies/vulnerability_coderepos_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/coderepos/impacted?project=&ruleName=' ``` diff --git a/openapi-specs/compute/desc/policies/vulnerability_coderepos_put.md b/openapi-specs/compute/desc/policies/vulnerability_coderepos_put.md index 514eec136..a002415b9 100644 --- a/openapi-specs/compute/desc/policies/vulnerability_coderepos_put.md +++ b/openapi-specs/compute/desc/policies/vulnerability_coderepos_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Code repo Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT 'https:///api/v/policies/vulnerability/coderepos' \ diff --git a/openapi-specs/compute/desc/policies/vulnerability_host_get.md b/openapi-specs/compute/desc/policies/vulnerability_host_get.md index 3b9b14b9c..260da7675 100644 --- a/openapi-specs/compute/desc/policies/vulnerability_host_get.md +++ b/openapi-specs/compute/desc/policies/vulnerability_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Hosts > Running hosts** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/policies/vulnerability_host_impacted_get.md b/openapi-specs/compute/desc/policies/vulnerability_host_impacted_get.md index 346368518..f44592830 100644 --- a/openapi-specs/compute/desc/policies/vulnerability_host_impacted_get.md +++ b/openapi-specs/compute/desc/policies/vulnerability_host_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by `RULE_NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/host/impacted?project={PROJECT_NAME}&ruleName={RULE_NAME}' ``` diff --git a/openapi-specs/compute/desc/policies/vulnerability_images_get.md b/openapi-specs/compute/desc/policies/vulnerability_images_get.md index 33581be37..57359bb8f 100644 --- a/openapi-specs/compute/desc/policies/vulnerability_images_get.md +++ b/openapi-specs/compute/desc/policies/vulnerability_images_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images?project=" diff --git a/openapi-specs/compute/desc/policies/vulnerability_images_impacted_get.md b/openapi-specs/compute/desc/policies/vulnerability_images_impacted_get.md index ae1d5e396..e2a4efa23 100644 --- a/openapi-specs/compute/desc/policies/vulnerability_images_impacted_get.md +++ b/openapi-specs/compute/desc/policies/vulnerability_images_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of images caught by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images/impacted?project=&ruleName=" diff --git a/openapi-specs/compute/desc/policies/vulnerability_images_put.md b/openapi-specs/compute/desc/policies/vulnerability_images_put.md index b3330dab7..8c3cc8af2 100644 --- a/openapi-specs/compute/desc/policies/vulnerability_images_put.md +++ b/openapi-specs/compute/desc/policies/vulnerability_images_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -X PUT 'https:///api/v/policies/vulnerability/images' \ --data '{ diff --git a/openapi-specs/compute/desc/policies/vulnerability_serverless_get.md b/openapi-specs/compute/desc/policies/vulnerability_serverless_get.md index c7a8e2ef5..41c7e75d8 100644 --- a/openapi-specs/compute/desc/policies/vulnerability_serverless_get.md +++ b/openapi-specs/compute/desc/policies/vulnerability_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Functions** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/policies/vulnerability_serverless_put.md b/openapi-specs/compute/desc/policies/vulnerability_serverless_put.md index 2b567b5b1..5199f0997 100644 --- a/openapi-specs/compute/desc/policies/vulnerability_serverless_put.md +++ b/openapi-specs/compute/desc/policies/vulnerability_serverless_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k 'https:///api/v/policies/vulnerability/serverless' \ +$ curl 'https:///api/v/policies/vulnerability/serverless' \ -X PUT \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/desc/policies/vulnerability_vms_get.md b/openapi-specs/compute/desc/policies/vulnerability_vms_get.md index 117d2cc4a..e37c1520f 100644 --- a/openapi-specs/compute/desc/policies/vulnerability_vms_get.md +++ b/openapi-specs/compute/desc/policies/vulnerability_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Hosts > V The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/policies/vulnerability_vms_impacted_get.md b/openapi-specs/compute/desc/policies/vulnerability_vms_impacted_get.md index 29d9621ea..f1a7f7ef5 100644 --- a/openapi-specs/compute/desc/policies/vulnerability_vms_impacted_get.md +++ b/openapi-specs/compute/desc/policies/vulnerability_vms_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/vms?project=&ruleName=' ``` diff --git a/openapi-specs/compute/desc/profiles/app-embedded_download_get.md b/openapi-specs/compute/desc/profiles/app-embedded_download_get.md index 4b3f7ff8a..2e8cac56d 100644 --- a/openapi-specs/compute/desc/profiles/app-embedded_download_get.md +++ b/openapi-specs/compute/desc/profiles/app-embedded_download_get.md @@ -5,7 +5,7 @@ Downloads the app-embedded observations in a CSV format. Refer to the following example cURL command that downloads all the app-embedded runtime profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/profiles/app-embedded_get.md b/openapi-specs/compute/desc/profiles/app-embedded_get.md index f3ddb3125..c332061e5 100644 --- a/openapi-specs/compute/desc/profiles/app-embedded_get.md +++ b/openapi-specs/compute/desc/profiles/app-embedded_get.md @@ -5,7 +5,7 @@ Retrieves the app-embedded observations. Refer to the following example cURL command that lists all the app-embedded runtime: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/profiles/container_download_get.md b/openapi-specs/compute/desc/profiles/container_download_get.md index ad7a86101..ee9d5e9e4 100644 --- a/openapi-specs/compute/desc/profiles/container_download_get.md +++ b/openapi-specs/compute/desc/profiles/container_download_get.md @@ -6,7 +6,7 @@ Retrieves the details and state of all runtime models in CSV format. Refer to the following example cURL command that downloads a complete list in CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/profiles/container_filters_get.md b/openapi-specs/compute/desc/profiles/container_filters_get.md index 8b6122b80..13535b520 100644 --- a/openapi-specs/compute/desc/profiles/container_filters_get.md +++ b/openapi-specs/compute/desc/profiles/container_filters_get.md @@ -4,7 +4,7 @@ Returns a list of os and images from page monitor/runtime/container-models in Co Example curl command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/profiles/container_get.md b/openapi-specs/compute/desc/profiles/container_get.md index cdbc24c3e..59a3764fb 100644 --- a/openapi-specs/compute/desc/profiles/container_get.md +++ b/openapi-specs/compute/desc/profiles/container_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of all runtime models. Refer to the following example cURL command that lists all runtime models in a system: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/profiles/container_learn_post.md b/openapi-specs/compute/desc/profiles/container_learn_post.md index 5fef2e31e..2c1d08af1 100644 --- a/openapi-specs/compute/desc/profiles/container_learn_post.md +++ b/openapi-specs/compute/desc/profiles/container_learn_post.md @@ -7,7 +7,7 @@ For more information, refer to [Learning mode](https://docs.prismacloud.io/en/cl Refer to the following example cURL command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/profiles/host_download_get.md b/openapi-specs/compute/desc/profiles/host_download_get.md index ace270a32..2dfb51ec0 100644 --- a/openapi-specs/compute/desc/profiles/host_download_get.md +++ b/openapi-specs/compute/desc/profiles/host_download_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of each host service runtime model in CSV format Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/profiles/host_get.md b/openapi-specs/compute/desc/profiles/host_get.md index 208a24de3..55d8bf8ff 100644 --- a/openapi-specs/compute/desc/profiles/host_get.md +++ b/openapi-specs/compute/desc/profiles/host_get.md @@ -15,7 +15,7 @@ The returned JSON object has the following structure: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/profiles/host_id_rule_get.md b/openapi-specs/compute/desc/profiles/host_id_rule_get.md index 672cb4c62..8be668fca 100644 --- a/openapi-specs/compute/desc/profiles/host_id_rule_get.md +++ b/openapi-specs/compute/desc/profiles/host_id_rule_get.md @@ -10,7 +10,7 @@ This is the `PROFILE_ID`. The following example command uses curl and basic auth to specify the learning mode for a profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/profiles/service_download_get.md b/openapi-specs/compute/desc/profiles/service_download_get.md index 63dff3354..4c1c431c1 100644 --- a/openapi-specs/compute/desc/profiles/service_download_get.md +++ b/openapi-specs/compute/desc/profiles/service_download_get.md @@ -1,7 +1,7 @@ Retrieves the details and state of all host service runtime models in CSV format ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/compute/desc/profiles/service_get.md b/openapi-specs/compute/desc/profiles/service_get.md index a4f8c348d..5d786d919 100644 --- a/openapi-specs/compute/desc/profiles/service_get.md +++ b/openapi-specs/compute/desc/profiles/service_get.md @@ -10,7 +10,7 @@ The returned JSON object has the following structure: Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/profiles/service_id_learn_post.md b/openapi-specs/compute/desc/profiles/service_id_learn_post.md index fb338b80d..fa85fc3a2 100644 --- a/openapi-specs/compute/desc/profiles/service_id_learn_post.md +++ b/openapi-specs/compute/desc/profiles/service_id_learn_post.md @@ -11,7 +11,7 @@ The `PROFILE_ID` is typically the service's name, such as `sshd` or `ntpd`. The following example command uses curl and basic auth to specify the learning mode for a host service profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/profiles/service_learn_post.md b/openapi-specs/compute/desc/profiles/service_learn_post.md index 02a1f299e..ceff8e5a5 100644 --- a/openapi-specs/compute/desc/profiles/service_learn_post.md +++ b/openapi-specs/compute/desc/profiles/service_learn_post.md @@ -3,7 +3,7 @@ Specify the learning mode for all host service profiles. The following example command uses curl and basic auth to specify the learning mode for all host service profiles. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/profiles/service_names_get.md b/openapi-specs/compute/desc/profiles/service_names_get.md index 7da863545..afae56f0d 100644 --- a/openapi-specs/compute/desc/profiles/service_names_get.md +++ b/openapi-specs/compute/desc/profiles/service_names_get.md @@ -3,7 +3,7 @@ Retrieves the name of all host service runtime models from within the app at **M The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/projects/get.md b/openapi-specs/compute/desc/projects/get.md index 05485c24c..1ac04d2c0 100644 --- a/openapi-specs/compute/desc/projects/get.md +++ b/openapi-specs/compute/desc/projects/get.md @@ -3,7 +3,7 @@ Lists all projects visible to the given user. Assuming the given user is an admin, the following example curl command would list all projects: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/projects/name_delete.md b/openapi-specs/compute/desc/projects/name_delete.md index fba889f7e..0a34e72a2 100644 --- a/openapi-specs/compute/desc/projects/name_delete.md +++ b/openapi-specs/compute/desc/projects/name_delete.md @@ -6,7 +6,7 @@ The value for `` can be retrieved from the `_id` field in the resp The DELETE method returns the decommissioned supervisor's admin username and password. ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/compute/desc/projects/name_put.md b/openapi-specs/compute/desc/projects/name_put.md index b5a83a67d..1bde9b0c7 100644 --- a/openapi-specs/compute/desc/projects/name_put.md +++ b/openapi-specs/compute/desc/projects/name_put.md @@ -4,7 +4,7 @@ The following example curl command updates a project named ``. The value for `` can be retrieved from the `_id` field in the response object from `GET /api/v1/projects`. ```bash -$ curl -k \ +$ curl \ -u \ -X PUT \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/compute/desc/projects/post.md b/openapi-specs/compute/desc/projects/post.md index 8862c0fd4..38c574173 100644 --- a/openapi-specs/compute/desc/projects/post.md +++ b/openapi-specs/compute/desc/projects/post.md @@ -3,7 +3,7 @@ Provisions a new project. The following example curl command provisions a new project named `my-project`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ $ curl -k \ If you have installed a new instance of Console, and you have already created an initial admin user for it, then you can specify the admin username name and password when you provision the project. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/projects/projects.md b/openapi-specs/compute/desc/projects/projects.md index 7e7dcff66..19c904e9e 100644 --- a/openapi-specs/compute/desc/projects/projects.md +++ b/openapi-specs/compute/desc/projects/projects.md @@ -20,7 +20,7 @@ If `project` is not specified, it is set to `Central+Console`. For example, to retrieve the compliance policies for a tenant project named `mobile_payments_division`, use the following curl command: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/radar/container_clean_post.md b/openapi-specs/compute/desc/radar/container_clean_post.md index 662b6d53f..d4f87e91e 100644 --- a/openapi-specs/compute/desc/radar/container_clean_post.md +++ b/openapi-specs/compute/desc/radar/container_clean_post.md @@ -1,7 +1,7 @@ Cleans the container runtime profiles and Radar entities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/radar/container_delete.md b/openapi-specs/compute/desc/radar/container_delete.md index 4eabe337f..b6cc69cf2 100644 --- a/openapi-specs/compute/desc/radar/container_delete.md +++ b/openapi-specs/compute/desc/radar/container_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/desc/radar/container_export_get.md b/openapi-specs/compute/desc/radar/container_export_get.md index 7f577568f..f776c7e6c 100644 --- a/openapi-specs/compute/desc/radar/container_export_get.md +++ b/openapi-specs/compute/desc/radar/container_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for containers) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/radar/container_filters_get.md b/openapi-specs/compute/desc/radar/container_filters_get.md index f66463da1..8d7cd6df3 100644 --- a/openapi-specs/compute/desc/radar/container_filters_get.md +++ b/openapi-specs/compute/desc/radar/container_filters_get.md @@ -1,7 +1,7 @@ Returns the namespaces from the container view on the Radar page. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/radar/container_get.md b/openapi-specs/compute/desc/radar/container_get.md index 280d683d9..404629a25 100644 --- a/openapi-specs/compute/desc/radar/container_get.md +++ b/openapi-specs/compute/desc/radar/container_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (container view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/radar/host_delete.md b/openapi-specs/compute/desc/radar/host_delete.md index 738fa7a7c..b4910a8b7 100644 --- a/openapi-specs/compute/desc/radar/host_delete.md +++ b/openapi-specs/compute/desc/radar/host_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two apps in CNNF for hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/desc/radar/host_export_get.md b/openapi-specs/compute/desc/radar/host_export_get.md index dd91b5335..851d6f40f 100644 --- a/openapi-specs/compute/desc/radar/host_export_get.md +++ b/openapi-specs/compute/desc/radar/host_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for hosts) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/radar/host_get.md b/openapi-specs/compute/desc/radar/host_get.md index a12025856..222d075aa 100644 --- a/openapi-specs/compute/desc/radar/host_get.md +++ b/openapi-specs/compute/desc/radar/host_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (host view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/radar/serverless_get.md b/openapi-specs/compute/desc/radar/serverless_get.md index b2f329149..170cfb48d 100644 --- a/openapi-specs/compute/desc/radar/serverless_get.md +++ b/openapi-specs/compute/desc/radar/serverless_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/radar/serverless_progress_get.md b/openapi-specs/compute/desc/radar/serverless_progress_get.md index a11c1ae20..0808dfbf4 100644 --- a/openapi-specs/compute/desc/radar/serverless_progress_get.md +++ b/openapi-specs/compute/desc/radar/serverless_progress_get.md @@ -1,7 +1,7 @@ Returns the scan progress from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/radar/serverless_scan_post.md b/openapi-specs/compute/desc/radar/serverless_scan_post.md index 0d519ba88..2d444ac88 100644 --- a/openapi-specs/compute/desc/radar/serverless_scan_post.md +++ b/openapi-specs/compute/desc/radar/serverless_scan_post.md @@ -1,7 +1,7 @@ Initiates a serverless scan of your environments. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/radar/serverless_stop_post.md b/openapi-specs/compute/desc/radar/serverless_stop_post.md index 5c0bdf186..f15bef34d 100644 --- a/openapi-specs/compute/desc/radar/serverless_stop_post.md +++ b/openapi-specs/compute/desc/radar/serverless_stop_post.md @@ -1,7 +1,7 @@ Stops an in-progress serverless scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/rbac/role_delete.md b/openapi-specs/compute/desc/rbac/role_delete.md index 87015b6e8..46efcf9c9 100644 --- a/openapi-specs/compute/desc/rbac/role_delete.md +++ b/openapi-specs/compute/desc/rbac/role_delete.md @@ -4,7 +4,7 @@ System roles and roles assigned to users/groups cannot be deleted. The following example curl command uses basic auth to delete role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/desc/rbac/roles_get.md b/openapi-specs/compute/desc/rbac/roles_get.md index 4cd1d9bc7..112026937 100644 --- a/openapi-specs/compute/desc/rbac/roles_get.md +++ b/openapi-specs/compute/desc/rbac/roles_get.md @@ -3,7 +3,7 @@ This endpoint will return a list in JSON format of the roles can be found under The following example curl command uses basic auth to return: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/rbac/roles_post.md b/openapi-specs/compute/desc/rbac/roles_post.md index 1f20772ce..6988766e8 100644 --- a/openapi-specs/compute/desc/rbac/roles_post.md +++ b/openapi-specs/compute/desc/rbac/roles_post.md @@ -37,7 +37,7 @@ The added role must contain the "user" permission with read-write access. This p The following example curl command uses basic auth to create the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/rbac/roles_put.md b/openapi-specs/compute/desc/rbac/roles_put.md index 34d7b41a7..f62e34ccb 100644 --- a/openapi-specs/compute/desc/rbac/roles_put.md +++ b/openapi-specs/compute/desc/rbac/roles_put.md @@ -38,7 +38,7 @@ The updated role must contain the "user" permission with read-write access. This The following example curl command uses basic auth to update the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/desc/recovery/backup_get.md b/openapi-specs/compute/desc/recovery/backup_get.md index 4da46f356..bf735905a 100644 --- a/openapi-specs/compute/desc/recovery/backup_get.md +++ b/openapi-specs/compute/desc/recovery/backup_get.md @@ -3,7 +3,7 @@ Returns a list of available backups. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/recovery/backup_id_delete.md b/openapi-specs/compute/desc/recovery/backup_id_delete.md index ae9c33e90..80cd4c3f6 100644 --- a/openapi-specs/compute/desc/recovery/backup_id_delete.md +++ b/openapi-specs/compute/desc/recovery/backup_id_delete.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/desc/recovery/backup_id_patch.md b/openapi-specs/compute/desc/recovery/backup_id_patch.md index 4a78cd67d..b3699972f 100644 --- a/openapi-specs/compute/desc/recovery/backup_id_patch.md +++ b/openapi-specs/compute/desc/recovery/backup_id_patch.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/compute/desc/recovery/backup_post.md b/openapi-specs/compute/desc/recovery/backup_post.md index f45161712..41436fe5f 100644 --- a/openapi-specs/compute/desc/recovery/backup_post.md +++ b/openapi-specs/compute/desc/recovery/backup_post.md @@ -3,7 +3,7 @@ Creates a backup named `backup_name` by invoking the MongoDB dump process. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/recovery/restore_id_post.md b/openapi-specs/compute/desc/recovery/restore_id_post.md index 850fceeaa..e424641cc 100644 --- a/openapi-specs/compute/desc/recovery/restore_id_post.md +++ b/openapi-specs/compute/desc/recovery/restore_id_post.md @@ -5,7 +5,7 @@ Restores Prisma Cloud Compute from the given backup. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/registry/download_get.md b/openapi-specs/compute/desc/registry/download_get.md index 5a3eb0141..3eef8d50e 100644 --- a/openapi-specs/compute/desc/registry/download_get.md +++ b/openapi-specs/compute/desc/registry/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Compliance > Images > Reg Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/registry/get.md b/openapi-specs/compute/desc/registry/get.md index e8b87080e..208b2f1e3 100644 --- a/openapi-specs/compute/desc/registry/get.md +++ b/openapi-specs/compute/desc/registry/get.md @@ -21,7 +21,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that retrieves a scan report for all images in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -33,7 +33,7 @@ The compact query can be used to get a general overview of the number of Vulnera Refer to the following cURL command that retrieves a compact scan report for the Ubuntu image in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -44,7 +44,7 @@ The name query is synonymous with the filter registry text field in the Console Refer to the following cURL that retrieves the scan report for the image in the registry with the matching **sha256** hash: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -54,7 +54,7 @@ $ curl -k \ Refer to the following cURL command that retrieves the images in the first 10 registries: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/registry/get_registry_progress.md b/openapi-specs/compute/desc/registry/get_registry_progress.md index ddc319c1b..cc6feac3d 100644 --- a/openapi-specs/compute/desc/registry/get_registry_progress.md +++ b/openapi-specs/compute/desc/registry/get_registry_progress.md @@ -11,7 +11,7 @@ For a regular scan, use the API path only without any query parameters. Refer to the following example cURL request that retrieves the ongoing scan details for a regular registry scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -61,7 +61,7 @@ For an on-demand scan that is started using the `/registry/scan` endpoint with t Refer to the following example cURL request that retrieves the ongoing scan details for an on-demand registry scan that is started using the `/registry/scan` endpoint for the repository `alpine` with tag `3.16`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/registry/names_get.md b/openapi-specs/compute/desc/registry/names_get.md index 6933a570c..25afb48b8 100644 --- a/openapi-specs/compute/desc/registry/names_get.md +++ b/openapi-specs/compute/desc/registry/names_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command that retrieves a list of image names from your scanned registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/registry/scan_post.md b/openapi-specs/compute/desc/registry/scan_post.md index ce7e19533..96bfd5f16 100644 --- a/openapi-specs/compute/desc/registry/scan_post.md +++ b/openapi-specs/compute/desc/registry/scan_post.md @@ -17,7 +17,7 @@ For information on scan result, see [Get Registry Scan Report](https://prisma.pa Refer to the following example cURL command that forces Prisma Cloud Compute to rescan all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -27,7 +27,7 @@ $ curl -k \ Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan a specific image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -52,7 +52,7 @@ For information on scan result, see [Get Registry Scan Report](https://pan.dev/p Refer to the following example cURL command to trigger an on-demand scan for an image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/registry/stop_post.md b/openapi-specs/compute/desc/registry/stop_post.md index 29e103ac1..05ac2f436 100644 --- a/openapi-specs/compute/desc/registry/stop_post.md +++ b/openapi-specs/compute/desc/registry/stop_post.md @@ -5,7 +5,7 @@ Stops current registry scan immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to stop scanning all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/scans/download_get.md b/openapi-specs/compute/desc/scans/download_get.md index 61a0ccc2d..3785bf562 100644 --- a/openapi-specs/compute/desc/scans/download_get.md +++ b/openapi-specs/compute/desc/scans/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Images The following cURL command retrieves and saves your Jenkins and twistcli scan reports to a CSV file called `scans_report.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/scans/filter_get.md b/openapi-specs/compute/desc/scans/filter_get.md index 58550ad35..df3e9cdb0 100644 --- a/openapi-specs/compute/desc/scans/filter_get.md +++ b/openapi-specs/compute/desc/scans/filter_get.md @@ -3,7 +3,7 @@ Retrieves the list of Jenkins projects that have been scanned by the Jenkins plu The following example curl command uses basic auth to retrieve the list of Jenkins project names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/scans/get.md b/openapi-specs/compute/desc/scans/get.md index e28506972..107b733bd 100644 --- a/openapi-specs/compute/desc/scans/get.md +++ b/openapi-specs/compute/desc/scans/get.md @@ -11,7 +11,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command that retrieves the scan reports for all images scanned using the Jenkins CI plugin or the twistcli tool: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -23,7 +23,7 @@ To get the report of a specific scan, add query parameters to narrow the scope o The following cURL command retrieves the scan report for an image with a SHA256 ID of `sha256:f756e84300d8e53006090573dd33abe5b8cfac3e42d104fc4be37f435fe512f3`. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/scans/id_get.md b/openapi-specs/compute/desc/scans/id_get.md index 7a342ef60..1557b1905 100644 --- a/openapi-specs/compute/desc/scans/id_get.md +++ b/openapi-specs/compute/desc/scans/id_get.md @@ -3,7 +3,7 @@ Retrieves all scan reports for images scanned by the Jenkins plugin or twistcli The following example curl command uses basic auth to retrieve the scan report for just an image with a SHA256 ID of `5c3385fd2e76c5c16124c077`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/scripts/console_sh_get.md b/openapi-specs/compute/desc/scripts/console_sh_get.md index d8f02038f..1622321ca 100644 --- a/openapi-specs/compute/desc/scripts/console_sh_get.md +++ b/openapi-specs/compute/desc/scripts/console_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/scripts/defender_ps1_get.md b/openapi-specs/compute/desc/scripts/defender_ps1_get.md index a47616983..45e4a6133 100644 --- a/openapi-specs/compute/desc/scripts/defender_ps1_get.md +++ b/openapi-specs/compute/desc/scripts/defender_ps1_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/scripts/defender_sh_get.md b/openapi-specs/compute/desc/scripts/defender_sh_get.md index 98ad6cf62..a8a302426 100644 --- a/openapi-specs/compute/desc/scripts/defender_sh_get.md +++ b/openapi-specs/compute/desc/scripts/defender_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/serverless/download_get.md b/openapi-specs/compute/desc/serverless/download_get.md index a8e49ff25..4d7d3adc1 100644 --- a/openapi-specs/compute/desc/serverless/download_get.md +++ b/openapi-specs/compute/desc/serverless/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Functio The following cURL command retrieves a list of all serverless resources monitored by Prisma Cloud Compute and saves the results in a CSV file called `serverless.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/serverless/download' \ diff --git a/openapi-specs/compute/desc/serverless/embed_post.md b/openapi-specs/compute/desc/serverless/embed_post.md index 6cce784b8..353b5721c 100644 --- a/openapi-specs/compute/desc/serverless/embed_post.md +++ b/openapi-specs/compute/desc/serverless/embed_post.md @@ -1,7 +1,7 @@ The following curl command uses basic auth to retrieve a list of all Serverless resources that monitored by Prisma Cloud Compute, and save the results to a CSV file: ```bash -$ curl -k \ +$ curl \ -X POST \ -H "Content-Type: application/octet-stream" \ -u \ diff --git a/openapi-specs/compute/desc/serverless/get.md b/openapi-specs/compute/desc/serverless/get.md index aee50492f..430ee065a 100644 --- a/openapi-specs/compute/desc/serverless/get.md +++ b/openapi-specs/compute/desc/serverless/get.md @@ -11,7 +11,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Functions > Scanned function Refer to the following example cURL command that retrieves the scan reports for serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/serverless/names_get.md b/openapi-specs/compute/desc/serverless/names_get.md index 3cab17092..90285574a 100644 --- a/openapi-specs/compute/desc/serverless/names_get.md +++ b/openapi-specs/compute/desc/serverless/names_get.md @@ -5,7 +5,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo The following curl command uses basic auth to retrieve a list of names of all Serverless resources monitored by Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -X GET \ -H "Content-Type: application/json" \ -u \ diff --git a/openapi-specs/compute/desc/serverless/scan_post.md b/openapi-specs/compute/desc/serverless/scan_post.md index 159285349..70a3a3b4e 100644 --- a/openapi-specs/compute/desc/serverless/scan_post.md +++ b/openapi-specs/compute/desc/serverless/scan_post.md @@ -5,7 +5,7 @@ Re-scan all serverless functions immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/scan diff --git a/openapi-specs/compute/desc/serverless/stop_post.md b/openapi-specs/compute/desc/serverless/stop_post.md index 763710842..67c0d2239 100644 --- a/openapi-specs/compute/desc/serverless/stop_post.md +++ b/openapi-specs/compute/desc/serverless/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing serverless scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/stop diff --git a/openapi-specs/compute/desc/settings/alerts_get.md b/openapi-specs/compute/desc/settings/alerts_get.md index 060114c39..2b25dc6c9 100644 --- a/openapi-specs/compute/desc/settings/alerts_get.md +++ b/openapi-specs/compute/desc/settings/alerts_get.md @@ -1,7 +1,7 @@ Retrieves a list of your alert settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/settings/alerts_options_get.md b/openapi-specs/compute/desc/settings/alerts_options_get.md index 095c1f1b7..aa7a1d250 100644 --- a/openapi-specs/compute/desc/settings/alerts_options_get.md +++ b/openapi-specs/compute/desc/settings/alerts_options_get.md @@ -3,7 +3,7 @@ This endpoint will return the alert profile configuration options that can be fo The following example curl command uses basic auth to retrieve all alert profile configuration options: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/settings/alerts_post.md b/openapi-specs/compute/desc/settings/alerts_post.md index 3acb8d543..cd303f880 100644 --- a/openapi-specs/compute/desc/settings/alerts_post.md +++ b/openapi-specs/compute/desc/settings/alerts_post.md @@ -3,7 +3,7 @@ Configure alerts. The following example curl command sets the aggregation period for alerts to one hour. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/settings/certificates_post.md b/openapi-specs/compute/desc/settings/certificates_post.md index fbdc8a5a9..bd30ea399 100644 --- a/openapi-specs/compute/desc/settings/certificates_post.md +++ b/openapi-specs/compute/desc/settings/certificates_post.md @@ -9,7 +9,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to set the validity period for client certificates to seven days: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/desc/settings/certs_get.md b/openapi-specs/compute/desc/settings/certs_get.md index ba6674a3c..dbf1d3790 100644 --- a/openapi-specs/compute/desc/settings/certs_get.md +++ b/openapi-specs/compute/desc/settings/certs_get.md @@ -6,7 +6,7 @@ Defenders use these names to connect to Console. Refer to the following example cURL request that uses basic auth to retrieve the SANs in Console's cert: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/settings/certs_post.md b/openapi-specs/compute/desc/settings/certs_post.md index a6e429006..fb2cedee5 100644 --- a/openapi-specs/compute/desc/settings/certs_post.md +++ b/openapi-specs/compute/desc/settings/certs_post.md @@ -12,7 +12,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to add `node-01.example.com` to the `subjectAltName` field in the certificate: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/desc/settings/coderepos_get.md b/openapi-specs/compute/desc/settings/coderepos_get.md index 6cbfb78cb..286a8d905 100644 --- a/openapi-specs/compute/desc/settings/coderepos_get.md +++ b/openapi-specs/compute/desc/settings/coderepos_get.md @@ -20,7 +20,7 @@ Construct the full webhook using Console's publicly accessible DNS name or IP ad Refer to the following example cURL command that retrieves all code repositories to scan, as well as the webhook URL suffix: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/settings/console-certificates_post.md b/openapi-specs/compute/desc/settings/console-certificates_post.md index 5673af840..392061c8f 100644 --- a/openapi-specs/compute/desc/settings/console-certificates_post.md +++ b/openapi-specs/compute/desc/settings/console-certificates_post.md @@ -9,7 +9,7 @@ For the custom TLS certificate for securing browser access, this file must be in Refer to the following example cURL request that uses basic auth and configures the custom certificate to use for securing browser access to the console: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/settings/custom-labels_get.md b/openapi-specs/compute/desc/settings/custom-labels_get.md index a849dd8a8..19c1cadde 100644 --- a/openapi-specs/compute/desc/settings/custom-labels_get.md +++ b/openapi-specs/compute/desc/settings/custom-labels_get.md @@ -5,7 +5,7 @@ Returns the list of alert labels configured in Prisma Cloud Compute. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/settings/custom-labels_post.md b/openapi-specs/compute/desc/settings/custom-labels_post.md index 6bb66e706..9b0702fe8 100644 --- a/openapi-specs/compute/desc/settings/custom-labels_post.md +++ b/openapi-specs/compute/desc/settings/custom-labels_post.md @@ -5,7 +5,7 @@ Creates a custom alert label to augment audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/settings/defender_get.md b/openapi-specs/compute/desc/settings/defender_get.md index ecb8b6989..cf43bb304 100644 --- a/openapi-specs/compute/desc/settings/defender_get.md +++ b/openapi-specs/compute/desc/settings/defender_get.md @@ -5,7 +5,7 @@ Returns the advanced settings for Defenders. Refer to the following example cURL command that gets all advanced settings for Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/settings/forensic_get.md b/openapi-specs/compute/desc/settings/forensic_get.md index 9c16b70b9..3486b2bf9 100644 --- a/openapi-specs/compute/desc/settings/forensic_get.md +++ b/openapi-specs/compute/desc/settings/forensic_get.md @@ -1,7 +1,7 @@ Retrieves the settings for the forensics system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/settings/forensic_post.md b/openapi-specs/compute/desc/settings/forensic_post.md index 31f809d39..8943842fb 100644 --- a/openapi-specs/compute/desc/settings/forensic_post.md +++ b/openapi-specs/compute/desc/settings/forensic_post.md @@ -3,7 +3,7 @@ Configures the forensics system. The following example curl command allocates 100 MB of local disk space for container forensic data and 10 MB for host forensics data. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/settings/initialized_get.md b/openapi-specs/compute/desc/settings/initialized_get.md index 3134912d1..2af8462f1 100644 --- a/openapi-specs/compute/desc/settings/initialized_get.md +++ b/openapi-specs/compute/desc/settings/initialized_get.md @@ -4,7 +4,7 @@ After first installing Console, the first thing you must do is create an admin a Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/settings/intelligence-windows_post.md b/openapi-specs/compute/desc/settings/intelligence-windows_post.md index c39e256d2..0721dab3b 100644 --- a/openapi-specs/compute/desc/settings/intelligence-windows_post.md +++ b/openapi-specs/compute/desc/settings/intelligence-windows_post.md @@ -3,7 +3,7 @@ This endpoint will enable or disable the Windows Intelligence Service from **Man The following example curl command uses basic auth to enable online updates of Windows vulnerabilities from the intelligence stream: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/settings/intelligence_get.md b/openapi-specs/compute/desc/settings/intelligence_get.md index 26c694246..15e9f24ae 100644 --- a/openapi-specs/compute/desc/settings/intelligence_get.md +++ b/openapi-specs/compute/desc/settings/intelligence_get.md @@ -5,7 +5,7 @@ Returns the details about the Intelligence Stream configuration. Refer to the following example cURL command that uses basic auth to retrieve your Intelligence Stream configuration settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/settings/intelligence_post.md b/openapi-specs/compute/desc/settings/intelligence_post.md index 74b06a3a0..2dbbd0168 100644 --- a/openapi-specs/compute/desc/settings/intelligence_post.md +++ b/openapi-specs/compute/desc/settings/intelligence_post.md @@ -7,7 +7,7 @@ For more information, see [Intelligence Stream](https://docs.paloaltonetworks.co Refer to the following example cURL command that uses basic auth to configure settings of your Intelligence Stream. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/settings/latest-version_get.md b/openapi-specs/compute/desc/settings/latest-version_get.md index c443fa7b5..16601fb5b 100644 --- a/openapi-specs/compute/desc/settings/latest-version_get.md +++ b/openapi-specs/compute/desc/settings/latest-version_get.md @@ -3,7 +3,7 @@ Retrieves the version number of the latest available Prisma Cloud Compute releas Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/settings/latest_version_get.md b/openapi-specs/compute/desc/settings/latest_version_get.md index 18e436668..5c64edff1 100644 --- a/openapi-specs/compute/desc/settings/latest_version_get.md +++ b/openapi-specs/compute/desc/settings/latest_version_get.md @@ -1,7 +1,7 @@ This endpoint will return the latest version of the product. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/settings/ldap_get.md b/openapi-specs/compute/desc/settings/ldap_get.md index 4ad0ad0c9..7d803ba1c 100644 --- a/openapi-specs/compute/desc/settings/ldap_get.md +++ b/openapi-specs/compute/desc/settings/ldap_get.md @@ -5,7 +5,7 @@ Returns the LDAP integration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/settings/ldap_post.md b/openapi-specs/compute/desc/settings/ldap_post.md index c152c7dc5..34bc06ef4 100644 --- a/openapi-specs/compute/desc/settings/ldap_post.md +++ b/openapi-specs/compute/desc/settings/ldap_post.md @@ -7,7 +7,7 @@ For more information, see [Active Directory](https://docs.paloaltonetworks.com/p Refer to the following example cURL command that enables the LDAP integration and specifies the parameters required to integrate with an Active Directory service. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/settings/license_get.md b/openapi-specs/compute/desc/settings/license_get.md index 5c792cae8..2b4b548e3 100644 --- a/openapi-specs/compute/desc/settings/license_get.md +++ b/openapi-specs/compute/desc/settings/license_get.md @@ -5,7 +5,7 @@ Returns the details about the installed license. Refer to the following example cURL request that retrieves the license details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/settings/license_post.md b/openapi-specs/compute/desc/settings/license_post.md index b77800a5f..ce74b0d0f 100644 --- a/openapi-specs/compute/desc/settings/license_post.md +++ b/openapi-specs/compute/desc/settings/license_post.md @@ -8,7 +8,7 @@ For more information, see [Licensing](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to set your license: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/settings/logging_get.md b/openapi-specs/compute/desc/settings/logging_get.md index 6eda3e484..012be5def 100644 --- a/openapi-specs/compute/desc/settings/logging_get.md +++ b/openapi-specs/compute/desc/settings/logging_get.md @@ -5,7 +5,7 @@ Returns the logging settings. Refer to the following example cURL request that uses basic auth to retrieve your logging details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/settings/logging_post.md b/openapi-specs/compute/desc/settings/logging_post.md index 3619d9c0f..8d27ee1b3 100644 --- a/openapi-specs/compute/desc/settings/logging_post.md +++ b/openapi-specs/compute/desc/settings/logging_post.md @@ -8,7 +8,7 @@ For more information, see [Logging](https://docs.paloaltonetworks.com/prisma/pri Refer to the following example cURL request that enables verbose scan output for syslog and stdout: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/settings/logon_get.md b/openapi-specs/compute/desc/settings/logon_get.md index 1559f2405..b1e9164f2 100644 --- a/openapi-specs/compute/desc/settings/logon_get.md +++ b/openapi-specs/compute/desc/settings/logon_get.md @@ -5,7 +5,7 @@ Configures the logon settings. Refer to the following example cURL request that uses basic auth to retrieve all current logon settings. ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/settings/logon_post.md b/openapi-specs/compute/desc/settings/logon_post.md index 5c2b60c9f..691e082fe 100644 --- a/openapi-specs/compute/desc/settings/logon_post.md +++ b/openapi-specs/compute/desc/settings/logon_post.md @@ -7,7 +7,7 @@ For more information, see [Logon Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that uses basic auth to set the timeout to 900 seconds (15 minutes): ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/desc/settings/oauth_get.md b/openapi-specs/compute/desc/settings/oauth_get.md index 6dcf70fb5..5d997f016 100644 --- a/openapi-specs/compute/desc/settings/oauth_get.md +++ b/openapi-specs/compute/desc/settings/oauth_get.md @@ -5,7 +5,7 @@ Returns the OAuth configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/settings/oauth_post.md b/openapi-specs/compute/desc/settings/oauth_post.md index c593b9237..da3c83d2f 100644 --- a/openapi-specs/compute/desc/settings/oauth_post.md +++ b/openapi-specs/compute/desc/settings/oauth_post.md @@ -7,7 +7,7 @@ For more information, see [GitHub OAuth](https://docs.paloaltonetworks.com/prism Refer to the following example cURL response: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/settings/oidc_get.md b/openapi-specs/compute/desc/settings/oidc_get.md index ee439622b..1f27f93ba 100644 --- a/openapi-specs/compute/desc/settings/oidc_get.md +++ b/openapi-specs/compute/desc/settings/oidc_get.md @@ -5,7 +5,7 @@ Returns the OpenID Connect configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/settings/oidc_post.md b/openapi-specs/compute/desc/settings/oidc_post.md index e0270247e..5bd3a9192 100644 --- a/openapi-specs/compute/desc/settings/oidc_post.md +++ b/openapi-specs/compute/desc/settings/oidc_post.md @@ -7,7 +7,7 @@ For more information, see [OIDC](https://docs.paloaltonetworks.com/prisma/prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/settings/pcf_get.md b/openapi-specs/compute/desc/settings/pcf_get.md index 5dc21eb17..c5e42a823 100644 --- a/openapi-specs/compute/desc/settings/pcf_get.md +++ b/openapi-specs/compute/desc/settings/pcf_get.md @@ -3,7 +3,7 @@ This endpoint will return settings for PCF (Pivotal Cloud Foundry)Blobstore scan The following example curl command uses basic auth to retrieve the current PCF Blobstore scanning settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/settings/pcf_post.md b/openapi-specs/compute/desc/settings/pcf_post.md index 139e947cb..657e14f27 100644 --- a/openapi-specs/compute/desc/settings/pcf_post.md +++ b/openapi-specs/compute/desc/settings/pcf_post.md @@ -3,7 +3,7 @@ This endpoint will allow for updating settings for PCF (Pivotal Cloud Foundry) B The following example curl command uses basic auth to set up a PCF Blobstore scanner that scans the last `5` droplets for every droplet in the PCF Blobstore: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/settings/projects_get.md b/openapi-specs/compute/desc/settings/projects_get.md index f5dd20395..bc95414a1 100644 --- a/openapi-specs/compute/desc/settings/projects_get.md +++ b/openapi-specs/compute/desc/settings/projects_get.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command retrieves the state of the Projects feature from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ All API calls must be proxied through Central Console, where the request is auto To retrieve the Projects settings from a supervisor Console, append the `project` query parameter to your request. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/settings/projects_post.md b/openapi-specs/compute/desc/settings/projects_post.md index d29f8e9d5..b3472e6b9 100644 --- a/openapi-specs/compute/desc/settings/projects_post.md +++ b/openapi-specs/compute/desc/settings/projects_post.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command designates `` as master. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/settings/proxy_get.md b/openapi-specs/compute/desc/settings/proxy_get.md index 9a4922d59..477563069 100644 --- a/openapi-specs/compute/desc/settings/proxy_get.md +++ b/openapi-specs/compute/desc/settings/proxy_get.md @@ -5,7 +5,7 @@ Returns the proxy settings for Prisma Cloud Compute containers to access the Int Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/settings/proxy_post.md b/openapi-specs/compute/desc/settings/proxy_post.md index a1bdc07ed..df926524e 100644 --- a/openapi-specs/compute/desc/settings/proxy_post.md +++ b/openapi-specs/compute/desc/settings/proxy_post.md @@ -7,7 +7,7 @@ For more information, see [Proxy Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that specifies the proxy to use to access the Internet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/settings/registry_get.md b/openapi-specs/compute/desc/settings/registry_get.md index 12745005d..64e70b698 100644 --- a/openapi-specs/compute/desc/settings/registry_get.md +++ b/openapi-specs/compute/desc/settings/registry_get.md @@ -17,7 +17,7 @@ Construct the full webhook using the publicly accessible DNS name or IP address, The following cURL command retrieves all the registries to scan and the URL suffix for the registry's webhook URL suffix. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/settings/registry_post.md b/openapi-specs/compute/desc/settings/registry_post.md index efabf4e67..decf80a65 100644 --- a/openapi-specs/compute/desc/settings/registry_post.md +++ b/openapi-specs/compute/desc/settings/registry_post.md @@ -30,7 +30,7 @@ The API response returns an HTTP 400 error if the number of registry specificati Refer to the following example cURL command that configures Prisma Cloud Compute to scan the Ubuntu 16.04 repository on Docker Hub: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -64,7 +64,7 @@ To add settings for a GitLab Container Registry, you must specify the following Refer to the following example cURL command: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/settings/registry_put.md b/openapi-specs/compute/desc/settings/registry_put.md index 3768914f6..75d6c79a2 100644 --- a/openapi-specs/compute/desc/settings/registry_put.md +++ b/openapi-specs/compute/desc/settings/registry_put.md @@ -127,7 +127,7 @@ To remove a registry from the list: To delete all entries, submit an empty `specifications` array. For example: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/desc/settings/saml_get.md b/openapi-specs/compute/desc/settings/saml_get.md index f2228a440..4fb940e80 100644 --- a/openapi-specs/compute/desc/settings/saml_get.md +++ b/openapi-specs/compute/desc/settings/saml_get.md @@ -5,7 +5,7 @@ Returns the configured SAML settings that is used to authenticate to the Prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/settings/saml_post.md b/openapi-specs/compute/desc/settings/saml_post.md index 0bd9c4a25..dfe8d380f 100644 --- a/openapi-specs/compute/desc/settings/saml_post.md +++ b/openapi-specs/compute/desc/settings/saml_post.md @@ -7,7 +7,7 @@ For more information, see [Okta via SAML 2.0](https://docs.paloaltonetworks.com/ Refer to the following example cURL request that uses the basic auth to set up and enable the SAML integration with Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/settings/scan_get.md b/openapi-specs/compute/desc/settings/scan_get.md index 5c1df30a2..543ea7662 100644 --- a/openapi-specs/compute/desc/settings/scan_get.md +++ b/openapi-specs/compute/desc/settings/scan_get.md @@ -5,7 +5,7 @@ Returns the global settings for image, host, container, and registry scanning. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/settings/scan_post.md b/openapi-specs/compute/desc/settings/scan_post.md index f043d1c9f..9ddb521a2 100644 --- a/openapi-specs/compute/desc/settings/scan_post.md +++ b/openapi-specs/compute/desc/settings/scan_post.md @@ -9,7 +9,7 @@ Refer to the following example cURL request that configures the following scan i * Scan images, containers, and hosts once per day. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/settings/secrets_get.md b/openapi-specs/compute/desc/settings/secrets_get.md index 75e2b32c7..339009641 100644 --- a/openapi-specs/compute/desc/settings/secrets_get.md +++ b/openapi-specs/compute/desc/settings/secrets_get.md @@ -3,7 +3,7 @@ This endpoint will return configured secret store already configured in the cons The following example curl command retrieves any configured secret stores, as well as the refresh period in hours: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/settings/secrets_post.md b/openapi-specs/compute/desc/settings/secrets_post.md index d302ecdf8..730d031bf 100644 --- a/openapi-specs/compute/desc/settings/secrets_post.md +++ b/openapi-specs/compute/desc/settings/secrets_post.md @@ -5,7 +5,7 @@ Please note the data structure returned from endpoint /settings/secrets GET to s Refer to the following example curl command that adds a CyberArk secret store to the console with the appID set to `Prisma_Cloud_Compute_Console` and set the URL to `https://services-myca.twistlock.com:10882`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/settings/serverless-scan_get.md b/openapi-specs/compute/desc/settings/serverless-scan_get.md index bb8ce06ba..eb42e4a12 100644 --- a/openapi-specs/compute/desc/settings/serverless-scan_get.md +++ b/openapi-specs/compute/desc/settings/serverless-scan_get.md @@ -8,7 +8,7 @@ This endpoint maps to the **Function scope** table data in the **Defend > Vulner Refer to the following example cURL command that retrieves a list of serverless scan scopes: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/settings/serverless_get.md b/openapi-specs/compute/desc/settings/serverless_get.md index b6122c460..8c654807c 100644 --- a/openapi-specs/compute/desc/settings/serverless_get.md +++ b/openapi-specs/compute/desc/settings/serverless_get.md @@ -3,7 +3,7 @@ This endpoint will return any configured serverless function scanners found in * The following example curl command uses basic auth to retrieve serverless settings in an array, sorted by Cloud Provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/settings/serverless_post.md b/openapi-specs/compute/desc/settings/serverless_post.md index 6e26ea1d3..c0e0f3225 100644 --- a/openapi-specs/compute/desc/settings/serverless_post.md +++ b/openapi-specs/compute/desc/settings/serverless_post.md @@ -3,7 +3,7 @@ This endpoint will add serverless function providers to scan for vulnerabilities The following example curl command uses basic auth to add a serverless account to scan for serverless functions. This is assuming that you already have the [credential](https://docs.twistlock.com/docs/latest/configure/credentials_store.html) added to the console that is needed to scan that provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/settings/system_get.md b/openapi-specs/compute/desc/settings/system_get.md index 6f893abf0..0e8a3cba3 100644 --- a/openapi-specs/compute/desc/settings/system_get.md +++ b/openapi-specs/compute/desc/settings/system_get.md @@ -3,7 +3,7 @@ This endpoint will return all system settings in JSON format. The following example curl command does exactly that: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/settings/tas_get.md b/openapi-specs/compute/desc/settings/tas_get.md index 52f392433..d2d0017f0 100644 --- a/openapi-specs/compute/desc/settings/tas_get.md +++ b/openapi-specs/compute/desc/settings/tas_get.md @@ -5,7 +5,7 @@ Retrieves Tanzu Application Service (TAS) settings. Refer to the following example cURL command that retrieves all TAS settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/settings/telemetry_get.md b/openapi-specs/compute/desc/settings/telemetry_get.md index 6460c3fc3..46a807e77 100644 --- a/openapi-specs/compute/desc/settings/telemetry_get.md +++ b/openapi-specs/compute/desc/settings/telemetry_get.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that retrieves the settings if telemetry is enabled or not: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/settings/telemetry_post.md b/openapi-specs/compute/desc/settings/telemetry_post.md index bc97a6d0f..662846f33 100644 --- a/openapi-specs/compute/desc/settings/telemetry_post.md +++ b/openapi-specs/compute/desc/settings/telemetry_post.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to turn off telemetry: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/settings/trusted_certificate_post.md b/openapi-specs/compute/desc/settings/trusted_certificate_post.md index 5a2a30bda..c54b96fa5 100644 --- a/openapi-specs/compute/desc/settings/trusted_certificate_post.md +++ b/openapi-specs/compute/desc/settings/trusted_certificate_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/trusted-certificates` endpoint. Refer to the following example cURL request that uses basic auth to add a certificate to the list: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/desc/settings/trusted_certificates_post.md b/openapi-specs/compute/desc/settings/trusted_certificates_post.md index 78c07982b..e9bdc72a1 100644 --- a/openapi-specs/compute/desc/settings/trusted_certificates_post.md +++ b/openapi-specs/compute/desc/settings/trusted_certificates_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/certificates` endpoint. Refer to the following example cURL request that uses basic auth to enable this feature: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/compute/desc/settings/vm_get.md b/openapi-specs/compute/desc/settings/vm_get.md index 8043742f5..b98b94240 100644 --- a/openapi-specs/compute/desc/settings/vm_get.md +++ b/openapi-specs/compute/desc/settings/vm_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **VM images scope** table data in the **Defend > Vulne Refer to the following example cURL command that retrieves all the scopes used for pattern matching on VM functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/signup/post.md b/openapi-specs/compute/desc/signup/post.md index 1db21df29..67344a0b1 100644 --- a/openapi-specs/compute/desc/signup/post.md +++ b/openapi-specs/compute/desc/signup/post.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i The following cURL command creates the initial admin user with the username `admin` and password `password`. ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -X POST \ -d '{"username": "admin", "password": "password"}' \ diff --git a/openapi-specs/compute/desc/static/capabilities_get.md b/openapi-specs/compute/desc/static/capabilities_get.md index ea119d2a9..f9b60278c 100644 --- a/openapi-specs/compute/desc/static/capabilities_get.md +++ b/openapi-specs/compute/desc/static/capabilities_get.md @@ -1,7 +1,7 @@ Returns a list of capabilities used in host models. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/static/regions_get.md b/openapi-specs/compute/desc/static/regions_get.md index 4a07097ee..3b1adb5f1 100644 --- a/openapi-specs/compute/desc/static/regions_get.md +++ b/openapi-specs/compute/desc/static/regions_get.md @@ -1,7 +1,7 @@ Returns a list of regions used in cloud radar. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/static/syscalls_get.md b/openapi-specs/compute/desc/static/syscalls_get.md index 9e2ddcde7..09505ba39 100644 --- a/openapi-specs/compute/desc/static/syscalls_get.md +++ b/openapi-specs/compute/desc/static/syscalls_get.md @@ -2,7 +2,7 @@ Returns a list of the Linux kernel system calls. Runtime rules for containers can allow-list and deny-list specific system calls. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/static/vulnerabilities_get.md b/openapi-specs/compute/desc/static/vulnerabilities_get.md index cb6acab28..19809472b 100644 --- a/openapi-specs/compute/desc/static/vulnerabilities_get.md +++ b/openapi-specs/compute/desc/static/vulnerabilities_get.md @@ -3,7 +3,7 @@ This data can be used for building out reports with the API. This data can be correlated with the `/api/v1/images` endpoint, specifically the the `complianceVulnerabilities` and `cveVulnerabilities` objects, to generate more thorough reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/stats/compliance.md b/openapi-specs/compute/desc/stats/compliance.md index 5c5be3991..4f4c90071 100644 --- a/openapi-specs/compute/desc/stats/compliance.md +++ b/openapi-specs/compute/desc/stats/compliance.md @@ -5,7 +5,7 @@ For the current day, the response will also include detailed compliance stats fo The following example command that uses curl and basic auth to retrieve compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/stats/compliance_get.md b/openapi-specs/compute/desc/stats/compliance_get.md index 314f6a179..2ef2f9f75 100644 --- a/openapi-specs/compute/desc/stats/compliance_get.md +++ b/openapi-specs/compute/desc/stats/compliance_get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Compliance > Compliance explorer* Refer to the following example cURL command that retrieves compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/stats/compliance_refresh.md b/openapi-specs/compute/desc/stats/compliance_refresh.md index b75491a69..d8ce211a8 100644 --- a/openapi-specs/compute/desc/stats/compliance_refresh.md +++ b/openapi-specs/compute/desc/stats/compliance_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/compliance endpoint return The following example command that uses curl and basic auth to refresh compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/stats/compliance_refresh_post.md b/openapi-specs/compute/desc/stats/compliance_refresh_post.md index 541a54d16..0f329d1db 100644 --- a/openapi-specs/compute/desc/stats/compliance_refresh_post.md +++ b/openapi-specs/compute/desc/stats/compliance_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/compliance`, b Refer to the following example cURL command that refreshes compliance statistics for the current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/stats/daily.md b/openapi-specs/compute/desc/stats/daily.md index 082f58a27..9fd4c6138 100644 --- a/openapi-specs/compute/desc/stats/daily.md +++ b/openapi-specs/compute/desc/stats/daily.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/stats/daily_get.md b/openapi-specs/compute/desc/stats/daily_get.md index 0db89bdc3..fe852126c 100644 --- a/openapi-specs/compute/desc/stats/daily_get.md +++ b/openapi-specs/compute/desc/stats/daily_get.md @@ -3,7 +3,7 @@ Returns a historical list of per-day statistics for the resources protected by P The following example command uses curl and basic auth to retrieve the daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/stats/dashboard.md b/openapi-specs/compute/desc/stats/dashboard.md index be90a2d32..1e5fabf08 100644 --- a/openapi-specs/compute/desc/stats/dashboard.md +++ b/openapi-specs/compute/desc/stats/dashboard.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/stats/dashboard_get.md b/openapi-specs/compute/desc/stats/dashboard_get.md index 601769645..8f0bc827c 100644 --- a/openapi-specs/compute/desc/stats/dashboard_get.md +++ b/openapi-specs/compute/desc/stats/dashboard_get.md @@ -5,7 +5,7 @@ Returns statistics about the resources protected by Prisma Cloud Compute, includ Refer to the following example cURL command that retrieves dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/stats/events_get.md b/openapi-specs/compute/desc/stats/events_get.md index 3be5eb4e7..e64f98e57 100644 --- a/openapi-specs/compute/desc/stats/events_get.md +++ b/openapi-specs/compute/desc/stats/events_get.md @@ -5,7 +5,7 @@ Returns events statistics for your environment. Refer to the following example cURL command retrieves event stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/stats/vulnerabilities.md b/openapi-specs/compute/desc/stats/vulnerabilities.md index 40c4dd1f1..199cfab62 100644 --- a/openapi-specs/compute/desc/stats/vulnerabilities.md +++ b/openapi-specs/compute/desc/stats/vulnerabilities.md @@ -5,7 +5,7 @@ For the current day, the response will also include descriptions of the CVEs cur The following example command that uses curl and basic auth to retrieve vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/stats/vulnerabilities_download_get.md b/openapi-specs/compute/desc/stats/vulnerabilities_download_get.md index 753af8c7f..9930a636b 100644 --- a/openapi-specs/compute/desc/stats/vulnerabilities_download_get.md +++ b/openapi-specs/compute/desc/stats/vulnerabilities_download_get.md @@ -17,7 +17,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a summary count of the CVEs and detailed descriptions for each CVE in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/stats/vulnerabilities_get.md b/openapi-specs/compute/desc/stats/vulnerabilities_get.md index 2fe5d4e18..978e96cfe 100644 --- a/openapi-specs/compute/desc/stats/vulnerabilities_get.md +++ b/openapi-specs/compute/desc/stats/vulnerabilities_get.md @@ -20,7 +20,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a summary count of the CVEs and detailed descriptions for each CVE: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/stats/vulnerabilities_impacted_resources_download_get.md b/openapi-specs/compute/desc/stats/vulnerabilities_impacted_resources_download_get.md index 0821d6a9f..502c09a6c 100644 --- a/openapi-specs/compute/desc/stats/vulnerabilities_impacted_resources_download_get.md +++ b/openapi-specs/compute/desc/stats/vulnerabilities_impacted_resources_download_get.md @@ -15,7 +15,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a list of impacted resources for `CVE-2015-0313` in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/stats/vulnerabilities_impacted_resources_get.md b/openapi-specs/compute/desc/stats/vulnerabilities_impacted_resources_get.md index c1e6d0ba2..014a5f4a2 100644 --- a/openapi-specs/compute/desc/stats/vulnerabilities_impacted_resources_get.md +++ b/openapi-specs/compute/desc/stats/vulnerabilities_impacted_resources_get.md @@ -18,7 +18,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a list of impacted resources for `CVE-2022-28391`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -95,7 +95,7 @@ Refer to the following example JSON response that shows the risk tree for the im Refer to the following example cURL command that retrieves a the impacted registry images `CVE-2015-0313` by using an optional query parameter `resourceType`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -108,7 +108,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a paginated list of impacted resources for `CVE-2015-0313` by using optional query parameters `limit` and `offset`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/stats/vulnerabilities_refresh.md b/openapi-specs/compute/desc/stats/vulnerabilities_refresh.md index 505a99d98..2aa7da8a1 100644 --- a/openapi-specs/compute/desc/stats/vulnerabilities_refresh.md +++ b/openapi-specs/compute/desc/stats/vulnerabilities_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/vulnerabilities endpoint r The following example command that uses curl and basic auth to refresh vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/stats/vulnerabilities_refresh_post.md b/openapi-specs/compute/desc/stats/vulnerabilities_refresh_post.md index 1e3210e18..85e3ddd7a 100644 --- a/openapi-specs/compute/desc/stats/vulnerabilities_refresh_post.md +++ b/openapi-specs/compute/desc/stats/vulnerabilities_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/vulnerabilitie Refer to the following example cURL command that refreshes the vulnerability statistics for current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/stats/workload_get.md b/openapi-specs/compute/desc/stats/workload_get.md index a25deed5c..940a835ee 100644 --- a/openapi-specs/compute/desc/stats/workload_get.md +++ b/openapi-specs/compute/desc/stats/workload_get.md @@ -1,7 +1,7 @@ Returns the workload statistics from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/statuses/intelligence.md b/openapi-specs/compute/desc/statuses/intelligence.md index 74da8c7ff..ac102e81f 100644 --- a/openapi-specs/compute/desc/statuses/intelligence.md +++ b/openapi-specs/compute/desc/statuses/intelligence.md @@ -3,7 +3,7 @@ Returns the connection status of the intelligence stream and the last intelligen The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/statuses/intelligence_get.md b/openapi-specs/compute/desc/statuses/intelligence_get.md index c18dd9611..b5f620ad9 100644 --- a/openapi-specs/compute/desc/statuses/intelligence_get.md +++ b/openapi-specs/compute/desc/statuses/intelligence_get.md @@ -3,7 +3,7 @@ Returns the connection status for the Intelligence Stream, along with the time o The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/statuses/registry_get.md b/openapi-specs/compute/desc/statuses/registry_get.md index 427c4915c..e4fd09fe9 100644 --- a/openapi-specs/compute/desc/statuses/registry_get.md +++ b/openapi-specs/compute/desc/statuses/registry_get.md @@ -13,7 +13,7 @@ To view the more details about the progress of a regular or on-demand registry s Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/statuses/secrets_get.md b/openapi-specs/compute/desc/statuses/secrets_get.md index 510f15161..e77c5ed70 100644 --- a/openapi-specs/compute/desc/statuses/secrets_get.md +++ b/openapi-specs/compute/desc/statuses/secrets_get.md @@ -3,7 +3,7 @@ Returns the connection status of any secret stores you have configured, as well The following is an example curl using basic auth to find the secret store status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/statuses/serverless-radar_get.md b/openapi-specs/compute/desc/statuses/serverless-radar_get.md index 3bfdbb5bf..4ab5d0c1d 100644 --- a/openapi-specs/compute/desc/statuses/serverless-radar_get.md +++ b/openapi-specs/compute/desc/statuses/serverless-radar_get.md @@ -1,7 +1,7 @@ Returns the status of the serverless scans. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/tags/get.md b/openapi-specs/compute/desc/tags/get.md index 6da7ad135..604eee98e 100644 --- a/openapi-specs/compute/desc/tags/get.md +++ b/openapi-specs/compute/desc/tags/get.md @@ -5,7 +5,7 @@ Retrieves a list of tags. Refer to the following example cURL command that retrieves a list of tags: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/tags/name_delete.md b/openapi-specs/compute/desc/tags/name_delete.md index 2ed010e57..6dedfce8f 100644 --- a/openapi-specs/compute/desc/tags/name_delete.md +++ b/openapi-specs/compute/desc/tags/name_delete.md @@ -5,7 +5,7 @@ Deletes a tag from the system. Refer to the following example cURL command that deletes a tag named *my tag*: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/desc/tags/name_put.md b/openapi-specs/compute/desc/tags/name_put.md index cbaea40d3..a5923b8ef 100644 --- a/openapi-specs/compute/desc/tags/name_put.md +++ b/openapi-specs/compute/desc/tags/name_put.md @@ -9,7 +9,7 @@ You must define all parameters in your PUT request. Refer to the following example cURL command that updates the parameters in a tag named `my_tag`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/desc/tags/post.md b/openapi-specs/compute/desc/tags/post.md index d55ae8b96..8e1a493d6 100644 --- a/openapi-specs/compute/desc/tags/post.md +++ b/openapi-specs/compute/desc/tags/post.md @@ -8,7 +8,7 @@ You can use tags as policy exceptions or assign them to vulnerabilities for acti Refer to the following example cURL command that creates a tag named "my-tag": ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/tags/tag_cve_delete.md b/openapi-specs/compute/desc/tags/tag_cve_delete.md index 8caed79cf..3031029b9 100644 --- a/openapi-specs/compute/desc/tags/tag_cve_delete.md +++ b/openapi-specs/compute/desc/tags/tag_cve_delete.md @@ -6,7 +6,7 @@ When you delete a tag, the tag is deleted from a wider scope. All the packages a Refer to the following example cURL command that removes the tag named `ignored` from the CVE `CVE-2017-15088`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/desc/tags/tag_cve_post.md b/openapi-specs/compute/desc/tags/tag_cve_post.md index 966a80bd8..1b4ead89b 100644 --- a/openapi-specs/compute/desc/tags/tag_cve_post.md +++ b/openapi-specs/compute/desc/tags/tag_cve_post.md @@ -45,7 +45,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the source package `perl`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -72,7 +72,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2021-20305` on the binary package `gnutls`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -98,7 +98,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -120,7 +120,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `image` and to all the packages and resources. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -140,7 +140,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `host`, resource `servo-vmware71`, and to all the packages. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/tas-droplets/download_get.md b/openapi-specs/compute/desc/tas-droplets/download_get.md index db92ec66a..7fdd6e259 100644 --- a/openapi-specs/compute/desc/tas-droplets/download_get.md +++ b/openapi-specs/compute/desc/tas-droplets/download_get.md @@ -9,7 +9,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo The following cURL command downloads all TAS droplets to a CSV file called `tas_droplets.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/tas-droplets/get.md b/openapi-specs/compute/desc/tas-droplets/get.md index d820517c2..ce07f8527 100644 --- a/openapi-specs/compute/desc/tas-droplets/get.md +++ b/openapi-specs/compute/desc/tas-droplets/get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > VMware Tanzu bl The following cURL command retrieves all TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/tas-droplets/get_tas_addresses.md b/openapi-specs/compute/desc/tas-droplets/get_tas_addresses.md index 528281613..8333cd24f 100644 --- a/openapi-specs/compute/desc/tas-droplets/get_tas_addresses.md +++ b/openapi-specs/compute/desc/tas-droplets/get_tas_addresses.md @@ -9,7 +9,7 @@ Gets the Cloud Controller Addresses of scanned Tanzu Application Service (TAS) d The following cURL command retrieves the Cloud Controller Addresses of scanned TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/tas-droplets/progress_get.md b/openapi-specs/compute/desc/tas-droplets/progress_get.md index 504a21e84..507d001bf 100644 --- a/openapi-specs/compute/desc/tas-droplets/progress_get.md +++ b/openapi-specs/compute/desc/tas-droplets/progress_get.md @@ -5,7 +5,7 @@ Returns the details of the TAS Droplets ongoing scan. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/tas-droplets/scan_post.md b/openapi-specs/compute/desc/tas-droplets/scan_post.md index aad2174af..13c4eeeb9 100644 --- a/openapi-specs/compute/desc/tas-droplets/scan_post.md +++ b/openapi-specs/compute/desc/tas-droplets/scan_post.md @@ -5,7 +5,7 @@ Scans the TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/tas-droplets/stop_post.md b/openapi-specs/compute/desc/tas-droplets/stop_post.md index 5f5a019b1..53d709ec7 100644 --- a/openapi-specs/compute/desc/tas-droplets/stop_post.md +++ b/openapi-specs/compute/desc/tas-droplets/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing scan of TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/trust/data_get.md b/openapi-specs/compute/desc/trust/data_get.md index dd55d47a3..88983f139 100644 --- a/openapi-specs/compute/desc/trust/data_get.md +++ b/openapi-specs/compute/desc/trust/data_get.md @@ -5,7 +5,7 @@ Returns the trusted registries, repositories, and images. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/trust/data_put.md b/openapi-specs/compute/desc/trust/data_put.md index 0e6a0ba49..733514505 100644 --- a/openapi-specs/compute/desc/trust/data_put.md +++ b/openapi-specs/compute/desc/trust/data_put.md @@ -6,7 +6,7 @@ Specify trusted images using either the image name or layers properties. Refer to the following example cURL command that uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -19,7 +19,7 @@ To edit a trust group based on image base layers, use PUT to specify a list of S Refer to the following example that specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/desc/trust/get.md b/openapi-specs/compute/desc/trust/get.md index 1226cd0a3..57ff5bdb5 100644 --- a/openapi-specs/compute/desc/trust/get.md +++ b/openapi-specs/compute/desc/trust/get.md @@ -3,7 +3,7 @@ Retrieves a list of all trusted images. The following example curl command uses basic auth to retrieve all trusted images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/trust/id_delete.md b/openapi-specs/compute/desc/trust/id_delete.md index b3114775f..d63cdf71a 100644 --- a/openapi-specs/compute/desc/trust/id_delete.md +++ b/openapi-specs/compute/desc/trust/id_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to specify a image trust grou ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/desc/trust/id_put.md b/openapi-specs/compute/desc/trust/id_put.md index 44d2c8b8b..c98617bcd 100644 --- a/openapi-specs/compute/desc/trust/id_put.md +++ b/openapi-specs/compute/desc/trust/id_put.md @@ -9,7 +9,7 @@ For more information about handles, see the `_id` in the response body for the G The following example curl command uses basic auth to modify the image property for an existing trusted image entry, where the handle for the entry is `docker-ubuntu-group`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/compute/desc/trust/learn_get.md b/openapi-specs/compute/desc/trust/learn_get.md index d8a3414d0..004b16b02 100644 --- a/openapi-specs/compute/desc/trust/learn_get.md +++ b/openapi-specs/compute/desc/trust/learn_get.md @@ -1,7 +1,7 @@ Returns the state of the trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/trust/learn_post.md b/openapi-specs/compute/desc/trust/learn_post.md index 094817738..008657fa2 100644 --- a/openapi-specs/compute/desc/trust/learn_post.md +++ b/openapi-specs/compute/desc/trust/learn_post.md @@ -1,7 +1,7 @@ Sets the state of trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/trust/post.md b/openapi-specs/compute/desc/trust/post.md index 1072275a1..23a324c6c 100644 --- a/openapi-specs/compute/desc/trust/post.md +++ b/openapi-specs/compute/desc/trust/post.md @@ -7,7 +7,7 @@ For more information about handles, see the `_id` key in the response body for t The following example curl command uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ To create a trust group based on image base layers, POST a list of SHA256 hashes The following example specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/users/get.md b/openapi-specs/compute/desc/users/get.md index e4e6966ec..cd5a661ba 100644 --- a/openapi-specs/compute/desc/users/get.md +++ b/openapi-specs/compute/desc/users/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Manage > Authentication > Users** in the Console UI. The following cURL command retrieves all users. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/users/id_delete.md b/openapi-specs/compute/desc/users/id_delete.md index 1cfa5642d..66a1102f9 100644 --- a/openapi-specs/compute/desc/users/id_delete.md +++ b/openapi-specs/compute/desc/users/id_delete.md @@ -17,7 +17,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes user `ID` from the system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/compute/desc/util/osx_twistcli_arm64_get.md b/openapi-specs/compute/desc/util/osx_twistcli_arm64_get.md index b385d0d3b..a30686374 100644 --- a/openapi-specs/compute/desc/util/osx_twistcli_arm64_get.md +++ b/openapi-specs/compute/desc/util/osx_twistcli_arm64_get.md @@ -7,7 +7,7 @@ Downloads the twistcli binary executable for MacOS platforms based on ARM64 arch Refer to the following example cURL command that downloads and saves the “twistcli” binary executable for ARM64 bit MacOS platforms to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/compute/desc/util/osx_twistcli_get.md b/openapi-specs/compute/desc/util/osx_twistcli_get.md index c49f96c41..2353ea338 100644 --- a/openapi-specs/compute/desc/util/osx_twistcli_get.md +++ b/openapi-specs/compute/desc/util/osx_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **MacOS platform** hyperlink in **Manage > System > Ut The following cURL command downloads the twistcli binary executable for MacOS platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli \ diff --git a/openapi-specs/compute/desc/util/twistcli_arm64_get.md b/openapi-specs/compute/desc/util/twistcli_arm64_get.md index 7ec36d3f5..a3d7318ab 100644 --- a/openapi-specs/compute/desc/util/twistcli_arm64_get.md +++ b/openapi-specs/compute/desc/util/twistcli_arm64_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/compute/desc/util/twistcli_get.md b/openapi-specs/compute/desc/util/twistcli_get.md index f9d2d295c..08a3ae8aa 100644 --- a/openapi-specs/compute/desc/util/twistcli_get.md +++ b/openapi-specs/compute/desc/util/twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -X GET -o \ 'https:///api/v/util/twistcli' diff --git a/openapi-specs/compute/desc/util/twistlock_jenkins_plugin_get.md b/openapi-specs/compute/desc/util/twistlock_jenkins_plugin_get.md index 9fb8d4a02..c9f180e5e 100644 --- a/openapi-specs/compute/desc/util/twistlock_jenkins_plugin_get.md +++ b/openapi-specs/compute/desc/util/twistlock_jenkins_plugin_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-jenkins-plugin.hpi \ diff --git a/openapi-specs/compute/desc/util/twistlock_tas_tile_get.md b/openapi-specs/compute/desc/util/twistlock_tas_tile_get.md index fea28aaad..3fd114e2d 100644 --- a/openapi-specs/compute/desc/util/twistlock_tas_tile_get.md +++ b/openapi-specs/compute/desc/util/twistlock_tas_tile_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-tile.pivotal \ diff --git a/openapi-specs/compute/desc/util/windows_twistcli_get.md b/openapi-specs/compute/desc/util/windows_twistcli_get.md index 1c545dbbb..38c609b08 100644 --- a/openapi-specs/compute/desc/util/windows_twistcli_get.md +++ b/openapi-specs/compute/desc/util/windows_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Windows platform** hyperlink in **Manage > System > The following cURL command downloads the twistcli binary executable for Windows platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli.exe \ diff --git a/openapi-specs/compute/desc/version/get.md b/openapi-specs/compute/desc/version/get.md index 28be315e0..5787e90fd 100644 --- a/openapi-specs/compute/desc/version/get.md +++ b/openapi-specs/compute/desc/version/get.md @@ -5,7 +5,7 @@ Retrieves the version number for Console. The following cURL command retrieves the version number for Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/vms/download_get.md b/openapi-specs/compute/desc/vms/download_get.md index e65e4efc9..3cc813bc5 100644 --- a/openapi-specs/compute/desc/vms/download_get.md +++ b/openapi-specs/compute/desc/vms/download_get.md @@ -7,7 +7,7 @@ Returns all VM image scan reports in CSV format. Refer to the following example cURL command that retrieves all VM image scan reports and saves the results in a CSV file called `vm_images_scan.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/vms/get.md b/openapi-specs/compute/desc/vms/get.md index e78a28c76..03ed8deb3 100644 --- a/openapi-specs/compute/desc/vms/get.md +++ b/openapi-specs/compute/desc/vms/get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > Hosts > VM imag Refer to the following example cURL command that retrieves all VM image scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/vms/labels_get.md b/openapi-specs/compute/desc/vms/labels_get.md index 0aed1a217..f509da479 100644 --- a/openapi-specs/compute/desc/vms/labels_get.md +++ b/openapi-specs/compute/desc/vms/labels_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/compute/desc/vms/names_get.md b/openapi-specs/compute/desc/vms/names_get.md index 1145cfa0d..9f92e0156 100644 --- a/openapi-specs/compute/desc/vms/names_get.md +++ b/openapi-specs/compute/desc/vms/names_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/compute/desc/vms/scan_post.md b/openapi-specs/compute/desc/vms/scan_post.md index 1caa2dcaf..4d4de3ab1 100644 --- a/openapi-specs/compute/desc/vms/scan_post.md +++ b/openapi-specs/compute/desc/vms/scan_post.md @@ -5,7 +5,7 @@ Re-scans all VM images immediately. This endpoint returns the time that the scan Refer to the following example cURL command that forces Prisma Cloud to re-scan all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/compute/desc/vms/stop_post.md b/openapi-specs/compute/desc/vms/stop_post.md index 4a74743eb..49b2b26f9 100644 --- a/openapi-specs/compute/desc/vms/stop_post.md +++ b/openapi-specs/compute/desc/vms/stop_post.md @@ -7,7 +7,7 @@ Note: It might take a few minutes for the scan to stop completely. Refer to the following example cURL command that forces Prisma Cloud to stop scanning all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/SCAP/get.md b/openapi-specs/cwpp/desc/SCAP/get.md index a25abe94e..f5870d822 100644 --- a/openapi-specs/cwpp/desc/SCAP/get.md +++ b/openapi-specs/cwpp/desc/SCAP/get.md @@ -3,7 +3,7 @@ This endpoint will return any SCAP datastreams uploaded to the console. This end The following is an example curl command that uses basic auth to retrieve any uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/SCAP/id_delete.md b/openapi-specs/cwpp/desc/SCAP/id_delete.md index 39f1b0132..52923f20a 100644 --- a/openapi-specs/cwpp/desc/SCAP/id_delete.md +++ b/openapi-specs/cwpp/desc/SCAP/id_delete.md @@ -3,7 +3,7 @@ This endpoint will delete any SCAP datastreams uploaded to the console. You can The following is an example curl command that uses basic auth to delete an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/cwpp/desc/SCAP/post.md b/openapi-specs/cwpp/desc/SCAP/post.md index d459a0e97..c45fd6b4e 100644 --- a/openapi-specs/cwpp/desc/SCAP/post.md +++ b/openapi-specs/cwpp/desc/SCAP/post.md @@ -3,7 +3,7 @@ This endpoint will allow you to add a SCAP datastream to the console. The following is an example curl command that uses basic auth to add an uploaded datastreams configured for SCAP scanning: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/_ping/get.md b/openapi-specs/cwpp/desc/_ping/get.md index 8e143ef67..b7ffdc653 100644 --- a/openapi-specs/cwpp/desc/_ping/get.md +++ b/openapi-specs/cwpp/desc/_ping/get.md @@ -5,7 +5,7 @@ Checks if Console is reachable from your network host. Refer to the following cURL example command that pings Console and prints the HTTP response code: ```bash -$ curl -k \ +$ curl \ -s \ -o /dev/null \ -w "%{http_code}\n" \ diff --git a/openapi-specs/cwpp/desc/agentless/get_agentless_progress.md b/openapi-specs/cwpp/desc/agentless/get_agentless_progress.md index b98ed9da5..78396eec6 100644 --- a/openapi-specs/cwpp/desc/agentless/get_agentless_progress.md +++ b/openapi-specs/cwpp/desc/agentless/get_agentless_progress.md @@ -5,7 +5,7 @@ Shows the progress of an ongoing scan on hosts or containers for vulnerabilities Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/agentless/post_agentless_scan.md b/openapi-specs/cwpp/desc/agentless/post_agentless_scan.md index f1295cdc4..e2f8a4e11 100644 --- a/openapi-specs/cwpp/desc/agentless/post_agentless_scan.md +++ b/openapi-specs/cwpp/desc/agentless/post_agentless_scan.md @@ -9,7 +9,7 @@ Make sure that you download (use the agentless/templates API) and apply the perm Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/agentless/post_agentless_stop.md b/openapi-specs/cwpp/desc/agentless/post_agentless_stop.md index ab83960cc..ddee6ec7a 100644 --- a/openapi-specs/cwpp/desc/agentless/post_agentless_stop.md +++ b/openapi-specs/cwpp/desc/agentless/post_agentless_stop.md @@ -5,7 +5,7 @@ Stops an ongoing scan on hosts or containers for vulnerabilities and compliance. Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/agentless/post_agentless_templates.md b/openapi-specs/cwpp/desc/agentless/post_agentless_templates.md index 96be32555..5159c439a 100644 --- a/openapi-specs/cwpp/desc/agentless/post_agentless_templates.md +++ b/openapi-specs/cwpp/desc/agentless/post_agentless_templates.md @@ -31,7 +31,7 @@ Add the supported cloud accounts (AWS, Azure, GCP, and OCI) in Prisma Cloud Comp Refer to the following example cURL command: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/alert-profiles/get.md b/openapi-specs/cwpp/desc/alert-profiles/get.md index 82647e248..f17191ac4 100644 --- a/openapi-specs/cwpp/desc/alert-profiles/get.md +++ b/openapi-specs/cwpp/desc/alert-profiles/get.md @@ -3,7 +3,7 @@ Retrieve a list of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/alert-profiles/id_delete.md b/openapi-specs/cwpp/desc/alert-profiles/id_delete.md index 1a67fe20e..2cf21b57e 100644 --- a/openapi-specs/cwpp/desc/alert-profiles/id_delete.md +++ b/openapi-specs/cwpp/desc/alert-profiles/id_delete.md @@ -5,7 +5,7 @@ This method has no response data. The following example curl command deletes an existing alert profile named `PROFILE-NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/cwpp/desc/alert-profiles/names_get.md b/openapi-specs/cwpp/desc/alert-profiles/names_get.md index cac14437b..38a1f78ca 100644 --- a/openapi-specs/cwpp/desc/alert-profiles/names_get.md +++ b/openapi-specs/cwpp/desc/alert-profiles/names_get.md @@ -3,7 +3,7 @@ Retrieve a list of only the names of all alert profiles created in the system. The following example curl command uses basic auth to retrieve all alert profiles' names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/alert-profiles/post.md b/openapi-specs/cwpp/desc/alert-profiles/post.md index 9fa643429..19db863d5 100644 --- a/openapi-specs/cwpp/desc/alert-profiles/post.md +++ b/openapi-specs/cwpp/desc/alert-profiles/post.md @@ -3,7 +3,7 @@ Update an existing alert profile created in the system. The following example curl command uses basic auth to add a Jira Alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/alert-profiles/test_post.md b/openapi-specs/cwpp/desc/alert-profiles/test_post.md index 1fc745efa..2205a6e73 100644 --- a/openapi-specs/cwpp/desc/alert-profiles/test_post.md +++ b/openapi-specs/cwpp/desc/alert-profiles/test_post.md @@ -3,7 +3,7 @@ Sends a test alert to verify successful configuration of the alert profile setti The following example curl command uses basic auth to send test alert for an email alert profile: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/application-control/get.md b/openapi-specs/cwpp/desc/application-control/get.md index 5bd600beb..535584284 100644 --- a/openapi-specs/cwpp/desc/application-control/get.md +++ b/openapi-specs/cwpp/desc/application-control/get.md @@ -3,7 +3,7 @@ Retrieves the host application control rules. The following example curl command uses basic auth to retrieve the control rules: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/access_delete.md b/openapi-specs/cwpp/desc/audits/access_delete.md index 37f33ca64..0450b534c 100644 --- a/openapi-specs/cwpp/desc/audits/access_delete.md +++ b/openapi-specs/cwpp/desc/audits/access_delete.md @@ -2,7 +2,7 @@ Deletes **all** access audits. This deletion cannot be undone. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/cwpp/desc/audits/access_download_get.md b/openapi-specs/cwpp/desc/audits/access_download_get.md index 1700deb8d..8d8fee259 100644 --- a/openapi-specs/cwpp/desc/audits/access_download_get.md +++ b/openapi-specs/cwpp/desc/audits/access_download_get.md @@ -3,7 +3,7 @@ Returns the docker access audit events data in CSV format that are logged and ag **Note**: You can download the access events from Console under **Monitor > Events > Docker audits > Download CSV**. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/access_filters_get.md b/openapi-specs/cwpp/desc/audits/access_filters_get.md index 00ac061c1..4b8e9cd9b 100644 --- a/openapi-specs/cwpp/desc/audits/access_filters_get.md +++ b/openapi-specs/cwpp/desc/audits/access_filters_get.md @@ -5,7 +5,7 @@ The following example uses basic auth to list history of commands that are run o ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ The following command gives list of sudo events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -27,7 +27,7 @@ $ curl -k \ The following command gives list of SSHD events on hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/access_get.md b/openapi-specs/cwpp/desc/audits/access_get.md index 2401391c7..56e53fe12 100644 --- a/openapi-specs/cwpp/desc/audits/access_get.md +++ b/openapi-specs/cwpp/desc/audits/access_get.md @@ -8,7 +8,7 @@ You can configure Prisma Cloud Compute to log and aggregate events such as sudo Refer to the following example cURL command that gives a list of all access audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/admission_download_get.md b/openapi-specs/cwpp/desc/audits/admission_download_get.md index 9571c483f..d45f47c4e 100644 --- a/openapi-specs/cwpp/desc/audits/admission_download_get.md +++ b/openapi-specs/cwpp/desc/audits/admission_download_get.md @@ -4,7 +4,7 @@ Returns the access admission events data in CSV format that were alerted or bloc Refer to the following example cURL command that downloads the admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/admission_get.md b/openapi-specs/cwpp/desc/audits/admission_get.md index 84414496c..3640c737c 100644 --- a/openapi-specs/cwpp/desc/audits/admission_get.md +++ b/openapi-specs/cwpp/desc/audits/admission_get.md @@ -4,7 +4,7 @@ Returns all activities that were alerted or blocked by Defender functioning as O Refer to the following example cURL command that gives a list of all admission audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/firewall_network_container_download_get.md b/openapi-specs/cwpp/desc/audits/firewall_network_container_download_get.md index 29029ac6d..434e09acd 100644 --- a/openapi-specs/cwpp/desc/audits/firewall_network_container_download_get.md +++ b/openapi-specs/cwpp/desc/audits/firewall_network_container_download_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/firewall_network_container_get.md b/openapi-specs/cwpp/desc/audits/firewall_network_container_get.md index 454558a44..be03b2c45 100644 --- a/openapi-specs/cwpp/desc/audits/firewall_network_container_get.md +++ b/openapi-specs/cwpp/desc/audits/firewall_network_container_get.md @@ -12,7 +12,7 @@ For containers, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/firewall_network_host_download_get.md b/openapi-specs/cwpp/desc/audits/firewall_network_host_download_get.md index 768dd00d7..e83e8e1c3 100644 --- a/openapi-specs/cwpp/desc/audits/firewall_network_host_download_get.md +++ b/openapi-specs/cwpp/desc/audits/firewall_network_host_download_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/firewall_network_host_get.md b/openapi-specs/cwpp/desc/audits/firewall_network_host_get.md index e5dc4c399..6cbda0d4b 100644 --- a/openapi-specs/cwpp/desc/audits/firewall_network_host_get.md +++ b/openapi-specs/cwpp/desc/audits/firewall_network_host_get.md @@ -9,7 +9,7 @@ For hosts, rules are defined between: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/incidents_archive_patch.md b/openapi-specs/cwpp/desc/audits/incidents_archive_patch.md index a1127a001..d1f42eedd 100644 --- a/openapi-specs/cwpp/desc/audits/incidents_archive_patch.md +++ b/openapi-specs/cwpp/desc/audits/incidents_archive_patch.md @@ -7,7 +7,7 @@ You can get an incident ID from the list of incidents using the endpoint GET /ap Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/cwpp/desc/audits/incidents_download_get.md b/openapi-specs/cwpp/desc/audits/incidents_download_get.md index 2266c3471..5958756bf 100644 --- a/openapi-specs/cwpp/desc/audits/incidents_download_get.md +++ b/openapi-specs/cwpp/desc/audits/incidents_download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the **CSV** hyperlink in **Monitor > Runtime > Incident ex The following cURL command downloads all incidents and saves the result in a CSV file called `incidents.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/incidents_filters_get.md b/openapi-specs/cwpp/desc/audits/incidents_filters_get.md index 7d1c6f303..856881c90 100644 --- a/openapi-specs/cwpp/desc/audits/incidents_filters_get.md +++ b/openapi-specs/cwpp/desc/audits/incidents_filters_get.md @@ -3,7 +3,7 @@ This endpoint lists the incident categories found in your environment. The following example lists incident filters. ```bash -$ curl -k \ +$ curl \ -u \ https://console:8083/api/v1/audits/incidents/filters ``` diff --git a/openapi-specs/cwpp/desc/audits/incidents_get.md b/openapi-specs/cwpp/desc/audits/incidents_get.md index 7724a08c1..9b9451821 100644 --- a/openapi-specs/cwpp/desc/audits/incidents_get.md +++ b/openapi-specs/cwpp/desc/audits/incidents_get.md @@ -9,7 +9,7 @@ This endpoint maps to the table in **Monitor > Runtime > Incident explorer** in Refer to the following example cURL command that retrieves a list of unacknowledged incidents (not in the archived state): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/kubernetes_download_get.md b/openapi-specs/cwpp/desc/audits/kubernetes_download_get.md index 6008bd92a..62992095c 100644 --- a/openapi-specs/cwpp/desc/audits/kubernetes_download_get.md +++ b/openapi-specs/cwpp/desc/audits/kubernetes_download_get.md @@ -7,7 +7,7 @@ Returns the audit events data that occur in an integrated Kubernetes cluster tha Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/kubernetes_get.md b/openapi-specs/cwpp/desc/audits/kubernetes_get.md index e1ecb8a88..2e3f51b71 100644 --- a/openapi-specs/cwpp/desc/audits/kubernetes_get.md +++ b/openapi-specs/cwpp/desc/audits/kubernetes_get.md @@ -7,7 +7,7 @@ Retrieves events that occur in an integrated Kubernetes cluster that you configu Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/mgmt_download_get.md b/openapi-specs/cwpp/desc/audits/mgmt_download_get.md index ae3ef45b6..bcee17342 100644 --- a/openapi-specs/cwpp/desc/audits/mgmt_download_get.md +++ b/openapi-specs/cwpp/desc/audits/mgmt_download_get.md @@ -10,7 +10,7 @@ Management audits are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/mgmt_filters_get.md b/openapi-specs/cwpp/desc/audits/mgmt_filters_get.md index 854977b99..f910a4c2a 100644 --- a/openapi-specs/cwpp/desc/audits/mgmt_filters_get.md +++ b/openapi-specs/cwpp/desc/audits/mgmt_filters_get.md @@ -6,7 +6,7 @@ Use these filters to query management audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/mgmt_get.md b/openapi-specs/cwpp/desc/audits/mgmt_get.md index 5b586cb5e..abe802348 100644 --- a/openapi-specs/cwpp/desc/audits/mgmt_get.md +++ b/openapi-specs/cwpp/desc/audits/mgmt_get.md @@ -10,7 +10,7 @@ Management audit events are: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/runtime_app_embedded_download_get.md b/openapi-specs/cwpp/desc/audits/runtime_app_embedded_download_get.md index f3d844ead..ec5ae0f2a 100644 --- a/openapi-specs/cwpp/desc/audits/runtime_app_embedded_download_get.md +++ b/openapi-specs/cwpp/desc/audits/runtime_app_embedded_download_get.md @@ -5,7 +5,7 @@ Returns the app-embedded runtime audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/runtime_app_embedded_get.md b/openapi-specs/cwpp/desc/audits/runtime_app_embedded_get.md index c1d72acfa..51a43b7f5 100644 --- a/openapi-specs/cwpp/desc/audits/runtime_app_embedded_get.md +++ b/openapi-specs/cwpp/desc/audits/runtime_app_embedded_get.md @@ -5,7 +5,7 @@ Retrieves all app-embedded runtime audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/runtime_container_delete.md b/openapi-specs/cwpp/desc/audits/runtime_container_delete.md index ddc8e82d6..62050c71f 100644 --- a/openapi-specs/cwpp/desc/audits/runtime_container_delete.md +++ b/openapi-specs/cwpp/desc/audits/runtime_container_delete.md @@ -3,7 +3,7 @@ Deletes all container runtime audits. The following example curl command uses basic auth to delete all the audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/cwpp/desc/audits/runtime_container_download_get.md b/openapi-specs/cwpp/desc/audits/runtime_container_download_get.md index 20e673b5e..81286d929 100644 --- a/openapi-specs/cwpp/desc/audits/runtime_container_download_get.md +++ b/openapi-specs/cwpp/desc/audits/runtime_container_download_get.md @@ -6,7 +6,7 @@ Returns the container audit events data in CSV format when a runtime sensor such Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o \ diff --git a/openapi-specs/cwpp/desc/audits/runtime_container_get.md b/openapi-specs/cwpp/desc/audits/runtime_container_get.md index 11beffb24..a6b6ba484 100644 --- a/openapi-specs/cwpp/desc/audits/runtime_container_get.md +++ b/openapi-specs/cwpp/desc/audits/runtime_container_get.md @@ -7,7 +7,7 @@ Retrieves all container audit events when a runtime sensor such as process, netw Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/runtime_container_timeslice_get.md b/openapi-specs/cwpp/desc/audits/runtime_container_timeslice_get.md index f65d477af..01df48f28 100644 --- a/openapi-specs/cwpp/desc/audits/runtime_container_timeslice_get.md +++ b/openapi-specs/cwpp/desc/audits/runtime_container_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/runtime_file-integrity_download_get.md b/openapi-specs/cwpp/desc/audits/runtime_file-integrity_download_get.md index 99ec70c52..234c3ce32 100644 --- a/openapi-specs/cwpp/desc/audits/runtime_file-integrity_download_get.md +++ b/openapi-specs/cwpp/desc/audits/runtime_file-integrity_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for file-integrity checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/runtime_file-integrity_get.md b/openapi-specs/cwpp/desc/audits/runtime_file-integrity_get.md index 53fec9f9f..c31904422 100644 --- a/openapi-specs/cwpp/desc/audits/runtime_file-integrity_get.md +++ b/openapi-specs/cwpp/desc/audits/runtime_file-integrity_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for file-integrity checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/runtime_host_delete.md b/openapi-specs/cwpp/desc/audits/runtime_host_delete.md index 0ab1c877e..2ada9b15a 100644 --- a/openapi-specs/cwpp/desc/audits/runtime_host_delete.md +++ b/openapi-specs/cwpp/desc/audits/runtime_host_delete.md @@ -3,7 +3,7 @@ Deletes all host audits from the database. The following example curl command uses basic auth to delete all host audits: ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/audits/runtime/host diff --git a/openapi-specs/cwpp/desc/audits/runtime_host_download_get.md b/openapi-specs/cwpp/desc/audits/runtime_host_download_get.md index 4d0454f56..d85cc39d0 100644 --- a/openapi-specs/cwpp/desc/audits/runtime_host_download_get.md +++ b/openapi-specs/cwpp/desc/audits/runtime_host_download_get.md @@ -5,7 +5,7 @@ Returns the runtime host audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/runtime_host_get.md b/openapi-specs/cwpp/desc/audits/runtime_host_get.md index 044b8b42d..e063550d6 100644 --- a/openapi-specs/cwpp/desc/audits/runtime_host_get.md +++ b/openapi-specs/cwpp/desc/audits/runtime_host_get.md @@ -5,7 +5,7 @@ Retrieves the runtime host audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/runtime_host_timeslice_get.md b/openapi-specs/cwpp/desc/audits/runtime_host_timeslice_get.md index 8933efa74..aafd869b8 100644 --- a/openapi-specs/cwpp/desc/audits/runtime_host_timeslice_get.md +++ b/openapi-specs/cwpp/desc/audits/runtime_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/runtime_log-inspection_download_get.md b/openapi-specs/cwpp/desc/audits/runtime_log-inspection_download_get.md index f047ed96f..0aa1a5710 100644 --- a/openapi-specs/cwpp/desc/audits/runtime_log-inspection_download_get.md +++ b/openapi-specs/cwpp/desc/audits/runtime_log-inspection_download_get.md @@ -5,7 +5,7 @@ Returns the audit events data in CSV format for log inspection checks that are c Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/runtime_log-inspection_get.md b/openapi-specs/cwpp/desc/audits/runtime_log-inspection_get.md index 49f0d7be4..8292b623e 100644 --- a/openapi-specs/cwpp/desc/audits/runtime_log-inspection_get.md +++ b/openapi-specs/cwpp/desc/audits/runtime_log-inspection_get.md @@ -5,7 +5,7 @@ Retrieves all audit events for log inspection checks that are configured under h Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/runtime_rasp_delete.md b/openapi-specs/cwpp/desc/audits/runtime_rasp_delete.md index 688e04038..14315c55b 100644 --- a/openapi-specs/cwpp/desc/audits/runtime_rasp_delete.md +++ b/openapi-specs/cwpp/desc/audits/runtime_rasp_delete.md @@ -1,7 +1,7 @@ Deletes all RASP Defender runtime audits. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/cwpp/desc/audits/runtime_rasp_download_get.md b/openapi-specs/cwpp/desc/audits/runtime_rasp_download_get.md index 303c75858..11a85100d 100644 --- a/openapi-specs/cwpp/desc/audits/runtime_rasp_download_get.md +++ b/openapi-specs/cwpp/desc/audits/runtime_rasp_download_get.md @@ -1,7 +1,7 @@ Returns CSV data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/runtime_rasp_get.md b/openapi-specs/cwpp/desc/audits/runtime_rasp_get.md index 229d908b1..0475cb149 100644 --- a/openapi-specs/cwpp/desc/audits/runtime_rasp_get.md +++ b/openapi-specs/cwpp/desc/audits/runtime_rasp_get.md @@ -1,7 +1,7 @@ Returns JSON data describing all RASP Defender runtime events. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/runtime_serverless_delete.md b/openapi-specs/cwpp/desc/audits/runtime_serverless_delete.md index 99ada0515..e27ebe858 100644 --- a/openapi-specs/cwpp/desc/audits/runtime_serverless_delete.md +++ b/openapi-specs/cwpp/desc/audits/runtime_serverless_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to delete the current audits: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/cwpp/desc/audits/runtime_serverless_download_get.md b/openapi-specs/cwpp/desc/audits/runtime_serverless_download_get.md index f829d2342..91693c145 100644 --- a/openapi-specs/cwpp/desc/audits/runtime_serverless_download_get.md +++ b/openapi-specs/cwpp/desc/audits/runtime_serverless_download_get.md @@ -5,7 +5,7 @@ Returns the scan audit events data in CSV format for any configured serverless f Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/runtime_serverless_filters_get.md b/openapi-specs/cwpp/desc/audits/runtime_serverless_filters_get.md index b9bf38610..babda78dd 100644 --- a/openapi-specs/cwpp/desc/audits/runtime_serverless_filters_get.md +++ b/openapi-specs/cwpp/desc/audits/runtime_serverless_filters_get.md @@ -2,7 +2,7 @@ Returns all serverless filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/runtime_serverless_get.md b/openapi-specs/cwpp/desc/audits/runtime_serverless_get.md index 045946886..f6aeb748e 100644 --- a/openapi-specs/cwpp/desc/audits/runtime_serverless_get.md +++ b/openapi-specs/cwpp/desc/audits/runtime_serverless_get.md @@ -5,7 +5,7 @@ Retrieves all scan events for any configured serverless functions in Prisma Clou Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/runtime_serverless_timeslice_get.md b/openapi-specs/cwpp/desc/audits/runtime_serverless_timeslice_get.md index 863890174..a2456cec0 100644 --- a/openapi-specs/cwpp/desc/audits/runtime_serverless_timeslice_get.md +++ b/openapi-specs/cwpp/desc/audits/runtime_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/trust_delete.md b/openapi-specs/cwpp/desc/audits/trust_delete.md index 0bfb2bd81..4aaeef3fe 100644 --- a/openapi-specs/cwpp/desc/audits/trust_delete.md +++ b/openapi-specs/cwpp/desc/audits/trust_delete.md @@ -1,7 +1,7 @@ Deletes all the trust audits from the events page in Console. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/cwpp/desc/audits/trust_download_get.md b/openapi-specs/cwpp/desc/audits/trust_download_get.md index 21c0e55a2..234089449 100644 --- a/openapi-specs/cwpp/desc/audits/trust_download_get.md +++ b/openapi-specs/cwpp/desc/audits/trust_download_get.md @@ -5,7 +5,7 @@ Returns the trust audit events data in CSV format. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/trust_get.md b/openapi-specs/cwpp/desc/audits/trust_get.md index 8fb3a341d..de7d47e96 100644 --- a/openapi-specs/cwpp/desc/audits/trust_get.md +++ b/openapi-specs/cwpp/desc/audits/trust_get.md @@ -4,7 +4,7 @@ Retrieves all the trust audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/waas_agentless_download_get.md b/openapi-specs/cwpp/desc/audits/waas_agentless_download_get.md index bbfcd12f5..f930ef6b3 100644 --- a/openapi-specs/cwpp/desc/audits/waas_agentless_download_get.md +++ b/openapi-specs/cwpp/desc/audits/waas_agentless_download_get.md @@ -7,7 +7,7 @@ Returns the agentless Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/waas_agentless_get.md b/openapi-specs/cwpp/desc/audits/waas_agentless_get.md index ad40ae497..b257b0385 100644 --- a/openapi-specs/cwpp/desc/audits/waas_agentless_get.md +++ b/openapi-specs/cwpp/desc/audits/waas_agentless_get.md @@ -7,7 +7,7 @@ Retrieves all agentless Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all agentless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/waas_agentless_timeslice_get.md b/openapi-specs/cwpp/desc/audits/waas_agentless_timeslice_get.md index 007c6dba3..3eaf34b25 100644 --- a/openapi-specs/cwpp/desc/audits/waas_agentless_timeslice_get.md +++ b/openapi-specs/cwpp/desc/audits/waas_agentless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/waas_app_embedded_download_get.md b/openapi-specs/cwpp/desc/audits/waas_app_embedded_download_get.md index 149c10376..c94aa87b0 100644 --- a/openapi-specs/cwpp/desc/audits/waas_app_embedded_download_get.md +++ b/openapi-specs/cwpp/desc/audits/waas_app_embedded_download_get.md @@ -6,7 +6,7 @@ Returns the app-embedded WAAS audit events data in CSV format for the specified Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/waas_app_embedded_get.md b/openapi-specs/cwpp/desc/audits/waas_app_embedded_get.md index 400fa447d..6318fb299 100644 --- a/openapi-specs/cwpp/desc/audits/waas_app_embedded_get.md +++ b/openapi-specs/cwpp/desc/audits/waas_app_embedded_get.md @@ -6,7 +6,7 @@ Returns all app-embedded WAAS audit events for the specified query parameters. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/waas_app_embedded_timeslice_get.md b/openapi-specs/cwpp/desc/audits/waas_app_embedded_timeslice_get.md index 79a60038e..42a76d08c 100644 --- a/openapi-specs/cwpp/desc/audits/waas_app_embedded_timeslice_get.md +++ b/openapi-specs/cwpp/desc/audits/waas_app_embedded_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the app-embedded WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/waas_container_download_get.md b/openapi-specs/cwpp/desc/audits/waas_container_download_get.md index 9a5e04fad..7d26c34f4 100644 --- a/openapi-specs/cwpp/desc/audits/waas_container_download_get.md +++ b/openapi-specs/cwpp/desc/audits/waas_container_download_get.md @@ -6,7 +6,7 @@ Returns the container Web-Application and API Security (WAAS) audit events data Refer to the following example cURL command that downloads the WAAS container audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/waas_container_get.md b/openapi-specs/cwpp/desc/audits/waas_container_get.md index ac0df80fd..c1ad08f3c 100644 --- a/openapi-specs/cwpp/desc/audits/waas_container_get.md +++ b/openapi-specs/cwpp/desc/audits/waas_container_get.md @@ -6,7 +6,7 @@ Retrieves all container Web-Application and API Security (WAAS) audits. Refer to the following example cURL command that retrieves all container WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/waas_container_timeslice_get.md b/openapi-specs/cwpp/desc/audits/waas_container_timeslice_get.md index a56b4c48f..be56260d6 100644 --- a/openapi-specs/cwpp/desc/audits/waas_container_timeslice_get.md +++ b/openapi-specs/cwpp/desc/audits/waas_container_timeslice_get.md @@ -11,7 +11,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the container WAAS audit buckets of five between 15 Nov. 2022 (15h:23m:57s) and 16 Nov. 2022 (15h:23m:57s):: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/waas_host_download_get.md b/openapi-specs/cwpp/desc/audits/waas_host_download_get.md index 4bc66202b..71692e682 100644 --- a/openapi-specs/cwpp/desc/audits/waas_host_download_get.md +++ b/openapi-specs/cwpp/desc/audits/waas_host_download_get.md @@ -7,7 +7,7 @@ Returns the host Web-Application and API Security (WAAS) audit events data in CS Refer to the following example cURL command that downloads the host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/waas_host_get.md b/openapi-specs/cwpp/desc/audits/waas_host_get.md index 14c967594..f6e3df050 100644 --- a/openapi-specs/cwpp/desc/audits/waas_host_get.md +++ b/openapi-specs/cwpp/desc/audits/waas_host_get.md @@ -7,7 +7,7 @@ Retrieves all host Web-Application and API Security (WAAS) audit events. Refer to the following example cURL command that retrieves all host WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/waas_host_timeslice_get.md b/openapi-specs/cwpp/desc/audits/waas_host_timeslice_get.md index e28ed7b7a..67b3a54c3 100644 --- a/openapi-specs/cwpp/desc/audits/waas_host_timeslice_get.md +++ b/openapi-specs/cwpp/desc/audits/waas_host_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves host WAAS audit events for a specific time frame: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/waas_serverless_download_get.md b/openapi-specs/cwpp/desc/audits/waas_serverless_download_get.md index da05504df..0c0dbe698 100644 --- a/openapi-specs/cwpp/desc/audits/waas_serverless_download_get.md +++ b/openapi-specs/cwpp/desc/audits/waas_serverless_download_get.md @@ -7,7 +7,7 @@ Returns the serverless function Web-Application and API Security (WAAS) audit ev Refer to the following example cURL command that downloads the serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/waas_serverless_get.md b/openapi-specs/cwpp/desc/audits/waas_serverless_get.md index fe482a3f3..82488f7ee 100644 --- a/openapi-specs/cwpp/desc/audits/waas_serverless_get.md +++ b/openapi-specs/cwpp/desc/audits/waas_serverless_get.md @@ -7,7 +7,7 @@ Retrieves all serverless function Web-Application and API Security (WAAS) audit Refer to the following example cURL command that retrieves all serverless WAAS audit events: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/audits/waas_serverless_timeslice_get.md b/openapi-specs/cwpp/desc/audits/waas_serverless_timeslice_get.md index ec9ff3df1..a0a9a1368 100644 --- a/openapi-specs/cwpp/desc/audits/waas_serverless_timeslice_get.md +++ b/openapi-specs/cwpp/desc/audits/waas_serverless_timeslice_get.md @@ -12,7 +12,7 @@ Use the following mandatory query parameters to fetch results: Refer to the following example cURL command that retrieves the serverless WAAS audit events for a : ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/authenticate-client/post.md b/openapi-specs/cwpp/desc/authenticate-client/post.md index bc493d04e..ce6f00afe 100644 --- a/openapi-specs/cwpp/desc/authenticate-client/post.md +++ b/openapi-specs/cwpp/desc/authenticate-client/post.md @@ -8,7 +8,7 @@ This endpoint checks the supplied client certificate and authorizes the user bas Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X POST \ --cert \ https:///api/v/authenticate-client diff --git a/openapi-specs/cwpp/desc/authenticate/post.md b/openapi-specs/cwpp/desc/authenticate/post.md index cb018de64..4f85c5d34 100644 --- a/openapi-specs/cwpp/desc/authenticate/post.md +++ b/openapi-specs/cwpp/desc/authenticate/post.md @@ -9,7 +9,7 @@ You can set the validity period in Console under **Manage > Authentication > Log Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H "Content-Type: application/json" \ -X POST \ -d \ diff --git a/openapi-specs/cwpp/desc/authenticate/renew_get.md b/openapi-specs/cwpp/desc/authenticate/renew_get.md index 6040d58e1..3458b500a 100644 --- a/openapi-specs/cwpp/desc/authenticate/renew_get.md +++ b/openapi-specs/cwpp/desc/authenticate/renew_get.md @@ -5,7 +5,7 @@ Renews an old (unexpired) access token and returns a new token. The following cURL command retrieves a new access token using an old access token. ```bash -$ curl -k \ +$ curl \ -H "Authorization: Bearer " \ https:///api/v1/authenticate/renew ``` diff --git a/openapi-specs/cwpp/desc/certs/capem_get.md b/openapi-specs/cwpp/desc/certs/capem_get.md index f0f0f1bf3..945476c9b 100644 --- a/openapi-specs/cwpp/desc/certs/capem_get.md +++ b/openapi-specs/cwpp/desc/certs/capem_get.md @@ -5,7 +5,7 @@ Retrieves the Base64-encoded SSL root certificate self-signed by primary certifi Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/certs/client-certs_get.md b/openapi-specs/cwpp/desc/certs/client-certs_get.md index d099b3e3d..279d196b1 100644 --- a/openapi-specs/cwpp/desc/certs/client-certs_get.md +++ b/openapi-specs/cwpp/desc/certs/client-certs_get.md @@ -3,7 +3,7 @@ Downloads a script that installs a client certificate, client private key, and c The following example curl command uses basic auth to download and run the install script for your client certs: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/certs/client-certs.sh | sh diff --git a/openapi-specs/cwpp/desc/certs/server-certs_get.md b/openapi-specs/cwpp/desc/certs/server-certs_get.md index 0bb13f51d..118a4d9b0 100644 --- a/openapi-specs/cwpp/desc/certs/server-certs_get.md +++ b/openapi-specs/cwpp/desc/certs/server-certs_get.md @@ -12,7 +12,7 @@ Retrieves the server certificate bundle from Prisma Cloud Compute that contains Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -u \ -X GET \ diff --git a/openapi-specs/cwpp/desc/cloud/compliance_download_get.md b/openapi-specs/cwpp/desc/cloud/compliance_download_get.md index 7b1ec9fea..14f2725b1 100644 --- a/openapi-specs/cwpp/desc/cloud/compliance_download_get.md +++ b/openapi-specs/cwpp/desc/cloud/compliance_download_get.md @@ -2,7 +2,7 @@ Download all cloud scan data in CSV format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/cloud/compliance_get.md b/openapi-specs/cwpp/desc/cloud/compliance_get.md index 48c2fe5bb..ad47e0998 100644 --- a/openapi-specs/cwpp/desc/cloud/compliance_get.md +++ b/openapi-specs/cwpp/desc/cloud/compliance_get.md @@ -2,7 +2,7 @@ Returns a list of all cloud compliance scan results. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/cloud/compliance_scan_post.md b/openapi-specs/cwpp/desc/cloud/compliance_scan_post.md index 7f87bf1f4..7321c3b9d 100644 --- a/openapi-specs/cwpp/desc/cloud/compliance_scan_post.md +++ b/openapi-specs/cwpp/desc/cloud/compliance_scan_post.md @@ -2,7 +2,7 @@ Initiates a new cloud compliance scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/cloud/compliance_stop_post.md b/openapi-specs/cwpp/desc/cloud/compliance_stop_post.md index df0febb56..60c31dc51 100644 --- a/openapi-specs/cwpp/desc/cloud/compliance_stop_post.md +++ b/openapi-specs/cwpp/desc/cloud/compliance_stop_post.md @@ -2,7 +2,7 @@ Terminates a cloud compliance scan that's in progress.. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/cloud/discovery_download_get.md b/openapi-specs/cwpp/desc/cloud/discovery_download_get.md index 44d60a113..a667c8471 100644 --- a/openapi-specs/cwpp/desc/cloud/discovery_download_get.md +++ b/openapi-specs/cwpp/desc/cloud/discovery_download_get.md @@ -5,7 +5,7 @@ Downloads all cloud scan data in a CSV file. Refer to the following cURL example command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/cloud/discovery_entities_get.md b/openapi-specs/cwpp/desc/cloud/discovery_entities_get.md index a7abbdfb6..85f1be971 100644 --- a/openapi-specs/cwpp/desc/cloud/discovery_entities_get.md +++ b/openapi-specs/cwpp/desc/cloud/discovery_entities_get.md @@ -7,7 +7,7 @@ Use this API endpoint along with the `GET, api/vVERSION/cloud/discovery` to get Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/cloud/discovery_get.md b/openapi-specs/cwpp/desc/cloud/discovery_get.md index 28025f140..c2b4c6e3c 100644 --- a/openapi-specs/cwpp/desc/cloud/discovery_get.md +++ b/openapi-specs/cwpp/desc/cloud/discovery_get.md @@ -8,7 +8,7 @@ Refer to the following cURL example request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/cloud/discovery_scan_post.md b/openapi-specs/cwpp/desc/cloud/discovery_scan_post.md index 51799ebdb..0717096f8 100644 --- a/openapi-specs/cwpp/desc/cloud/discovery_scan_post.md +++ b/openapi-specs/cwpp/desc/cloud/discovery_scan_post.md @@ -5,7 +5,7 @@ Initiates a new cloud discovery scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/cloud/discovery_stop_post.md b/openapi-specs/cwpp/desc/cloud/discovery_stop_post.md index 6a6c7a5a5..73dbf46e7 100644 --- a/openapi-specs/cwpp/desc/cloud/discovery_stop_post.md +++ b/openapi-specs/cwpp/desc/cloud/discovery_stop_post.md @@ -5,7 +5,7 @@ Terminates a cloud discovery scan that's in progress. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/cloud/discovery_vms_get.md b/openapi-specs/cwpp/desc/cloud/discovery_vms_get.md index 6766f4e5a..2264a27fe 100644 --- a/openapi-specs/cwpp/desc/cloud/discovery_vms_get.md +++ b/openapi-specs/cwpp/desc/cloud/discovery_vms_get.md @@ -5,7 +5,7 @@ Returns the discovered cloud VM instances. Refer to the following example cURL command that retrieves all the discovered cloud VM instances: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/coderepos/download_get.md b/openapi-specs/cwpp/desc/coderepos/download_get.md index 4ec0197bb..b06dd9f17 100644 --- a/openapi-specs/cwpp/desc/coderepos/download_get.md +++ b/openapi-specs/cwpp/desc/coderepos/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Code re The following cURL command generates a CSV file containing the reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/coderepos/get.md b/openapi-specs/cwpp/desc/coderepos/get.md index 54c4e99bf..42dc16fb6 100644 --- a/openapi-specs/cwpp/desc/coderepos/get.md +++ b/openapi-specs/cwpp/desc/coderepos/get.md @@ -10,7 +10,7 @@ This endpoint maps to the **Code repositories** table in **Monitor > Vulnerabili The following cURL command retrieves all code repository scan reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/collections/get.md b/openapi-specs/cwpp/desc/collections/get.md index 99120d17d..5a9e8a50c 100755 --- a/openapi-specs/cwpp/desc/collections/get.md +++ b/openapi-specs/cwpp/desc/collections/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table in **Manage > Collections and Tags > Collections Refer to the following example cURL command that returns a list of collections: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/collections/name_delete.md b/openapi-specs/cwpp/desc/collections/name_delete.md index 3e2debd01..033358000 100755 --- a/openapi-specs/cwpp/desc/collections/name_delete.md +++ b/openapi-specs/cwpp/desc/collections/name_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that deletes a collection with the name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/cwpp/desc/collections/name_usages_get.md b/openapi-specs/cwpp/desc/collections/name_usages_get.md index 5c9c40424..89e383cce 100755 --- a/openapi-specs/cwpp/desc/collections/name_usages_get.md +++ b/openapi-specs/cwpp/desc/collections/name_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that retrieves all policies with name `my-collection`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/containers/count_get.md b/openapi-specs/cwpp/desc/containers/count_get.md index 4c6ecdcb4..aca59a913 100644 --- a/openapi-specs/cwpp/desc/containers/count_get.md +++ b/openapi-specs/cwpp/desc/containers/count_get.md @@ -5,7 +5,7 @@ Returns an integer representing the number of containers in your environment. Refer to the following example cURL command that returns the number of containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/containers/download_get.md b/openapi-specs/cwpp/desc/containers/download_get.md index 5c0811d7c..5ed3fec35 100644 --- a/openapi-specs/cwpp/desc/containers/download_get.md +++ b/openapi-specs/cwpp/desc/containers/download_get.md @@ -9,7 +9,7 @@ You can download the container scan reports in CSV format in Console under **Mon Refer to the following example cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/containers/filters_get.md b/openapi-specs/cwpp/desc/containers/filters_get.md index c8a1dfca4..6c2777819 100644 --- a/openapi-specs/cwpp/desc/containers/filters_get.md +++ b/openapi-specs/cwpp/desc/containers/filters_get.md @@ -1,7 +1,7 @@ Returns all container filters in JSON format. These filters can be used in the base `GET` request as query parameters. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/containers/get.md b/openapi-specs/cwpp/desc/containers/get.md index 4cacdde60..3de9dd4af 100644 --- a/openapi-specs/cwpp/desc/containers/get.md +++ b/openapi-specs/cwpp/desc/containers/get.md @@ -16,7 +16,7 @@ Refer to the following available options for the `fields` query parameters: Refer to the following example cURL command that retrieves a scan report for all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -26,7 +26,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a scan report for a container with the collection ``: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/containers/labels_get.md b/openapi-specs/cwpp/desc/containers/labels_get.md index eb40a748d..7a63ab6fb 100644 --- a/openapi-specs/cwpp/desc/containers/labels_get.md +++ b/openapi-specs/cwpp/desc/containers/labels_get.md @@ -1,7 +1,7 @@ Returns an array of strings containing all of the labels. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/containers/names_get.md b/openapi-specs/cwpp/desc/containers/names_get.md index 8b32465d5..9025e2e10 100644 --- a/openapi-specs/cwpp/desc/containers/names_get.md +++ b/openapi-specs/cwpp/desc/containers/names_get.md @@ -5,7 +5,7 @@ Returns an array of strings containing all container names. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/containers/scan_post.md b/openapi-specs/cwpp/desc/containers/scan_post.md index 6b2bdaaba..56137cf64 100644 --- a/openapi-specs/cwpp/desc/containers/scan_post.md +++ b/openapi-specs/cwpp/desc/containers/scan_post.md @@ -4,7 +4,7 @@ This endpoint returns the time that the scans were initiated. The following example command uses curl and basic auth to force Prisma Cloud Compute to re-scan all containers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/credentials/get.md b/openapi-specs/cwpp/desc/credentials/get.md index ee4309dee..b807ce8f3 100644 --- a/openapi-specs/cwpp/desc/credentials/get.md +++ b/openapi-specs/cwpp/desc/credentials/get.md @@ -6,7 +6,7 @@ This endpoint maps to **Manage > Authentication > Credentials store** in the Con Refer to the following example cURL command that retrieves all credentials: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/credentials/id_delete.md b/openapi-specs/cwpp/desc/credentials/id_delete.md index e5c70259e..27f090158 100644 --- a/openapi-specs/cwpp/desc/credentials/id_delete.md +++ b/openapi-specs/cwpp/desc/credentials/id_delete.md @@ -14,7 +14,7 @@ To invoke this endpoint in the Prisma Cloud Compute user interface: Refer to the following example cURL command that deletes an existing credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/cwpp/desc/credentials/id_usages_get.md b/openapi-specs/cwpp/desc/credentials/id_usages_get.md index 76c1099aa..ca2ce6216 100644 --- a/openapi-specs/cwpp/desc/credentials/id_usages_get.md +++ b/openapi-specs/cwpp/desc/credentials/id_usages_get.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following cURL command that retrieves all usages for a credential: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/curl_examples.md b/openapi-specs/cwpp/desc/curl_examples.md index 3d4fcd468..745d21db3 100644 --- a/openapi-specs/cwpp/desc/curl_examples.md +++ b/openapi-specs/cwpp/desc/curl_examples.md @@ -6,7 +6,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -17,7 +17,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -29,7 +29,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/cwpp/desc/custom-compliance/get.md b/openapi-specs/cwpp/desc/custom-compliance/get.md index 9022a87b7..9dddcff4e 100644 --- a/openapi-specs/cwpp/desc/custom-compliance/get.md +++ b/openapi-specs/cwpp/desc/custom-compliance/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example curl command that gets the list of custom compliance checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/custom-compliance/id_delete.md b/openapi-specs/cwpp/desc/custom-compliance/id_delete.md index 72c7183ee..f6536e51d 100644 --- a/openapi-specs/cwpp/desc/custom-compliance/id_delete.md +++ b/openapi-specs/cwpp/desc/custom-compliance/id_delete.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > Compliance > Custom** in the Console UI. Refer to the following example cURL command that uses basic auth to delete the compliance check with id 9000: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/cwpp/desc/custom-compliance/put.md b/openapi-specs/cwpp/desc/custom-compliance/put.md index 480e41b54..b8760a11f 100644 --- a/openapi-specs/cwpp/desc/custom-compliance/put.md +++ b/openapi-specs/cwpp/desc/custom-compliance/put.md @@ -21,7 +21,7 @@ Create `custom_check.json` file (example): Refer to the following example curl command that uses basic auth to update the checks: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/cwpp/desc/custom-rules/get.md b/openapi-specs/cwpp/desc/custom-rules/get.md index f0385f81a..f77924be8 100644 --- a/openapi-specs/cwpp/desc/custom-rules/get.md +++ b/openapi-specs/cwpp/desc/custom-rules/get.md @@ -7,7 +7,7 @@ This endpoint maps to the policy table in **Defend > Custom rules** in the Conso Refer to the following example cURL command that retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/custom-rules/id_delete.md b/openapi-specs/cwpp/desc/custom-rules/id_delete.md index c0d6dc8b0..01412abf3 100644 --- a/openapi-specs/cwpp/desc/custom-rules/id_delete.md +++ b/openapi-specs/cwpp/desc/custom-rules/id_delete.md @@ -5,7 +5,7 @@ Deletes a custom rule. Refer to the following example cURL command that deletes a custom rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/cwpp/desc/cves/distribution_get.md b/openapi-specs/cwpp/desc/cves/distribution_get.md index aecddce23..7365e1a5e 100644 --- a/openapi-specs/cwpp/desc/cves/distribution_get.md +++ b/openapi-specs/cwpp/desc/cves/distribution_get.md @@ -3,7 +3,7 @@ Retrieves CVEs from the vulnerability database grouped into distribution where y The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/cves/get.md b/openapi-specs/cwpp/desc/cves/get.md index 469ea4b28..f81223298 100644 --- a/openapi-specs/cwpp/desc/cves/get.md +++ b/openapi-specs/cwpp/desc/cves/get.md @@ -6,7 +6,7 @@ A null response indicates that the CVE is not in our database. The following example curl command queries the Prisma Cloud Compute database for `CVE-2018-1102`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/defenders/app_embedded_post.md b/openapi-specs/cwpp/desc/defenders/app_embedded_post.md index 9167469d0..7999cbadb 100644 --- a/openapi-specs/cwpp/desc/defenders/app_embedded_post.md +++ b/openapi-specs/cwpp/desc/defenders/app_embedded_post.md @@ -5,7 +5,7 @@ Creates an augmented Dockerfile with Defender and dependencies included as a ZIP Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/defenders/daemonset_yaml_get.md b/openapi-specs/cwpp/desc/defenders/daemonset_yaml_get.md index 678901a8a..b68869081 100644 --- a/openapi-specs/cwpp/desc/defenders/daemonset_yaml_get.md +++ b/openapi-specs/cwpp/desc/defenders/daemonset_yaml_get.md @@ -10,7 +10,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https://:8083/api/v1/defenders/daemonset.yaml?consoleaddr=&listener=none&namespace=twistlock&orchestration=kubernetes' diff --git a/openapi-specs/cwpp/desc/defenders/daemonset_yaml_post.md b/openapi-specs/cwpp/desc/defenders/daemonset_yaml_post.md index 268e3ba81..af006122b 100644 --- a/openapi-specs/cwpp/desc/defenders/daemonset_yaml_post.md +++ b/openapi-specs/cwpp/desc/defenders/daemonset_yaml_post.md @@ -5,7 +5,7 @@ Creates a DaemonSet deployment file in YAML format that you can use to deploy De Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/defenders/download_get.md b/openapi-specs/cwpp/desc/defenders/download_get.md index 2d9435506..67f08c0e5 100644 --- a/openapi-specs/cwpp/desc/defenders/download_get.md +++ b/openapi-specs/cwpp/desc/defenders/download_get.md @@ -8,7 +8,7 @@ Use the query parameters to filter what data is returned. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o \ diff --git a/openapi-specs/cwpp/desc/defenders/fargate_json_post.md b/openapi-specs/cwpp/desc/defenders/fargate_json_post.md index 5128e90a1..e2e4e85ab 100644 --- a/openapi-specs/cwpp/desc/defenders/fargate_json_post.md +++ b/openapi-specs/cwpp/desc/defenders/fargate_json_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command: Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -23,7 +23,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.json` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/defenders/fargate_yaml_post.md b/openapi-specs/cwpp/desc/defenders/fargate_yaml_post.md index 9a8306a1b..95560526a 100644 --- a/openapi-specs/cwpp/desc/defenders/fargate_yaml_post.md +++ b/openapi-specs/cwpp/desc/defenders/fargate_yaml_post.md @@ -8,7 +8,7 @@ Refer to the following example cURL command that accepts the task definition in Unprotected task definition in `unprotected.yaml` ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/yaml' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/defenders/get.md b/openapi-specs/cwpp/desc/defenders/get.md index 471e7ef9d..8d2f5cd4c 100644 --- a/openapi-specs/cwpp/desc/defenders/get.md +++ b/openapi-specs/cwpp/desc/defenders/get.md @@ -7,7 +7,7 @@ This endpoint maps to the UI Console page in **Manage > Defenders > Defenders**. Refer to the following example cURL command that retrieves all deployed Defenders. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/defenders/helm_get.md b/openapi-specs/cwpp/desc/defenders/helm_get.md index b11f9c4b9..487c8b7e8 100644 --- a/openapi-specs/cwpp/desc/defenders/helm_get.md +++ b/openapi-specs/cwpp/desc/defenders/helm_get.md @@ -13,7 +13,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o twistlock-defender-helm.tar.gz \ diff --git a/openapi-specs/cwpp/desc/defenders/helm_post.md b/openapi-specs/cwpp/desc/defenders/helm_post.md index 2046e63eb..fb76807ae 100644 --- a/openapi-specs/cwpp/desc/defenders/helm_post.md +++ b/openapi-specs/cwpp/desc/defenders/helm_post.md @@ -5,7 +5,7 @@ Creates a Helm deployment file that you can use to deploy Defenders to your clus Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/defenders/id_delete.md b/openapi-specs/cwpp/desc/defenders/id_delete.md index f637ef850..e3ac52daf 100644 --- a/openapi-specs/cwpp/desc/defenders/id_delete.md +++ b/openapi-specs/cwpp/desc/defenders/id_delete.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes an existing Defender on a host. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/cwpp/desc/defenders/id_features_post.md b/openapi-specs/cwpp/desc/defenders/id_features_post.md index ec8e4c5f3..9b42f5fa0 100644 --- a/openapi-specs/cwpp/desc/defenders/id_features_post.md +++ b/openapi-specs/cwpp/desc/defenders/id_features_post.md @@ -3,7 +3,7 @@ Updates a deployed Defender's configuration. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/defenders/id_restart_post.md b/openapi-specs/cwpp/desc/defenders/id_restart_post.md index da0cc7811..7296a186b 100644 --- a/openapi-specs/cwpp/desc/defenders/id_restart_post.md +++ b/openapi-specs/cwpp/desc/defenders/id_restart_post.md @@ -3,7 +3,7 @@ Restarts Defender on a given host. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/defenders/id_upgrade_post.md b/openapi-specs/cwpp/desc/defenders/id_upgrade_post.md index f0d30d1e9..3e63c6414 100644 --- a/openapi-specs/cwpp/desc/defenders/id_upgrade_post.md +++ b/openapi-specs/cwpp/desc/defenders/id_upgrade_post.md @@ -7,7 +7,7 @@ Upgrades Defender on ``. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/defenders/image-name_get.md b/openapi-specs/cwpp/desc/defenders/image-name_get.md index e81ba3e19..19f360c07 100644 --- a/openapi-specs/cwpp/desc/defenders/image-name_get.md +++ b/openapi-specs/cwpp/desc/defenders/image-name_get.md @@ -5,7 +5,7 @@ Returns the full Docker image name for Defender. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/defenders/install-bundle_get.md b/openapi-specs/cwpp/desc/defenders/install-bundle_get.md index 882d0cd53..9b09e733f 100644 --- a/openapi-specs/cwpp/desc/defenders/install-bundle_get.md +++ b/openapi-specs/cwpp/desc/defenders/install-bundle_get.md @@ -5,7 +5,7 @@ Returns the certificate bundle that Defender needs to securely connect to Consol Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/defenders/names_get.md b/openapi-specs/cwpp/desc/defenders/names_get.md index 728eb6364..6339c1483 100644 --- a/openapi-specs/cwpp/desc/defenders/names_get.md +++ b/openapi-specs/cwpp/desc/defenders/names_get.md @@ -5,7 +5,7 @@ Retrieves a list of Defender hostnames that can be used as the `{id}` query para Refer to the following example cURL command that retrieves a list of all Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -15,7 +15,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of connected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -25,7 +25,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a list of disconnected Defenders using a query parameter and a specified boolean value in lower case: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -37,7 +37,7 @@ The endpoint enlists all the connected and disconnected Defenders if do not spec Refer to the following example cURL command that retrieves a list of Defenders by type: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/defenders/rasp_post.md b/openapi-specs/cwpp/desc/defenders/rasp_post.md index 526a9e112..e110044dd 100644 --- a/openapi-specs/cwpp/desc/defenders/rasp_post.md +++ b/openapi-specs/cwpp/desc/defenders/rasp_post.md @@ -7,7 +7,7 @@ It can be a DNS name or IP address. `` is a single list item from the `/api/v1/defenders/names` endpoint. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ -o rasp-defender.zip diff --git a/openapi-specs/cwpp/desc/defenders/serverless-bundle_post.md b/openapi-specs/cwpp/desc/defenders/serverless-bundle_post.md index df4f13e6a..7533e436b 100644 --- a/openapi-specs/cwpp/desc/defenders/serverless-bundle_post.md +++ b/openapi-specs/cwpp/desc/defenders/serverless-bundle_post.md @@ -5,7 +5,7 @@ Downloads a ZIP file with serverless Defender bundle. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/octet-stream' \ -o serverless_bundle.zip \ diff --git a/openapi-specs/cwpp/desc/defenders/summary_get.md b/openapi-specs/cwpp/desc/defenders/summary_get.md index 08be4ebc4..e308ef64b 100644 --- a/openapi-specs/cwpp/desc/defenders/summary_get.md +++ b/openapi-specs/cwpp/desc/defenders/summary_get.md @@ -6,7 +6,7 @@ Lists the number of Defenders in each defender category. Refer to the following example cURL command that retrieves a summary of Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/defenders/upgrade_post.md b/openapi-specs/cwpp/desc/defenders/upgrade_post.md index 2f0b4d39e..eacd6b779 100644 --- a/openapi-specs/cwpp/desc/defenders/upgrade_post.md +++ b/openapi-specs/cwpp/desc/defenders/upgrade_post.md @@ -9,7 +9,7 @@ To upgrade Serverless and Fargate Defenders, re-embed them. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/deployment/daemonsets_deploy_post.md b/openapi-specs/cwpp/desc/deployment/daemonsets_deploy_post.md index 94ec9386b..b60f28346 100644 --- a/openapi-specs/cwpp/desc/deployment/daemonsets_deploy_post.md +++ b/openapi-specs/cwpp/desc/deployment/daemonsets_deploy_post.md @@ -5,7 +5,7 @@ It identifies the cluster's API server, user, and credentials. Use the various request parameters to control the properties of the deployed DaemonSet. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/deployment/daemonsets_get.md b/openapi-specs/cwpp/desc/deployment/daemonsets_get.md index a0b7f3798..0385acf75 100644 --- a/openapi-specs/cwpp/desc/deployment/daemonsets_get.md +++ b/openapi-specs/cwpp/desc/deployment/daemonsets_get.md @@ -3,7 +3,7 @@ You must specify a `credentialID`, of type `kubeconfig`, which identifies your c Credentials are managed in Console's credentials store (`/api/v1/credentials`). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/feeds/custom-vulnerabilities_get.md b/openapi-specs/cwpp/desc/feeds/custom-vulnerabilities_get.md index 71834f19d..d661acf55 100644 --- a/openapi-specs/cwpp/desc/feeds/custom-vulnerabilities_get.md +++ b/openapi-specs/cwpp/desc/feeds/custom-vulnerabilities_get.md @@ -11,7 +11,7 @@ Vulnerability rules can be created using the Prisma Cloud Compute. Refer to the following cURL command that retrieves a list of all the custom vulnerabilities and associated rules. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/feeds/custom-vulnerabilities_put.md b/openapi-specs/cwpp/desc/feeds/custom-vulnerabilities_put.md index 4fe1c1898..149ada978 100644 --- a/openapi-specs/cwpp/desc/feeds/custom-vulnerabilities_put.md +++ b/openapi-specs/cwpp/desc/feeds/custom-vulnerabilities_put.md @@ -5,7 +5,7 @@ Updates all the custom vulnerabilities and associated rules simultaneously for h Refer to the following cURL command that updates a vulnerability for a library named `internal-lib`, and specifies that its versions `1.1` to `1.8` are known to be vulnerable. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -37,7 +37,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: **Note:** You will need `jq` to execute this command. ``` - $ curl -k \ + $ curl \ -u \ https:///api/v/feeds/custom/custom-vulnerabilities \ | jq '.' > custom_vulnerability_rules.json @@ -66,7 +66,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 3. Update the rules by pushing the new JSON payload. **Note:** Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -77,7 +77,7 @@ We suggest you maintain your custom vulnerabilities using the following steps: 4. Run the cURL command for the `GET /api/vVERSION/feeds/custom/custom-vulnerabilities` endpoint and you can see that the previously installed rules are now overwritten with your new rules. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/feeds/custom_vulnerabilities_digest_get.md b/openapi-specs/cwpp/desc/feeds/custom_vulnerabilities_digest_get.md index 0eb501d9b..02af9a3ab 100644 --- a/openapi-specs/cwpp/desc/feeds/custom_vulnerabilities_digest_get.md +++ b/openapi-specs/cwpp/desc/feeds/custom_vulnerabilities_digest_get.md @@ -5,7 +5,7 @@ Returns the unique digest for the custom vulnerabilities and associated rules fo The following cURL command retrieves the digest for the configured custom vulnerabilities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/feeds/cve_allow_list_digest_get.md b/openapi-specs/cwpp/desc/feeds/cve_allow_list_digest_get.md index e27f21251..911a07fd9 100644 --- a/openapi-specs/cwpp/desc/feeds/cve_allow_list_digest_get.md +++ b/openapi-specs/cwpp/desc/feeds/cve_allow_list_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the Common Vulnerabilities and Exposures (CVE) a The following cURL command retrieves the digest for the configured CVE allow list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/feeds/cve_allow_list_get.md b/openapi-specs/cwpp/desc/feeds/cve_allow_list_get.md index 34fb2c7f8..d73ce17c2 100644 --- a/openapi-specs/cwpp/desc/feeds/cve_allow_list_get.md +++ b/openapi-specs/cwpp/desc/feeds/cve_allow_list_get.md @@ -5,7 +5,7 @@ Retrieves the globally allow-listed Common Vulnerabilities and Exposures (CVE). The following cURL command retrieves the globally allow-listed CVEs. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/feeds/cve_allow_list_put.md b/openapi-specs/cwpp/desc/feeds/cve_allow_list_put.md index 850016965..c4e2ce0af 100644 --- a/openapi-specs/cwpp/desc/feeds/cve_allow_list_put.md +++ b/openapi-specs/cwpp/desc/feeds/cve_allow_list_put.md @@ -7,7 +7,7 @@ Globally allow-lists a set of Common Vulnerabilities and Exposures (CVE). The following cURL command installs a global CVE allow-list. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/cwpp/desc/feeds/ips_digest_get.md b/openapi-specs/cwpp/desc/feeds/ips_digest_get.md index d059271ea..ae2a09915 100644 --- a/openapi-specs/cwpp/desc/feeds/ips_digest_get.md +++ b/openapi-specs/cwpp/desc/feeds/ips_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for the list of suspicious or high risk IP endpoints The following cURL command retrieves the digest for the banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/feeds/ips_get.md b/openapi-specs/cwpp/desc/feeds/ips_get.md index 381257d47..f51c577a7 100644 --- a/openapi-specs/cwpp/desc/feeds/ips_get.md +++ b/openapi-specs/cwpp/desc/feeds/ips_get.md @@ -5,7 +5,7 @@ Retrieves the customized list of block-listed suspicious or high-risk IP address The following cURL command retrieves the list of globally block-listed suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/feeds/ips_put.md b/openapi-specs/cwpp/desc/feeds/ips_put.md index 6f8fc2419..5bf791044 100644 --- a/openapi-specs/cwpp/desc/feeds/ips_put.md +++ b/openapi-specs/cwpp/desc/feeds/ips_put.md @@ -7,7 +7,7 @@ Bans a custom list of suspicious or high-risk IP addresses. The following cURL command installs a custom list of banned suspicious or high-risk IP addresses. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/cwpp/desc/feeds/malware_digest_get.md b/openapi-specs/cwpp/desc/feeds/malware_digest_get.md index 005c476a2..522a59aef 100644 --- a/openapi-specs/cwpp/desc/feeds/malware_digest_get.md +++ b/openapi-specs/cwpp/desc/feeds/malware_digest_get.md @@ -5,7 +5,7 @@ Retrieves the digest string for all the MD5 signatures of malicious executables The following cURL command retrieves the digest for the configured list for the MD5 signatures of malicious executables. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/feeds/malware_get.md b/openapi-specs/cwpp/desc/feeds/malware_get.md index 2a7aa128b..72bee6594 100644 --- a/openapi-specs/cwpp/desc/feeds/malware_get.md +++ b/openapi-specs/cwpp/desc/feeds/malware_get.md @@ -5,7 +5,7 @@ Returns the customized list of MD5 signatures of malicious executables. Refer to the following cURL command that retrieves the list of MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/feeds/malware_put.md b/openapi-specs/cwpp/desc/feeds/malware_put.md index 7e6ec5da0..176304cb9 100644 --- a/openapi-specs/cwpp/desc/feeds/malware_put.md +++ b/openapi-specs/cwpp/desc/feeds/malware_put.md @@ -7,7 +7,7 @@ Creates a custom list of malware MD5 signatures of malicious executables. Refer to the following cURL command that installs a custom list of malware MD5 signatures of malicious executables: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/cwpp/desc/feeds/refresh_post.md b/openapi-specs/cwpp/desc/feeds/refresh_post.md index a83c40d10..1c756edae 100644 --- a/openapi-specs/cwpp/desc/feeds/refresh_post.md +++ b/openapi-specs/cwpp/desc/feeds/refresh_post.md @@ -1,7 +1,7 @@ Triggers Console to refresh its data from the **Intelligence Stream** ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/forensic/activities_download_get.md b/openapi-specs/cwpp/desc/forensic/activities_download_get.md index 8a2dbd926..1918e3790 100644 --- a/openapi-specs/cwpp/desc/forensic/activities_download_get.md +++ b/openapi-specs/cwpp/desc/forensic/activities_download_get.md @@ -3,7 +3,7 @@ Downloads all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/forensic/activities_get.md b/openapi-specs/cwpp/desc/forensic/activities_get.md index c8fb1d0cd..c0761aa60 100644 --- a/openapi-specs/cwpp/desc/forensic/activities_get.md +++ b/openapi-specs/cwpp/desc/forensic/activities_get.md @@ -3,7 +3,7 @@ Retrieves all host activities that can be found on *Monitor > Events > Host Acti Use the query parameters to filter what data is returned. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/groups/get.md b/openapi-specs/cwpp/desc/groups/get.md index 6a0daa2eb..34a2711e0 100644 --- a/openapi-specs/cwpp/desc/groups/get.md +++ b/openapi-specs/cwpp/desc/groups/get.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups. ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/cwpp/desc/groups/id_delete.md b/openapi-specs/cwpp/desc/groups/id_delete.md index 5962a1135..0c3cfa1cd 100644 --- a/openapi-specs/cwpp/desc/groups/id_delete.md +++ b/openapi-specs/cwpp/desc/groups/id_delete.md @@ -13,7 +13,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes a collection with the name `{id}`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/cwpp/desc/groups/names.md b/openapi-specs/cwpp/desc/groups/names.md index 80f34f536..9c2dd1089 100644 --- a/openapi-specs/cwpp/desc/groups/names.md +++ b/openapi-specs/cwpp/desc/groups/names.md @@ -7,7 +7,7 @@ This endpoint maps to the table data on the **Manage > Authentication > Groups** Refer to the following example cURL command that retrieves all the system groups: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/cwpp/desc/groups/post.md b/openapi-specs/cwpp/desc/groups/post.md index d0fc23a6d..ebad011f4 100644 --- a/openapi-specs/cwpp/desc/groups/post.md +++ b/openapi-specs/cwpp/desc/groups/post.md @@ -12,7 +12,7 @@ To invoke this endpoint in the Console UI: Refer to the following example cURL command that creates a new group named `my-group`: ```bash -$ curl -k \ +$ curl \ -X POST \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/cwpp/desc/high-availability/get.md b/openapi-specs/cwpp/desc/high-availability/get.md index a988d47ef..83d5d9b46 100644 --- a/openapi-specs/cwpp/desc/high-availability/get.md +++ b/openapi-specs/cwpp/desc/high-availability/get.md @@ -3,7 +3,7 @@ Returns the status of high high availability. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/cwpp/desc/hosts/download_get.md b/openapi-specs/cwpp/desc/hosts/download_get.md index ab691fb49..34e546573 100644 --- a/openapi-specs/cwpp/desc/hosts/download_get.md +++ b/openapi-specs/cwpp/desc/hosts/download_get.md @@ -9,7 +9,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Hosts > Refer to the following example cURL command that downloads all host scan reports to a CSV file called `hosts_report.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: text/csv' \ -X GET -o hosts_report.csv \ diff --git a/openapi-specs/cwpp/desc/hosts/filters_get.md b/openapi-specs/cwpp/desc/hosts/filters_get.md index 4bf6df5e6..a39ec8a97 100644 --- a/openapi-specs/cwpp/desc/hosts/filters_get.md +++ b/openapi-specs/cwpp/desc/hosts/filters_get.md @@ -3,7 +3,7 @@ Returns host filters such as distribution and host name. A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/hosts/get.md b/openapi-specs/cwpp/desc/hosts/get.md index 43020558a..9bdf69c6c 100644 --- a/openapi-specs/cwpp/desc/hosts/get.md +++ b/openapi-specs/cwpp/desc/hosts/get.md @@ -37,7 +37,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following cURL command that retrieves all host scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/hosts/info_get.md b/openapi-specs/cwpp/desc/hosts/info_get.md index 5b3903b7e..523024735 100644 --- a/openapi-specs/cwpp/desc/hosts/info_get.md +++ b/openapi-specs/cwpp/desc/hosts/info_get.md @@ -5,7 +5,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/hosts/scan_post.md b/openapi-specs/cwpp/desc/hosts/scan_post.md index 6b72cbfa3..0e0e7b074 100644 --- a/openapi-specs/cwpp/desc/hosts/scan_post.md +++ b/openapi-specs/cwpp/desc/hosts/scan_post.md @@ -3,7 +3,7 @@ Re-scan all hosts immediately. Refer to the following example command that forces Prisma Cloud Compute to re-scan all hosts: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/hosts/scan diff --git a/openapi-specs/cwpp/desc/images/defender_layer_get.md b/openapi-specs/cwpp/desc/images/defender_layer_get.md index 1dfe3633d..4bb88d62c 100644 --- a/openapi-specs/cwpp/desc/images/defender_layer_get.md +++ b/openapi-specs/cwpp/desc/images/defender_layer_get.md @@ -5,7 +5,7 @@ Returns the the Prisma Cloud Compute Defender in as a layer that can be used in Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/cwpp/desc/images/defender_rasp_get.md b/openapi-specs/cwpp/desc/images/defender_rasp_get.md index a8e145ff7..260e271a1 100644 --- a/openapi-specs/cwpp/desc/images/defender_rasp_get.md +++ b/openapi-specs/cwpp/desc/images/defender_rasp_get.md @@ -3,7 +3,7 @@ Returns the the Prisma Cloud Compute Defender as the RASP Defender A curl command to access this endpoint may resemble the following code snippet: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H "Content-Type: application/octet-stream" \ diff --git a/openapi-specs/cwpp/desc/images/download_get.md b/openapi-specs/cwpp/desc/images/download_get.md index c7b987aeb..9b8011af9 100644 --- a/openapi-specs/cwpp/desc/images/download_get.md +++ b/openapi-specs/cwpp/desc/images/download_get.md @@ -16,7 +16,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -27,7 +27,7 @@ $ curl -k \ Refer to the following example cURL command that might be useful for developers: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/images/get.md b/openapi-specs/cwpp/desc/images/get.md index 3f594c6c8..dcef1b0a4 100644 --- a/openapi-specs/cwpp/desc/images/get.md +++ b/openapi-specs/cwpp/desc/images/get.md @@ -26,7 +26,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following cURL command that retrieves a compact scan report for all images: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -36,7 +36,7 @@ $ curl -k \ Refer to the following cURL command that retrieves a compact scan report for an Ubuntu image: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -47,7 +47,7 @@ The name query is synonymous with the filter images text field in the Console UI Refer to the following cURL command that retrieves the scan report for an image with the matching SHA-256 hash: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/images/names_get.md b/openapi-specs/cwpp/desc/images/names_get.md index 3a234df98..311b33574 100644 --- a/openapi-specs/cwpp/desc/images/names_get.md +++ b/openapi-specs/cwpp/desc/images/names_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/cwpp/desc/images/scan_post.md b/openapi-specs/cwpp/desc/images/scan_post.md index 8d802727a..36278249b 100644 --- a/openapi-specs/cwpp/desc/images/scan_post.md +++ b/openapi-specs/cwpp/desc/images/scan_post.md @@ -5,7 +5,7 @@ Re-scan all images immediately. This endpoint returns the time that the scans we Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all images: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/images/scan diff --git a/openapi-specs/cwpp/desc/images/twistlock_defender_tar_gz_get.md b/openapi-specs/cwpp/desc/images/twistlock_defender_tar_gz_get.md index 7852e12ba..36fb66ae8 100644 --- a/openapi-specs/cwpp/desc/images/twistlock_defender_tar_gz_get.md +++ b/openapi-specs/cwpp/desc/images/twistlock_defender_tar_gz_get.md @@ -1,7 +1,7 @@ Download the Container Defender image for Linux platforms. ```bash -$ curl -k \ +$ curl \ -u \ -H "Content-Type: application/octet-stream" \ -o twistlock_defender.tar.gz \ diff --git a/openapi-specs/cwpp/desc/intro.md b/openapi-specs/cwpp/desc/intro.md index 9038a3734..5b4ed5864 100644 --- a/openapi-specs/cwpp/desc/intro.md +++ b/openapi-specs/cwpp/desc/intro.md @@ -47,7 +47,7 @@ The cURL can be modified to use any of the following: For example, replace `` with the token from the `/api/v1/authenticate` endpoint. ```bash -$ curl -k \ +$ curl \ -H 'Authorization: Bearer ' \ -X POST \ https:///api/v1/ @@ -58,7 +58,7 @@ https:///api/v1/ For example, replace `` with the username string and `` with the password string. ```bash -$ curl -k \ +$ curl \ -u \ -p \ -X POST \ @@ -70,7 +70,7 @@ https:///api/v1/ For example, replace `` with the username string. ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v1/ diff --git a/openapi-specs/cwpp/desc/kubernetes/scan_post.md b/openapi-specs/cwpp/desc/kubernetes/scan_post.md index 15d614c1a..ab74d5d96 100644 --- a/openapi-specs/cwpp/desc/kubernetes/scan_post.md +++ b/openapi-specs/cwpp/desc/kubernetes/scan_post.md @@ -3,7 +3,7 @@ This endpoint will trigger a Kubernetes scan. The following example curl command uses basic auth to initiate this scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/logs/console_get.md b/openapi-specs/cwpp/desc/logs/console_get.md index 80ece6611..113543540 100644 --- a/openapi-specs/cwpp/desc/logs/console_get.md +++ b/openapi-specs/cwpp/desc/logs/console_get.md @@ -3,7 +3,7 @@ Retrieves the latest Console log messages. The following example curl command retrieves the 10 latest Console log messages: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/logs/defender_download_get.md b/openapi-specs/cwpp/desc/logs/defender_download_get.md index 5d6718db0..05bbc6a75 100644 --- a/openapi-specs/cwpp/desc/logs/defender_download_get.md +++ b/openapi-specs/cwpp/desc/logs/defender_download_get.md @@ -5,7 +5,7 @@ The hostname can be returned from the endpoint `/defenders/names` The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/logs/defender_get.md b/openapi-specs/cwpp/desc/logs/defender_get.md index 1e733a746..f2e3b25df 100644 --- a/openapi-specs/cwpp/desc/logs/defender_get.md +++ b/openapi-specs/cwpp/desc/logs/defender_get.md @@ -7,7 +7,7 @@ Note that you must quote the URL when running the following command. Otherwise the shell misinterprets the ampersand (`&`) as the end of the command, and puts the curl command in the background. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/logs/system_download_get.md b/openapi-specs/cwpp/desc/logs/system_download_get.md index 1e5b5b873..43bb0abce 100644 --- a/openapi-specs/cwpp/desc/logs/system_download_get.md +++ b/openapi-specs/cwpp/desc/logs/system_download_get.md @@ -4,7 +4,7 @@ This endpoint will return the system debug logs with `tar.gz` file extension. The following example curl command uses basic auth to download the logs: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/pcf-droplets/addresses_get.md b/openapi-specs/cwpp/desc/pcf-droplets/addresses_get.md index 257a47455..bb3365015 100644 --- a/openapi-specs/cwpp/desc/pcf-droplets/addresses_get.md +++ b/openapi-specs/cwpp/desc/pcf-droplets/addresses_get.md @@ -5,7 +5,7 @@ You can also add optional query parameters to this API call, in this example `cl The following example curl command retrieves the list of addresses: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/pcf-droplets/download_get.md b/openapi-specs/cwpp/desc/pcf-droplets/download_get.md index ad761e744..ac8546a25 100644 --- a/openapi-specs/cwpp/desc/pcf-droplets/download_get.md +++ b/openapi-specs/cwpp/desc/pcf-droplets/download_get.md @@ -3,7 +3,7 @@ This endpoint will download the list of configured cloud controller addresses co The following example curl command retrieves the list of addresses and outputs it to a file call `PCF_blobstores.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/pcf-droplets/get.md b/openapi-specs/cwpp/desc/pcf-droplets/get.md index 930d16948..aad607cba 100644 --- a/openapi-specs/cwpp/desc/pcf-droplets/get.md +++ b/openapi-specs/cwpp/desc/pcf-droplets/get.md @@ -3,7 +3,7 @@ This endpoint will return the full metadata of PCF blobstore from page **Monitor The following example curl command will retrieve this: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/pcf-droplets/scan_post.md b/openapi-specs/cwpp/desc/pcf-droplets/scan_post.md index 34e75b26c..d9c9df4dd 100644 --- a/openapi-specs/cwpp/desc/pcf-droplets/scan_post.md +++ b/openapi-specs/cwpp/desc/pcf-droplets/scan_post.md @@ -3,7 +3,7 @@ This endpoint will kick off a scan of the any PCF Blobstores you have configured Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/pcf-droplets/stop_post.md b/openapi-specs/cwpp/desc/pcf-droplets/stop_post.md index 94c376972..2c4d5264a 100644 --- a/openapi-specs/cwpp/desc/pcf-droplets/stop_post.md +++ b/openapi-specs/cwpp/desc/pcf-droplets/stop_post.md @@ -3,7 +3,7 @@ This endpoint will instruct the PFC Defenders to stop scanning. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/policies/compliance_ci_images_get.md b/openapi-specs/cwpp/desc/policies/compliance_ci_images_get.md index f97130a97..9a2b2abf5 100644 --- a/openapi-specs/cwpp/desc/policies/compliance_ci_images_get.md +++ b/openapi-specs/cwpp/desc/policies/compliance_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > CI** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/policies/compliance_ci_serverless_get.md b/openapi-specs/cwpp/desc/policies/compliance_ci_serverless_get.md index 59195f070..2f30e2d74 100644 --- a/openapi-specs/cwpp/desc/policies/compliance_ci_serverless_get.md +++ b/openapi-specs/cwpp/desc/policies/compliance_ci_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Functions > CI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/policies/compliance_container_get.md b/openapi-specs/cwpp/desc/policies/compliance_container_get.md index 7f10245ea..657d4f2dd 100644 --- a/openapi-specs/cwpp/desc/policies/compliance_container_get.md +++ b/openapi-specs/cwpp/desc/policies/compliance_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Containers and images > Deployed** Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/policies/compliance_container_impacted_get.md b/openapi-specs/cwpp/desc/policies/compliance_container_impacted_get.md index 607bfa3c8..de9e0ee77 100644 --- a/openapi-specs/cwpp/desc/policies/compliance_container_impacted_get.md +++ b/openapi-specs/cwpp/desc/policies/compliance_container_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of containers captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/compliance/container/impacted?ruleName=' diff --git a/openapi-specs/cwpp/desc/policies/compliance_host_get.md b/openapi-specs/cwpp/desc/policies/compliance_host_get.md index c029ecf7f..a5e429af5 100755 --- a/openapi-specs/cwpp/desc/policies/compliance_host_get.md +++ b/openapi-specs/cwpp/desc/policies/compliance_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Hosts > Running hosts** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/policies/compliance_serverless_get.md b/openapi-specs/cwpp/desc/policies/compliance_serverless_get.md index c7de886c1..f559179f6 100755 --- a/openapi-specs/cwpp/desc/policies/compliance_serverless_get.md +++ b/openapi-specs/cwpp/desc/policies/compliance_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Compliance > Functions > Functions** in the Con Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/policies/compliance_vms_get.md b/openapi-specs/cwpp/desc/policies/compliance_vms_get.md index f7d7e1a49..b61d20d9d 100755 --- a/openapi-specs/cwpp/desc/policies/compliance_vms_get.md +++ b/openapi-specs/cwpp/desc/policies/compliance_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Compliance > Hosts > VM ima The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/policies/compliance_vms_impacted_get.md b/openapi-specs/cwpp/desc/policies/compliance_vms_impacted_get.md index 9cf5b9d03..4ac3f2832 100644 --- a/openapi-specs/cwpp/desc/policies/compliance_vms_impacted_get.md +++ b/openapi-specs/cwpp/desc/policies/compliance_vms_impacted_get.md @@ -8,7 +8,7 @@ Use query parameters to retrieve the list of impacted resources by *account ID*, Refer to the following example cURL command, which retrieves a list of impacted resources: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/policies/docker_get.md b/openapi-specs/cwpp/desc/policies/docker_get.md index f56872c67..e8ab3d5bb 100644 --- a/openapi-specs/cwpp/desc/policies/docker_get.md +++ b/openapi-specs/cwpp/desc/policies/docker_get.md @@ -3,7 +3,7 @@ Retrieves a list of all access control rules for Docker Engine commands. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/policies/docker_put.md b/openapi-specs/cwpp/desc/policies/docker_put.md index 860e2bb1e..a5d0c0230 100644 --- a/openapi-specs/cwpp/desc/policies/docker_put.md +++ b/openapi-specs/cwpp/desc/policies/docker_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove Docker access control rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/docker \ | jq '.' > docker_access_control_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove Docker access control rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/cwpp/desc/policies/firewall_app-embedded_get.md b/openapi-specs/cwpp/desc/policies/firewall_app-embedded_get.md index 3da2a7cd6..4e59c4c21 100644 --- a/openapi-specs/cwpp/desc/policies/firewall_app-embedded_get.md +++ b/openapi-specs/cwpp/desc/policies/firewall_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > App-Embedded** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/policies/firewall_app_container_get.md b/openapi-specs/cwpp/desc/policies/firewall_app_container_get.md index 3b8c157fa..f0486aa4c 100644 --- a/openapi-specs/cwpp/desc/policies/firewall_app_container_get.md +++ b/openapi-specs/cwpp/desc/policies/firewall_app_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Container** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/container' diff --git a/openapi-specs/cwpp/desc/policies/firewall_app_host_get.md b/openapi-specs/cwpp/desc/policies/firewall_app_host_get.md index adb90128a..75c22add4 100644 --- a/openapi-specs/cwpp/desc/policies/firewall_app_host_get.md +++ b/openapi-specs/cwpp/desc/policies/firewall_app_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Host** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/policies/firewall_app_network_list_get.md b/openapi-specs/cwpp/desc/policies/firewall_app_network_list_get.md index 13f7fb450..5a1f87d85 100644 --- a/openapi-specs/cwpp/desc/policies/firewall_app_network_list_get.md +++ b/openapi-specs/cwpp/desc/policies/firewall_app_network_list_get.md @@ -11,7 +11,7 @@ This endpoint maps to **Defend > WAAS > Network lists** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/network-list' diff --git a/openapi-specs/cwpp/desc/policies/firewall_app_out-of-band_get.md b/openapi-specs/cwpp/desc/policies/firewall_app_out-of-band_get.md index d4f72d041..9ae662687 100644 --- a/openapi-specs/cwpp/desc/policies/firewall_app_out-of-band_get.md +++ b/openapi-specs/cwpp/desc/policies/firewall_app_out-of-band_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/policies/firewall_app_out-of-band_impacted_get.md b/openapi-specs/cwpp/desc/policies/firewall_app_out-of-band_impacted_get.md index 25d2c6691..96a427f94 100644 --- a/openapi-specs/cwpp/desc/policies/firewall_app_out-of-band_impacted_get.md +++ b/openapi-specs/cwpp/desc/policies/firewall_app_out-of-band_impacted_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Out of band** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/policies/firewall_app_rasp_get.md b/openapi-specs/cwpp/desc/policies/firewall_app_rasp_get.md index 15d481cf3..a201d3beb 100644 --- a/openapi-specs/cwpp/desc/policies/firewall_app_rasp_get.md +++ b/openapi-specs/cwpp/desc/policies/firewall_app_rasp_get.md @@ -1,7 +1,7 @@ Retrieves a list of all application firewall (CNAF) rules for RASP. ``` -$ curl -k \ +$ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp ``` diff --git a/openapi-specs/cwpp/desc/policies/firewall_app_rasp_put.md b/openapi-specs/cwpp/desc/policies/firewall_app_rasp_put.md index 04ba86483..1101c7690 100644 --- a/openapi-specs/cwpp/desc/policies/firewall_app_rasp_put.md +++ b/openapi-specs/cwpp/desc/policies/firewall_app_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/firewall/app/rasp \ | jq '.' > app_firewall_rules.json @@ -22,7 +22,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/cwpp/desc/policies/firewall_app_serverless_get.md b/openapi-specs/cwpp/desc/policies/firewall_app_serverless_get.md index d19e909f3..90cac0015 100644 --- a/openapi-specs/cwpp/desc/policies/firewall_app_serverless_get.md +++ b/openapi-specs/cwpp/desc/policies/firewall_app_serverless_get.md @@ -7,7 +7,7 @@ This endpoint maps to **Defend > WAAS > Serverless** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ 'https:///api/v/policies/firewall/app/serverless' diff --git a/openapi-specs/cwpp/desc/policies/firewall_network_container_get.md b/openapi-specs/cwpp/desc/policies/firewall_network_container_get.md index 3f1343b53..82e656818 100644 --- a/openapi-specs/cwpp/desc/policies/firewall_network_container_get.md +++ b/openapi-specs/cwpp/desc/policies/firewall_network_container_get.md @@ -4,7 +4,7 @@ Retrieves a list of all CNNS container and host rules. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/policies/firewall_network_container_put.md b/openapi-specs/cwpp/desc/policies/firewall_network_container_put.md index fd9263430..cffb3f1c4 100644 --- a/openapi-specs/cwpp/desc/policies/firewall_network_container_put.md +++ b/openapi-specs/cwpp/desc/policies/firewall_network_container_put.md @@ -9,7 +9,7 @@ The procedure to add, edit, or remove rules is: Refer to the following example cURL command that retrieves a list of all rules, pretty-print the JSON response, and save the results to a file: ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -26,7 +26,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/cwpp/desc/policies/firewall_network_entities_get.md b/openapi-specs/cwpp/desc/policies/firewall_network_entities_get.md index 757121f70..28ed8dbcb 100644 --- a/openapi-specs/cwpp/desc/policies/firewall_network_entities_get.md +++ b/openapi-specs/cwpp/desc/policies/firewall_network_entities_get.md @@ -1,7 +1,7 @@ Retrieves a list of all CNNF network objects. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/policies/firewall_network_entities_put.md b/openapi-specs/cwpp/desc/policies/firewall_network_entities_put.md index 83c023286..39044ee10 100644 --- a/openapi-specs/cwpp/desc/policies/firewall_network_entities_put.md +++ b/openapi-specs/cwpp/desc/policies/firewall_network_entities_put.md @@ -3,7 +3,7 @@ Updates the list of CNNF network objects. The following example curl command updates the network objects. There is an example of all three types (images,subnets, and applications ): ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/cwpp/desc/policies/policies.md b/openapi-specs/cwpp/desc/policies/policies.md index 69768c03d..97be7b616 100644 --- a/openapi-specs/cwpp/desc/policies/policies.md +++ b/openapi-specs/cwpp/desc/policies/policies.md @@ -21,7 +21,7 @@ To add, edit, or remove vulnerability rules from a policy: For example, the following cURL command uses basic auth to retrieve a list of all image vulnerability rules, pretty-prints the JSON response, and saves the results to a `vulnerability_rules.json` file. ```bash - $ curl -k \ + $ curl \ -u \ https:///api/v1/policies/runtime/host \ | jq '.' > vulnerability_rules.json @@ -36,7 +36,7 @@ To add, edit, or remove vulnerability rules from a policy: **Note:** Remember to specify the `@` symbol. ```bash - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ @@ -107,7 +107,7 @@ Use the `PUT` method to delete all rules by submitting an empty JSON object. For example, to delete all host runtime rules: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/cwpp/desc/policies/runtime_app-embedded_get.md b/openapi-specs/cwpp/desc/policies/runtime_app-embedded_get.md index fcf0ba8b9..517b741bb 100755 --- a/openapi-specs/cwpp/desc/policies/runtime_app-embedded_get.md +++ b/openapi-specs/cwpp/desc/policies/runtime_app-embedded_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > App-Embedded policy** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/policies/runtime_container_get.md b/openapi-specs/cwpp/desc/policies/runtime_container_get.md index f1b50b727..65cd10660 100644 --- a/openapi-specs/cwpp/desc/policies/runtime_container_get.md +++ b/openapi-specs/cwpp/desc/policies/runtime_container_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Container policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/policies/runtime_container_impacted_get.md b/openapi-specs/cwpp/desc/policies/runtime_container_impacted_get.md index 195f75547..e026d33b9 100644 --- a/openapi-specs/cwpp/desc/policies/runtime_container_impacted_get.md +++ b/openapi-specs/cwpp/desc/policies/runtime_container_impacted_get.md @@ -6,7 +6,7 @@ In the Console UI, you can see how it works by going to the **Defend > Runtime > Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ $ curl -k \ For additional help with your `ruleName`: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/policies/runtime_host_get.md b/openapi-specs/cwpp/desc/policies/runtime_host_get.md index 38800596c..559ef690a 100644 --- a/openapi-specs/cwpp/desc/policies/runtime_host_get.md +++ b/openapi-specs/cwpp/desc/policies/runtime_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Host policy** in the Console UI. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/policies/runtime_rasp_get.md b/openapi-specs/cwpp/desc/policies/runtime_rasp_get.md index 5b7a76457..55a6ff05b 100644 --- a/openapi-specs/cwpp/desc/policies/runtime_rasp_get.md +++ b/openapi-specs/cwpp/desc/policies/runtime_rasp_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your RASP runtime policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/policies/runtime_rasp_put.md b/openapi-specs/cwpp/desc/policies/runtime_rasp_put.md index bba60ba81..f71fb4b93 100644 --- a/openapi-specs/cwpp/desc/policies/runtime_rasp_put.md +++ b/openapi-specs/cwpp/desc/policies/runtime_rasp_put.md @@ -8,7 +8,7 @@ The procedure to add, edit, or remove rules is: The following curl command uses basic auth to retrieve the rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET @@ -24,7 +24,7 @@ The procedure to add, edit, or remove rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -H "Content-Type:application/json" \ -X PUT \ diff --git a/openapi-specs/cwpp/desc/policies/runtime_serverless_get.md b/openapi-specs/cwpp/desc/policies/runtime_serverless_get.md index 44326bbf6..c98489e16 100644 --- a/openapi-specs/cwpp/desc/policies/runtime_serverless_get.md +++ b/openapi-specs/cwpp/desc/policies/runtime_serverless_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Runtime > Serverless policy** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/policies/secrets_get.md b/openapi-specs/cwpp/desc/policies/secrets_get.md index 89e6b9c0e..cb4ecb37c 100644 --- a/openapi-specs/cwpp/desc/policies/secrets_get.md +++ b/openapi-specs/cwpp/desc/policies/secrets_get.md @@ -3,7 +3,7 @@ Retrieves a list of all secrets rules. The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` -$ curl -k \ +$ curl \ -u \ -X GET \ https://:8083/api/v1/policies/secrets diff --git a/openapi-specs/cwpp/desc/policies/secrets_put.md b/openapi-specs/cwpp/desc/policies/secrets_put.md index 1e8877ca1..04fd41f24 100644 --- a/openapi-specs/cwpp/desc/policies/secrets_put.md +++ b/openapi-specs/cwpp/desc/policies/secrets_put.md @@ -10,7 +10,7 @@ The procedure to add, edit, or remove secrets rules is: The following curl command uses basic auth to retrieve a list of all rules, pretty-print the JSON response, and save the results to a file. ``` - $ curl -k \ + $ curl \ -u \ https://:8083/api/v1/policies/secrets \ | jq '.' > secrets_rules.json @@ -24,7 +24,7 @@ The procedure to add, edit, or remove secrets rules is: Do not forget to specify the `@` symbol. ``` - $ curl -k \ + $ curl \ -u \ -X PUT \ -H "Content-Type:application/json" \ diff --git a/openapi-specs/cwpp/desc/policies/trust_get.md b/openapi-specs/cwpp/desc/policies/trust_get.md index 8de1ba409..0805d6777 100644 --- a/openapi-specs/cwpp/desc/policies/trust_get.md +++ b/openapi-specs/cwpp/desc/policies/trust_get.md @@ -1,7 +1,7 @@ Retrieves the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/policies/trust_put.md b/openapi-specs/cwpp/desc/policies/trust_put.md index fccd4b91e..7fec72031 100644 --- a/openapi-specs/cwpp/desc/policies/trust_put.md +++ b/openapi-specs/cwpp/desc/policies/trust_put.md @@ -1,7 +1,7 @@ Updates the list of rules that make up your trusted images policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/cwpp/desc/policies/vulnerability_ci_images_get.md b/openapi-specs/cwpp/desc/policies/vulnerability_ci_images_get.md index abc3da8fa..ce0d50a29 100644 --- a/openapi-specs/cwpp/desc/policies/vulnerability_ci_images_get.md +++ b/openapi-specs/cwpp/desc/policies/vulnerability_ci_images_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/policies/vulnerability_ci_serverless_get.md b/openapi-specs/cwpp/desc/policies/vulnerability_ci_serverless_get.md index 958c86495..6fb5f93ce 100644 --- a/openapi-specs/cwpp/desc/policies/vulnerability_ci_serverless_get.md +++ b/openapi-specs/cwpp/desc/policies/vulnerability_ci_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/policies/vulnerability_coderepos_get.md b/openapi-specs/cwpp/desc/policies/vulnerability_coderepos_get.md index 08dfed8e1..a4ac62f33 100644 --- a/openapi-specs/cwpp/desc/policies/vulnerability_coderepos_get.md +++ b/openapi-specs/cwpp/desc/policies/vulnerability_coderepos_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Code repositories** in the Co Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/policies/vulnerability/coderepos' diff --git a/openapi-specs/cwpp/desc/policies/vulnerability_coderepos_impacted_get.md b/openapi-specs/cwpp/desc/policies/vulnerability_coderepos_impacted_get.md index a401a12c4..e64ef768e 100644 --- a/openapi-specs/cwpp/desc/policies/vulnerability_coderepos_impacted_get.md +++ b/openapi-specs/cwpp/desc/policies/vulnerability_coderepos_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/coderepos/impacted?project=&ruleName=' ``` diff --git a/openapi-specs/cwpp/desc/policies/vulnerability_coderepos_put.md b/openapi-specs/cwpp/desc/policies/vulnerability_coderepos_put.md index 514eec136..a002415b9 100644 --- a/openapi-specs/cwpp/desc/policies/vulnerability_coderepos_put.md +++ b/openapi-specs/cwpp/desc/policies/vulnerability_coderepos_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Code repo Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT 'https:///api/v/policies/vulnerability/coderepos' \ diff --git a/openapi-specs/cwpp/desc/policies/vulnerability_host_get.md b/openapi-specs/cwpp/desc/policies/vulnerability_host_get.md index 3b9b14b9c..260da7675 100644 --- a/openapi-specs/cwpp/desc/policies/vulnerability_host_get.md +++ b/openapi-specs/cwpp/desc/policies/vulnerability_host_get.md @@ -8,7 +8,7 @@ This endpoint maps to **Defend > Vulnerabilities > Hosts > Running hosts** in th Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/policies/vulnerability_host_impacted_get.md b/openapi-specs/cwpp/desc/policies/vulnerability_host_impacted_get.md index 346368518..f44592830 100644 --- a/openapi-specs/cwpp/desc/policies/vulnerability_host_impacted_get.md +++ b/openapi-specs/cwpp/desc/policies/vulnerability_host_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by `RULE_NAME`. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/host/impacted?project={PROJECT_NAME}&ruleName={RULE_NAME}' ``` diff --git a/openapi-specs/cwpp/desc/policies/vulnerability_images_get.md b/openapi-specs/cwpp/desc/policies/vulnerability_images_get.md index 33581be37..57359bb8f 100644 --- a/openapi-specs/cwpp/desc/policies/vulnerability_images_get.md +++ b/openapi-specs/cwpp/desc/policies/vulnerability_images_get.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images?project=" diff --git a/openapi-specs/cwpp/desc/policies/vulnerability_images_impacted_get.md b/openapi-specs/cwpp/desc/policies/vulnerability_images_impacted_get.md index ae1d5e396..e2a4efa23 100644 --- a/openapi-specs/cwpp/desc/policies/vulnerability_images_impacted_get.md +++ b/openapi-specs/cwpp/desc/policies/vulnerability_images_impacted_get.md @@ -11,7 +11,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of images caught by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ "https:///api/v/policies/vulnerability/images/impacted?project=&ruleName=" diff --git a/openapi-specs/cwpp/desc/policies/vulnerability_images_put.md b/openapi-specs/cwpp/desc/policies/vulnerability_images_put.md index b3330dab7..8c3cc8af2 100644 --- a/openapi-specs/cwpp/desc/policies/vulnerability_images_put.md +++ b/openapi-specs/cwpp/desc/policies/vulnerability_images_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Images > Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k \ +$ curl \ -u \ -X PUT 'https:///api/v/policies/vulnerability/images' \ --data '{ diff --git a/openapi-specs/cwpp/desc/policies/vulnerability_serverless_get.md b/openapi-specs/cwpp/desc/policies/vulnerability_serverless_get.md index c7a8e2ef5..41c7e75d8 100644 --- a/openapi-specs/cwpp/desc/policies/vulnerability_serverless_get.md +++ b/openapi-specs/cwpp/desc/policies/vulnerability_serverless_get.md @@ -9,7 +9,7 @@ This endpoint maps to **Defend > Vulnerabilities > Functions** in the Console UI Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/policies/vulnerability_serverless_put.md b/openapi-specs/cwpp/desc/policies/vulnerability_serverless_put.md index 2b567b5b1..5199f0997 100644 --- a/openapi-specs/cwpp/desc/policies/vulnerability_serverless_put.md +++ b/openapi-specs/cwpp/desc/policies/vulnerability_serverless_put.md @@ -9,7 +9,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Functions Refer to the following example cURL command that overwrites all rules in your current policy with a new policy that has a single rule: ```bash -$ curl -k 'https:///api/v/policies/vulnerability/serverless' \ +$ curl 'https:///api/v/policies/vulnerability/serverless' \ -X PUT \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/cwpp/desc/policies/vulnerability_vms_get.md b/openapi-specs/cwpp/desc/policies/vulnerability_vms_get.md index 117d2cc4a..e37c1520f 100644 --- a/openapi-specs/cwpp/desc/policies/vulnerability_vms_get.md +++ b/openapi-specs/cwpp/desc/policies/vulnerability_vms_get.md @@ -8,7 +8,7 @@ This endpoint maps to the policy table in **Defend > Vulnerabilities > Hosts > V The following cURL command retrieves all rules in the policy. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/policies/vulnerability_vms_impacted_get.md b/openapi-specs/cwpp/desc/policies/vulnerability_vms_impacted_get.md index 29d9621ea..f1a7f7ef5 100644 --- a/openapi-specs/cwpp/desc/policies/vulnerability_vms_impacted_get.md +++ b/openapi-specs/cwpp/desc/policies/vulnerability_vms_impacted_get.md @@ -12,7 +12,7 @@ To see where Console invokes this endpoint: The following cURL command returns a list of code repositories captured by ``. ```bash -$ curl -k \ +$ curl \ -u \ -X GET 'https:///api/v/policies/vulnerability/vms?project=&ruleName=' ``` diff --git a/openapi-specs/cwpp/desc/profiles/app-embedded_download_get.md b/openapi-specs/cwpp/desc/profiles/app-embedded_download_get.md index 4b3f7ff8a..2e8cac56d 100644 --- a/openapi-specs/cwpp/desc/profiles/app-embedded_download_get.md +++ b/openapi-specs/cwpp/desc/profiles/app-embedded_download_get.md @@ -5,7 +5,7 @@ Downloads the app-embedded observations in a CSV format. Refer to the following example cURL command that downloads all the app-embedded runtime profiles: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/profiles/app-embedded_get.md b/openapi-specs/cwpp/desc/profiles/app-embedded_get.md index f3ddb3125..c332061e5 100644 --- a/openapi-specs/cwpp/desc/profiles/app-embedded_get.md +++ b/openapi-specs/cwpp/desc/profiles/app-embedded_get.md @@ -5,7 +5,7 @@ Retrieves the app-embedded observations. Refer to the following example cURL command that lists all the app-embedded runtime: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/profiles/container_download_get.md b/openapi-specs/cwpp/desc/profiles/container_download_get.md index ad7a86101..ee9d5e9e4 100644 --- a/openapi-specs/cwpp/desc/profiles/container_download_get.md +++ b/openapi-specs/cwpp/desc/profiles/container_download_get.md @@ -6,7 +6,7 @@ Retrieves the details and state of all runtime models in CSV format. Refer to the following example cURL command that downloads a complete list in CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/profiles/container_filters_get.md b/openapi-specs/cwpp/desc/profiles/container_filters_get.md index 8b6122b80..13535b520 100644 --- a/openapi-specs/cwpp/desc/profiles/container_filters_get.md +++ b/openapi-specs/cwpp/desc/profiles/container_filters_get.md @@ -4,7 +4,7 @@ Returns a list of os and images from page monitor/runtime/container-models in Co Example curl command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/profiles/container_get.md b/openapi-specs/cwpp/desc/profiles/container_get.md index cdbc24c3e..59a3764fb 100644 --- a/openapi-specs/cwpp/desc/profiles/container_get.md +++ b/openapi-specs/cwpp/desc/profiles/container_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of all runtime models. Refer to the following example cURL command that lists all runtime models in a system: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/profiles/container_learn_post.md b/openapi-specs/cwpp/desc/profiles/container_learn_post.md index 5fef2e31e..2c1d08af1 100644 --- a/openapi-specs/cwpp/desc/profiles/container_learn_post.md +++ b/openapi-specs/cwpp/desc/profiles/container_learn_post.md @@ -7,7 +7,7 @@ For more information, refer to [Learning mode](https://docs.prismacloud.io/en/cl Refer to the following example cURL command: ```bash -$ curl -k -G \ +$ curl -G \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/profiles/host_download_get.md b/openapi-specs/cwpp/desc/profiles/host_download_get.md index ace270a32..2dfb51ec0 100644 --- a/openapi-specs/cwpp/desc/profiles/host_download_get.md +++ b/openapi-specs/cwpp/desc/profiles/host_download_get.md @@ -5,7 +5,7 @@ Retrieves the details and state of each host service runtime model in CSV format Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/profiles/host_get.md b/openapi-specs/cwpp/desc/profiles/host_get.md index 208a24de3..55d8bf8ff 100644 --- a/openapi-specs/cwpp/desc/profiles/host_get.md +++ b/openapi-specs/cwpp/desc/profiles/host_get.md @@ -15,7 +15,7 @@ The returned JSON object has the following structure: Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/profiles/host_id_rule_get.md b/openapi-specs/cwpp/desc/profiles/host_id_rule_get.md index 672cb4c62..8be668fca 100644 --- a/openapi-specs/cwpp/desc/profiles/host_id_rule_get.md +++ b/openapi-specs/cwpp/desc/profiles/host_id_rule_get.md @@ -10,7 +10,7 @@ This is the `PROFILE_ID`. The following example command uses curl and basic auth to specify the learning mode for a profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/profiles/service_download_get.md b/openapi-specs/cwpp/desc/profiles/service_download_get.md index 63dff3354..4c1c431c1 100644 --- a/openapi-specs/cwpp/desc/profiles/service_download_get.md +++ b/openapi-specs/cwpp/desc/profiles/service_download_get.md @@ -1,7 +1,7 @@ Retrieves the details and state of all host service runtime models in CSV format ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: text/csv' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/profiles/service_get.md b/openapi-specs/cwpp/desc/profiles/service_get.md index a4f8c348d..5d786d919 100644 --- a/openapi-specs/cwpp/desc/profiles/service_get.md +++ b/openapi-specs/cwpp/desc/profiles/service_get.md @@ -10,7 +10,7 @@ The returned JSON object has the following structure: Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/profiles/service_id_learn_post.md b/openapi-specs/cwpp/desc/profiles/service_id_learn_post.md index fb338b80d..fa85fc3a2 100644 --- a/openapi-specs/cwpp/desc/profiles/service_id_learn_post.md +++ b/openapi-specs/cwpp/desc/profiles/service_id_learn_post.md @@ -11,7 +11,7 @@ The `PROFILE_ID` is typically the service's name, such as `sshd` or `ntpd`. The following example command uses curl and basic auth to specify the learning mode for a host service profile. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/profiles/service_learn_post.md b/openapi-specs/cwpp/desc/profiles/service_learn_post.md index 02a1f299e..ceff8e5a5 100644 --- a/openapi-specs/cwpp/desc/profiles/service_learn_post.md +++ b/openapi-specs/cwpp/desc/profiles/service_learn_post.md @@ -3,7 +3,7 @@ Specify the learning mode for all host service profiles. The following example command uses curl and basic auth to specify the learning mode for all host service profiles. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/profiles/service_names_get.md b/openapi-specs/cwpp/desc/profiles/service_names_get.md index 7da863545..afae56f0d 100644 --- a/openapi-specs/cwpp/desc/profiles/service_names_get.md +++ b/openapi-specs/cwpp/desc/profiles/service_names_get.md @@ -3,7 +3,7 @@ Retrieves the name of all host service runtime models from within the app at **M The following example curl command uses basic auth to retrieve this data: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/projects/get.md b/openapi-specs/cwpp/desc/projects/get.md index 05485c24c..1ac04d2c0 100644 --- a/openapi-specs/cwpp/desc/projects/get.md +++ b/openapi-specs/cwpp/desc/projects/get.md @@ -3,7 +3,7 @@ Lists all projects visible to the given user. Assuming the given user is an admin, the following example curl command would list all projects: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/projects/name_delete.md b/openapi-specs/cwpp/desc/projects/name_delete.md index fba889f7e..0a34e72a2 100644 --- a/openapi-specs/cwpp/desc/projects/name_delete.md +++ b/openapi-specs/cwpp/desc/projects/name_delete.md @@ -6,7 +6,7 @@ The value for `` can be retrieved from the `_id` field in the resp The DELETE method returns the decommissioned supervisor's admin username and password. ```bash -$ curl -k \ +$ curl \ -u \ -X DELETE \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/cwpp/desc/projects/name_put.md b/openapi-specs/cwpp/desc/projects/name_put.md index b5a83a67d..1bde9b0c7 100644 --- a/openapi-specs/cwpp/desc/projects/name_put.md +++ b/openapi-specs/cwpp/desc/projects/name_put.md @@ -4,7 +4,7 @@ The following example curl command updates a project named ``. The value for `` can be retrieved from the `_id` field in the response object from `GET /api/v1/projects`. ```bash -$ curl -k \ +$ curl \ -u \ -X PUT \ https://:8083/api/v1/projects/ diff --git a/openapi-specs/cwpp/desc/projects/post.md b/openapi-specs/cwpp/desc/projects/post.md index 8862c0fd4..38c574173 100644 --- a/openapi-specs/cwpp/desc/projects/post.md +++ b/openapi-specs/cwpp/desc/projects/post.md @@ -3,7 +3,7 @@ Provisions a new project. The following example curl command provisions a new project named `my-project`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ $ curl -k \ If you have installed a new instance of Console, and you have already created an initial admin user for it, then you can specify the admin username name and password when you provision the project. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/projects/projects.md b/openapi-specs/cwpp/desc/projects/projects.md index 7e7dcff66..19c904e9e 100644 --- a/openapi-specs/cwpp/desc/projects/projects.md +++ b/openapi-specs/cwpp/desc/projects/projects.md @@ -20,7 +20,7 @@ If `project` is not specified, it is set to `Central+Console`. For example, to retrieve the compliance policies for a tenant project named `mobile_payments_division`, use the following curl command: ``` -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/radar/container_clean_post.md b/openapi-specs/cwpp/desc/radar/container_clean_post.md index 662b6d53f..d4f87e91e 100644 --- a/openapi-specs/cwpp/desc/radar/container_clean_post.md +++ b/openapi-specs/cwpp/desc/radar/container_clean_post.md @@ -1,7 +1,7 @@ Cleans the container runtime profiles and Radar entities. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/radar/container_delete.md b/openapi-specs/cwpp/desc/radar/container_delete.md index 4eabe337f..b6cc69cf2 100644 --- a/openapi-specs/cwpp/desc/radar/container_delete.md +++ b/openapi-specs/cwpp/desc/radar/container_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two containers. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/cwpp/desc/radar/container_export_get.md b/openapi-specs/cwpp/desc/radar/container_export_get.md index 7f577568f..f776c7e6c 100644 --- a/openapi-specs/cwpp/desc/radar/container_export_get.md +++ b/openapi-specs/cwpp/desc/radar/container_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for containers) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/radar/container_filters_get.md b/openapi-specs/cwpp/desc/radar/container_filters_get.md index f66463da1..8d7cd6df3 100644 --- a/openapi-specs/cwpp/desc/radar/container_filters_get.md +++ b/openapi-specs/cwpp/desc/radar/container_filters_get.md @@ -1,7 +1,7 @@ Returns the namespaces from the container view on the Radar page. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/radar/container_get.md b/openapi-specs/cwpp/desc/radar/container_get.md index 280d683d9..404629a25 100644 --- a/openapi-specs/cwpp/desc/radar/container_get.md +++ b/openapi-specs/cwpp/desc/radar/container_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (container view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/radar/host_delete.md b/openapi-specs/cwpp/desc/radar/host_delete.md index 738fa7a7c..b4910a8b7 100644 --- a/openapi-specs/cwpp/desc/radar/host_delete.md +++ b/openapi-specs/cwpp/desc/radar/host_delete.md @@ -1,7 +1,7 @@ Deletes a learned connection between two apps in CNNF for hosts. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/cwpp/desc/radar/host_export_get.md b/openapi-specs/cwpp/desc/radar/host_export_get.md index dd91b5335..851d6f40f 100644 --- a/openapi-specs/cwpp/desc/radar/host_export_get.md +++ b/openapi-specs/cwpp/desc/radar/host_export_get.md @@ -1,7 +1,7 @@ Returns the current learned connections from CNNF (for hosts) in JSON format. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/radar/host_get.md b/openapi-specs/cwpp/desc/radar/host_get.md index a12025856..222d075aa 100644 --- a/openapi-specs/cwpp/desc/radar/host_get.md +++ b/openapi-specs/cwpp/desc/radar/host_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (host view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/radar/serverless_get.md b/openapi-specs/cwpp/desc/radar/serverless_get.md index b2f329149..170cfb48d 100644 --- a/openapi-specs/cwpp/desc/radar/serverless_get.md +++ b/openapi-specs/cwpp/desc/radar/serverless_get.md @@ -1,7 +1,7 @@ Returns data from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/radar/serverless_progress_get.md b/openapi-specs/cwpp/desc/radar/serverless_progress_get.md index a11c1ae20..0808dfbf4 100644 --- a/openapi-specs/cwpp/desc/radar/serverless_progress_get.md +++ b/openapi-specs/cwpp/desc/radar/serverless_progress_get.md @@ -1,7 +1,7 @@ Returns the scan progress from Console's Radar page (serverless view). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/radar/serverless_scan_post.md b/openapi-specs/cwpp/desc/radar/serverless_scan_post.md index 0d519ba88..2d444ac88 100644 --- a/openapi-specs/cwpp/desc/radar/serverless_scan_post.md +++ b/openapi-specs/cwpp/desc/radar/serverless_scan_post.md @@ -1,7 +1,7 @@ Initiates a serverless scan of your environments. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/radar/serverless_stop_post.md b/openapi-specs/cwpp/desc/radar/serverless_stop_post.md index 5c0bdf186..f15bef34d 100644 --- a/openapi-specs/cwpp/desc/radar/serverless_stop_post.md +++ b/openapi-specs/cwpp/desc/radar/serverless_stop_post.md @@ -1,7 +1,7 @@ Stops an in-progress serverless scan. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/rbac/role_delete.md b/openapi-specs/cwpp/desc/rbac/role_delete.md index 87015b6e8..46efcf9c9 100644 --- a/openapi-specs/cwpp/desc/rbac/role_delete.md +++ b/openapi-specs/cwpp/desc/rbac/role_delete.md @@ -4,7 +4,7 @@ System roles and roles assigned to users/groups cannot be deleted. The following example curl command uses basic auth to delete role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/cwpp/desc/rbac/roles_get.md b/openapi-specs/cwpp/desc/rbac/roles_get.md index 4cd1d9bc7..112026937 100644 --- a/openapi-specs/cwpp/desc/rbac/roles_get.md +++ b/openapi-specs/cwpp/desc/rbac/roles_get.md @@ -3,7 +3,7 @@ This endpoint will return a list in JSON format of the roles can be found under The following example curl command uses basic auth to return: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/rbac/roles_post.md b/openapi-specs/cwpp/desc/rbac/roles_post.md index 1f20772ce..6988766e8 100644 --- a/openapi-specs/cwpp/desc/rbac/roles_post.md +++ b/openapi-specs/cwpp/desc/rbac/roles_post.md @@ -37,7 +37,7 @@ The added role must contain the "user" permission with read-write access. This p The following example curl command uses basic auth to create the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/rbac/roles_put.md b/openapi-specs/cwpp/desc/rbac/roles_put.md index 34d7b41a7..f62e34ccb 100644 --- a/openapi-specs/cwpp/desc/rbac/roles_put.md +++ b/openapi-specs/cwpp/desc/rbac/roles_put.md @@ -38,7 +38,7 @@ The updated role must contain the "user" permission with read-write access. This The following example curl command uses basic auth to update the role: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/cwpp/desc/recovery/backup_get.md b/openapi-specs/cwpp/desc/recovery/backup_get.md index 4da46f356..bf735905a 100644 --- a/openapi-specs/cwpp/desc/recovery/backup_get.md +++ b/openapi-specs/cwpp/desc/recovery/backup_get.md @@ -3,7 +3,7 @@ Returns a list of available backups. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/recovery/backup_id_delete.md b/openapi-specs/cwpp/desc/recovery/backup_id_delete.md index ae9c33e90..80cd4c3f6 100644 --- a/openapi-specs/cwpp/desc/recovery/backup_id_delete.md +++ b/openapi-specs/cwpp/desc/recovery/backup_id_delete.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/cwpp/desc/recovery/backup_id_patch.md b/openapi-specs/cwpp/desc/recovery/backup_id_patch.md index 4a78cd67d..b3699972f 100644 --- a/openapi-specs/cwpp/desc/recovery/backup_id_patch.md +++ b/openapi-specs/cwpp/desc/recovery/backup_id_patch.md @@ -5,7 +5,7 @@ Deletes a given backup by name. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PATCH \ diff --git a/openapi-specs/cwpp/desc/recovery/backup_post.md b/openapi-specs/cwpp/desc/recovery/backup_post.md index f45161712..41436fe5f 100644 --- a/openapi-specs/cwpp/desc/recovery/backup_post.md +++ b/openapi-specs/cwpp/desc/recovery/backup_post.md @@ -3,7 +3,7 @@ Creates a backup named `backup_name` by invoking the MongoDB dump process. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/recovery/restore_id_post.md b/openapi-specs/cwpp/desc/recovery/restore_id_post.md index 850fceeaa..e424641cc 100644 --- a/openapi-specs/cwpp/desc/recovery/restore_id_post.md +++ b/openapi-specs/cwpp/desc/recovery/restore_id_post.md @@ -5,7 +5,7 @@ Restores Prisma Cloud Compute from the given backup. Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/registry/download_get.md b/openapi-specs/cwpp/desc/registry/download_get.md index 5a3eb0141..3eef8d50e 100644 --- a/openapi-specs/cwpp/desc/registry/download_get.md +++ b/openapi-specs/cwpp/desc/registry/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Compliance > Images > Reg Refer to the following cURL command that generates a CSV file containing the scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/registry/get.md b/openapi-specs/cwpp/desc/registry/get.md index e8b87080e..208b2f1e3 100644 --- a/openapi-specs/cwpp/desc/registry/get.md +++ b/openapi-specs/cwpp/desc/registry/get.md @@ -21,7 +21,7 @@ Consider the following available options to retrieve when you use the `fields` q Refer to the following cURL command that retrieves a scan report for all images in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -33,7 +33,7 @@ The compact query can be used to get a general overview of the number of Vulnera Refer to the following cURL command that retrieves a compact scan report for the Ubuntu image in the registry: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -44,7 +44,7 @@ The name query is synonymous with the filter registry text field in the Console Refer to the following cURL that retrieves the scan report for the image in the registry with the matching **sha256** hash: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -54,7 +54,7 @@ $ curl -k \ Refer to the following cURL command that retrieves the images in the first 10 registries: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/registry/get_registry_progress.md b/openapi-specs/cwpp/desc/registry/get_registry_progress.md index ddc319c1b..cc6feac3d 100644 --- a/openapi-specs/cwpp/desc/registry/get_registry_progress.md +++ b/openapi-specs/cwpp/desc/registry/get_registry_progress.md @@ -11,7 +11,7 @@ For a regular scan, use the API path only without any query parameters. Refer to the following example cURL request that retrieves the ongoing scan details for a regular registry scan: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -61,7 +61,7 @@ For an on-demand scan that is started using the `/registry/scan` endpoint with t Refer to the following example cURL request that retrieves the ongoing scan details for an on-demand registry scan that is started using the `/registry/scan` endpoint for the repository `alpine` with tag `3.16`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/registry/names_get.md b/openapi-specs/cwpp/desc/registry/names_get.md index 6933a570c..25afb48b8 100644 --- a/openapi-specs/cwpp/desc/registry/names_get.md +++ b/openapi-specs/cwpp/desc/registry/names_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command that retrieves a list of image names from your scanned registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/registry/scan_post.md b/openapi-specs/cwpp/desc/registry/scan_post.md index ce7e19533..96bfd5f16 100644 --- a/openapi-specs/cwpp/desc/registry/scan_post.md +++ b/openapi-specs/cwpp/desc/registry/scan_post.md @@ -17,7 +17,7 @@ For information on scan result, see [Get Registry Scan Report](https://prisma.pa Refer to the following example cURL command that forces Prisma Cloud Compute to rescan all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -27,7 +27,7 @@ $ curl -k \ Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan a specific image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -52,7 +52,7 @@ For information on scan result, see [Get Registry Scan Report](https://pan.dev/p Refer to the following example cURL command to trigger an on-demand scan for an image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/registry/stop_post.md b/openapi-specs/cwpp/desc/registry/stop_post.md index 29e103ac1..05ac2f436 100644 --- a/openapi-specs/cwpp/desc/registry/stop_post.md +++ b/openapi-specs/cwpp/desc/registry/stop_post.md @@ -5,7 +5,7 @@ Stops current registry scan immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to stop scanning all registry images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/scans/download_get.md b/openapi-specs/cwpp/desc/scans/download_get.md index 61a0ccc2d..3785bf562 100644 --- a/openapi-specs/cwpp/desc/scans/download_get.md +++ b/openapi-specs/cwpp/desc/scans/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Images The following cURL command retrieves and saves your Jenkins and twistcli scan reports to a CSV file called `scans_report.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/scans/filter_get.md b/openapi-specs/cwpp/desc/scans/filter_get.md index 58550ad35..df3e9cdb0 100644 --- a/openapi-specs/cwpp/desc/scans/filter_get.md +++ b/openapi-specs/cwpp/desc/scans/filter_get.md @@ -3,7 +3,7 @@ Retrieves the list of Jenkins projects that have been scanned by the Jenkins plu The following example curl command uses basic auth to retrieve the list of Jenkins project names: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/scans/get.md b/openapi-specs/cwpp/desc/scans/get.md index e28506972..107b733bd 100644 --- a/openapi-specs/cwpp/desc/scans/get.md +++ b/openapi-specs/cwpp/desc/scans/get.md @@ -11,7 +11,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Images > CI** in the Console Refer to the following example cURL command that retrieves the scan reports for all images scanned using the Jenkins CI plugin or the twistcli tool: ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -23,7 +23,7 @@ To get the report of a specific scan, add query parameters to narrow the scope o The following cURL command retrieves the scan report for an image with a SHA256 ID of `sha256:f756e84300d8e53006090573dd33abe5b8cfac3e42d104fc4be37f435fe512f3`. ``` -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/scans/id_get.md b/openapi-specs/cwpp/desc/scans/id_get.md index 7a342ef60..1557b1905 100644 --- a/openapi-specs/cwpp/desc/scans/id_get.md +++ b/openapi-specs/cwpp/desc/scans/id_get.md @@ -3,7 +3,7 @@ Retrieves all scan reports for images scanned by the Jenkins plugin or twistcli The following example curl command uses basic auth to retrieve the scan report for just an image with a SHA256 ID of `5c3385fd2e76c5c16124c077`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/scripts/console_sh_get.md b/openapi-specs/cwpp/desc/scripts/console_sh_get.md index d8f02038f..1622321ca 100644 --- a/openapi-specs/cwpp/desc/scripts/console_sh_get.md +++ b/openapi-specs/cwpp/desc/scripts/console_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/scripts/defender_ps1_get.md b/openapi-specs/cwpp/desc/scripts/defender_ps1_get.md index a47616983..45e4a6133 100644 --- a/openapi-specs/cwpp/desc/scripts/defender_ps1_get.md +++ b/openapi-specs/cwpp/desc/scripts/defender_ps1_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/scripts/defender_sh_get.md b/openapi-specs/cwpp/desc/scripts/defender_sh_get.md index 98ad6cf62..a8a302426 100644 --- a/openapi-specs/cwpp/desc/scripts/defender_sh_get.md +++ b/openapi-specs/cwpp/desc/scripts/defender_sh_get.md @@ -5,7 +5,7 @@ For more information about each supported role, see [User roles](https://docs.twistlock.com/docs/latest/access_control/user_roles.html). ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/serverless/download_get.md b/openapi-specs/cwpp/desc/serverless/download_get.md index a8e49ff25..4d7d3adc1 100644 --- a/openapi-specs/cwpp/desc/serverless/download_get.md +++ b/openapi-specs/cwpp/desc/serverless/download_get.md @@ -7,7 +7,7 @@ This endpoint maps to the CSV hyperlink in **Monitor > Vulnerabilities > Functio The following cURL command retrieves a list of all serverless resources monitored by Prisma Cloud Compute and saves the results in a CSV file called `serverless.csv`: ```bash -$ curl -k \ +$ curl \ -u \ -X GET \ 'https:///api/v/serverless/download' \ diff --git a/openapi-specs/cwpp/desc/serverless/embed_post.md b/openapi-specs/cwpp/desc/serverless/embed_post.md index 6cce784b8..353b5721c 100644 --- a/openapi-specs/cwpp/desc/serverless/embed_post.md +++ b/openapi-specs/cwpp/desc/serverless/embed_post.md @@ -1,7 +1,7 @@ The following curl command uses basic auth to retrieve a list of all Serverless resources that monitored by Prisma Cloud Compute, and save the results to a CSV file: ```bash -$ curl -k \ +$ curl \ -X POST \ -H "Content-Type: application/octet-stream" \ -u \ diff --git a/openapi-specs/cwpp/desc/serverless/get.md b/openapi-specs/cwpp/desc/serverless/get.md index aee50492f..430ee065a 100644 --- a/openapi-specs/cwpp/desc/serverless/get.md +++ b/openapi-specs/cwpp/desc/serverless/get.md @@ -11,7 +11,7 @@ This endpoint maps to **Monitor > Vulnerabilities > Functions > Scanned function Refer to the following example cURL command that retrieves the scan reports for serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/serverless/names_get.md b/openapi-specs/cwpp/desc/serverless/names_get.md index 3cab17092..90285574a 100644 --- a/openapi-specs/cwpp/desc/serverless/names_get.md +++ b/openapi-specs/cwpp/desc/serverless/names_get.md @@ -5,7 +5,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo The following curl command uses basic auth to retrieve a list of names of all Serverless resources monitored by Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -X GET \ -H "Content-Type: application/json" \ -u \ diff --git a/openapi-specs/cwpp/desc/serverless/scan_post.md b/openapi-specs/cwpp/desc/serverless/scan_post.md index 159285349..70a3a3b4e 100644 --- a/openapi-specs/cwpp/desc/serverless/scan_post.md +++ b/openapi-specs/cwpp/desc/serverless/scan_post.md @@ -5,7 +5,7 @@ Re-scan all serverless functions immediately. Refer to the following example cURL command that forces Prisma Cloud Compute to re-scan all serverless functions: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/scan diff --git a/openapi-specs/cwpp/desc/serverless/stop_post.md b/openapi-specs/cwpp/desc/serverless/stop_post.md index 763710842..67c0d2239 100644 --- a/openapi-specs/cwpp/desc/serverless/stop_post.md +++ b/openapi-specs/cwpp/desc/serverless/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing serverless scan. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -X POST \ https:///api/v/serverless/stop diff --git a/openapi-specs/cwpp/desc/settings/alerts_get.md b/openapi-specs/cwpp/desc/settings/alerts_get.md index 060114c39..2b25dc6c9 100644 --- a/openapi-specs/cwpp/desc/settings/alerts_get.md +++ b/openapi-specs/cwpp/desc/settings/alerts_get.md @@ -1,7 +1,7 @@ Retrieves a list of your alert settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/settings/alerts_options_get.md b/openapi-specs/cwpp/desc/settings/alerts_options_get.md index 095c1f1b7..aa7a1d250 100644 --- a/openapi-specs/cwpp/desc/settings/alerts_options_get.md +++ b/openapi-specs/cwpp/desc/settings/alerts_options_get.md @@ -3,7 +3,7 @@ This endpoint will return the alert profile configuration options that can be fo The following example curl command uses basic auth to retrieve all alert profile configuration options: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/settings/alerts_post.md b/openapi-specs/cwpp/desc/settings/alerts_post.md index 3acb8d543..cd303f880 100644 --- a/openapi-specs/cwpp/desc/settings/alerts_post.md +++ b/openapi-specs/cwpp/desc/settings/alerts_post.md @@ -3,7 +3,7 @@ Configure alerts. The following example curl command sets the aggregation period for alerts to one hour. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/settings/certificates_post.md b/openapi-specs/cwpp/desc/settings/certificates_post.md index fbdc8a5a9..bd30ea399 100644 --- a/openapi-specs/cwpp/desc/settings/certificates_post.md +++ b/openapi-specs/cwpp/desc/settings/certificates_post.md @@ -9,7 +9,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to set the validity period for client certificates to seven days: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/cwpp/desc/settings/certs_get.md b/openapi-specs/cwpp/desc/settings/certs_get.md index ba6674a3c..dbf1d3790 100644 --- a/openapi-specs/cwpp/desc/settings/certs_get.md +++ b/openapi-specs/cwpp/desc/settings/certs_get.md @@ -6,7 +6,7 @@ Defenders use these names to connect to Console. Refer to the following example cURL request that uses basic auth to retrieve the SANs in Console's cert: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/settings/certs_post.md b/openapi-specs/cwpp/desc/settings/certs_post.md index a6e429006..fb2cedee5 100644 --- a/openapi-specs/cwpp/desc/settings/certs_post.md +++ b/openapi-specs/cwpp/desc/settings/certs_post.md @@ -12,7 +12,7 @@ For more information, see [Certificates](https://docs.paloaltonetworks.com/prism Refer to the following example cURL request that uses basic auth to add `node-01.example.com` to the `subjectAltName` field in the certificate: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/cwpp/desc/settings/coderepos_get.md b/openapi-specs/cwpp/desc/settings/coderepos_get.md index 6cbfb78cb..286a8d905 100644 --- a/openapi-specs/cwpp/desc/settings/coderepos_get.md +++ b/openapi-specs/cwpp/desc/settings/coderepos_get.md @@ -20,7 +20,7 @@ Construct the full webhook using Console's publicly accessible DNS name or IP ad Refer to the following example cURL command that retrieves all code repositories to scan, as well as the webhook URL suffix: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/settings/console-certificates_post.md b/openapi-specs/cwpp/desc/settings/console-certificates_post.md index 5673af840..392061c8f 100644 --- a/openapi-specs/cwpp/desc/settings/console-certificates_post.md +++ b/openapi-specs/cwpp/desc/settings/console-certificates_post.md @@ -9,7 +9,7 @@ For the custom TLS certificate for securing browser access, this file must be in Refer to the following example cURL request that uses basic auth and configures the custom certificate to use for securing browser access to the console: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/settings/custom-labels_get.md b/openapi-specs/cwpp/desc/settings/custom-labels_get.md index a849dd8a8..19c1cadde 100644 --- a/openapi-specs/cwpp/desc/settings/custom-labels_get.md +++ b/openapi-specs/cwpp/desc/settings/custom-labels_get.md @@ -5,7 +5,7 @@ Returns the list of alert labels configured in Prisma Cloud Compute. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/settings/custom-labels_post.md b/openapi-specs/cwpp/desc/settings/custom-labels_post.md index 6bb66e706..9b0702fe8 100644 --- a/openapi-specs/cwpp/desc/settings/custom-labels_post.md +++ b/openapi-specs/cwpp/desc/settings/custom-labels_post.md @@ -5,7 +5,7 @@ Creates a custom alert label to augment audit events. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/settings/defender_get.md b/openapi-specs/cwpp/desc/settings/defender_get.md index ecb8b6989..cf43bb304 100644 --- a/openapi-specs/cwpp/desc/settings/defender_get.md +++ b/openapi-specs/cwpp/desc/settings/defender_get.md @@ -5,7 +5,7 @@ Returns the advanced settings for Defenders. Refer to the following example cURL command that gets all advanced settings for Defenders: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/settings/forensic_get.md b/openapi-specs/cwpp/desc/settings/forensic_get.md index 9c16b70b9..3486b2bf9 100644 --- a/openapi-specs/cwpp/desc/settings/forensic_get.md +++ b/openapi-specs/cwpp/desc/settings/forensic_get.md @@ -1,7 +1,7 @@ Retrieves the settings for the forensics system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/settings/forensic_post.md b/openapi-specs/cwpp/desc/settings/forensic_post.md index 31f809d39..8943842fb 100644 --- a/openapi-specs/cwpp/desc/settings/forensic_post.md +++ b/openapi-specs/cwpp/desc/settings/forensic_post.md @@ -3,7 +3,7 @@ Configures the forensics system. The following example curl command allocates 100 MB of local disk space for container forensic data and 10 MB for host forensics data. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/settings/initialized_get.md b/openapi-specs/cwpp/desc/settings/initialized_get.md index 3134912d1..2af8462f1 100644 --- a/openapi-specs/cwpp/desc/settings/initialized_get.md +++ b/openapi-specs/cwpp/desc/settings/initialized_get.md @@ -4,7 +4,7 @@ After first installing Console, the first thing you must do is create an admin a Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/settings/intelligence-windows_post.md b/openapi-specs/cwpp/desc/settings/intelligence-windows_post.md index c39e256d2..0721dab3b 100644 --- a/openapi-specs/cwpp/desc/settings/intelligence-windows_post.md +++ b/openapi-specs/cwpp/desc/settings/intelligence-windows_post.md @@ -3,7 +3,7 @@ This endpoint will enable or disable the Windows Intelligence Service from **Man The following example curl command uses basic auth to enable online updates of Windows vulnerabilities from the intelligence stream: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/settings/intelligence_get.md b/openapi-specs/cwpp/desc/settings/intelligence_get.md index 26c694246..15e9f24ae 100644 --- a/openapi-specs/cwpp/desc/settings/intelligence_get.md +++ b/openapi-specs/cwpp/desc/settings/intelligence_get.md @@ -5,7 +5,7 @@ Returns the details about the Intelligence Stream configuration. Refer to the following example cURL command that uses basic auth to retrieve your Intelligence Stream configuration settings. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/settings/intelligence_post.md b/openapi-specs/cwpp/desc/settings/intelligence_post.md index 74b06a3a0..2dbbd0168 100644 --- a/openapi-specs/cwpp/desc/settings/intelligence_post.md +++ b/openapi-specs/cwpp/desc/settings/intelligence_post.md @@ -7,7 +7,7 @@ For more information, see [Intelligence Stream](https://docs.paloaltonetworks.co Refer to the following example cURL command that uses basic auth to configure settings of your Intelligence Stream. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/settings/latest-version_get.md b/openapi-specs/cwpp/desc/settings/latest-version_get.md index c443fa7b5..16601fb5b 100644 --- a/openapi-specs/cwpp/desc/settings/latest-version_get.md +++ b/openapi-specs/cwpp/desc/settings/latest-version_get.md @@ -3,7 +3,7 @@ Retrieves the version number of the latest available Prisma Cloud Compute releas Example curl command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/settings/latest_version_get.md b/openapi-specs/cwpp/desc/settings/latest_version_get.md index 18e436668..5c64edff1 100644 --- a/openapi-specs/cwpp/desc/settings/latest_version_get.md +++ b/openapi-specs/cwpp/desc/settings/latest_version_get.md @@ -1,7 +1,7 @@ This endpoint will return the latest version of the product. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/settings/ldap_get.md b/openapi-specs/cwpp/desc/settings/ldap_get.md index 4ad0ad0c9..7d803ba1c 100644 --- a/openapi-specs/cwpp/desc/settings/ldap_get.md +++ b/openapi-specs/cwpp/desc/settings/ldap_get.md @@ -5,7 +5,7 @@ Returns the LDAP integration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/settings/ldap_post.md b/openapi-specs/cwpp/desc/settings/ldap_post.md index c152c7dc5..34bc06ef4 100644 --- a/openapi-specs/cwpp/desc/settings/ldap_post.md +++ b/openapi-specs/cwpp/desc/settings/ldap_post.md @@ -7,7 +7,7 @@ For more information, see [Active Directory](https://docs.paloaltonetworks.com/p Refer to the following example cURL command that enables the LDAP integration and specifies the parameters required to integrate with an Active Directory service. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/settings/license_get.md b/openapi-specs/cwpp/desc/settings/license_get.md index 5c792cae8..2b4b548e3 100644 --- a/openapi-specs/cwpp/desc/settings/license_get.md +++ b/openapi-specs/cwpp/desc/settings/license_get.md @@ -5,7 +5,7 @@ Returns the details about the installed license. Refer to the following example cURL request that retrieves the license details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/settings/license_post.md b/openapi-specs/cwpp/desc/settings/license_post.md index b77800a5f..ce74b0d0f 100644 --- a/openapi-specs/cwpp/desc/settings/license_post.md +++ b/openapi-specs/cwpp/desc/settings/license_post.md @@ -8,7 +8,7 @@ For more information, see [Licensing](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to set your license: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/settings/logging_get.md b/openapi-specs/cwpp/desc/settings/logging_get.md index 6eda3e484..012be5def 100644 --- a/openapi-specs/cwpp/desc/settings/logging_get.md +++ b/openapi-specs/cwpp/desc/settings/logging_get.md @@ -5,7 +5,7 @@ Returns the logging settings. Refer to the following example cURL request that uses basic auth to retrieve your logging details. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/settings/logging_post.md b/openapi-specs/cwpp/desc/settings/logging_post.md index 3619d9c0f..8d27ee1b3 100644 --- a/openapi-specs/cwpp/desc/settings/logging_post.md +++ b/openapi-specs/cwpp/desc/settings/logging_post.md @@ -8,7 +8,7 @@ For more information, see [Logging](https://docs.paloaltonetworks.com/prisma/pri Refer to the following example cURL request that enables verbose scan output for syslog and stdout: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/settings/logon_get.md b/openapi-specs/cwpp/desc/settings/logon_get.md index 1559f2405..b1e9164f2 100644 --- a/openapi-specs/cwpp/desc/settings/logon_get.md +++ b/openapi-specs/cwpp/desc/settings/logon_get.md @@ -5,7 +5,7 @@ Configures the logon settings. Refer to the following example cURL request that uses basic auth to retrieve all current logon settings. ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/settings/logon_post.md b/openapi-specs/cwpp/desc/settings/logon_post.md index 5c2b60c9f..691e082fe 100644 --- a/openapi-specs/cwpp/desc/settings/logon_post.md +++ b/openapi-specs/cwpp/desc/settings/logon_post.md @@ -7,7 +7,7 @@ For more information, see [Logon Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that uses basic auth to set the timeout to 900 seconds (15 minutes): ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/cwpp/desc/settings/oauth_get.md b/openapi-specs/cwpp/desc/settings/oauth_get.md index 6dcf70fb5..5d997f016 100644 --- a/openapi-specs/cwpp/desc/settings/oauth_get.md +++ b/openapi-specs/cwpp/desc/settings/oauth_get.md @@ -5,7 +5,7 @@ Returns the OAuth configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/settings/oauth_post.md b/openapi-specs/cwpp/desc/settings/oauth_post.md index c593b9237..da3c83d2f 100644 --- a/openapi-specs/cwpp/desc/settings/oauth_post.md +++ b/openapi-specs/cwpp/desc/settings/oauth_post.md @@ -7,7 +7,7 @@ For more information, see [GitHub OAuth](https://docs.paloaltonetworks.com/prism Refer to the following example cURL response: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/settings/oidc_get.md b/openapi-specs/cwpp/desc/settings/oidc_get.md index ee439622b..1f27f93ba 100644 --- a/openapi-specs/cwpp/desc/settings/oidc_get.md +++ b/openapi-specs/cwpp/desc/settings/oidc_get.md @@ -5,7 +5,7 @@ Returns the OpenID Connect configuration settings. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/settings/oidc_post.md b/openapi-specs/cwpp/desc/settings/oidc_post.md index e0270247e..5bd3a9192 100644 --- a/openapi-specs/cwpp/desc/settings/oidc_post.md +++ b/openapi-specs/cwpp/desc/settings/oidc_post.md @@ -7,7 +7,7 @@ For more information, see [OIDC](https://docs.paloaltonetworks.com/prisma/prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/settings/pcf_get.md b/openapi-specs/cwpp/desc/settings/pcf_get.md index 5dc21eb17..c5e42a823 100644 --- a/openapi-specs/cwpp/desc/settings/pcf_get.md +++ b/openapi-specs/cwpp/desc/settings/pcf_get.md @@ -3,7 +3,7 @@ This endpoint will return settings for PCF (Pivotal Cloud Foundry)Blobstore scan The following example curl command uses basic auth to retrieve the current PCF Blobstore scanning settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/settings/pcf_post.md b/openapi-specs/cwpp/desc/settings/pcf_post.md index 139e947cb..657e14f27 100644 --- a/openapi-specs/cwpp/desc/settings/pcf_post.md +++ b/openapi-specs/cwpp/desc/settings/pcf_post.md @@ -3,7 +3,7 @@ This endpoint will allow for updating settings for PCF (Pivotal Cloud Foundry) B The following example curl command uses basic auth to set up a PCF Blobstore scanner that scans the last `5` droplets for every droplet in the PCF Blobstore: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/settings/projects_get.md b/openapi-specs/cwpp/desc/settings/projects_get.md index f5dd20395..bc95414a1 100644 --- a/openapi-specs/cwpp/desc/settings/projects_get.md +++ b/openapi-specs/cwpp/desc/settings/projects_get.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command retrieves the state of the Projects feature from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -16,7 +16,7 @@ All API calls must be proxied through Central Console, where the request is auto To retrieve the Projects settings from a supervisor Console, append the `project` query parameter to your request. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/settings/projects_post.md b/openapi-specs/cwpp/desc/settings/projects_post.md index d29f8e9d5..b3472e6b9 100644 --- a/openapi-specs/cwpp/desc/settings/projects_post.md +++ b/openapi-specs/cwpp/desc/settings/projects_post.md @@ -4,7 +4,7 @@ Projects are enabled when an instance of Console is designated as master. The following example curl command designates `` as master. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/settings/proxy_get.md b/openapi-specs/cwpp/desc/settings/proxy_get.md index 9a4922d59..477563069 100644 --- a/openapi-specs/cwpp/desc/settings/proxy_get.md +++ b/openapi-specs/cwpp/desc/settings/proxy_get.md @@ -5,7 +5,7 @@ Returns the proxy settings for Prisma Cloud Compute containers to access the Int Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/settings/proxy_post.md b/openapi-specs/cwpp/desc/settings/proxy_post.md index a1bdc07ed..df926524e 100644 --- a/openapi-specs/cwpp/desc/settings/proxy_post.md +++ b/openapi-specs/cwpp/desc/settings/proxy_post.md @@ -7,7 +7,7 @@ For more information, see [Proxy Settings](https://docs.paloaltonetworks.com/pri Refer to the following example cURL request that specifies the proxy to use to access the Internet: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/settings/registry_get.md b/openapi-specs/cwpp/desc/settings/registry_get.md index 12745005d..64e70b698 100644 --- a/openapi-specs/cwpp/desc/settings/registry_get.md +++ b/openapi-specs/cwpp/desc/settings/registry_get.md @@ -17,7 +17,7 @@ Construct the full webhook using the publicly accessible DNS name or IP address, The following cURL command retrieves all the registries to scan and the URL suffix for the registry's webhook URL suffix. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/settings/registry_post.md b/openapi-specs/cwpp/desc/settings/registry_post.md index efabf4e67..decf80a65 100644 --- a/openapi-specs/cwpp/desc/settings/registry_post.md +++ b/openapi-specs/cwpp/desc/settings/registry_post.md @@ -30,7 +30,7 @@ The API response returns an HTTP 400 error if the number of registry specificati Refer to the following example cURL command that configures Prisma Cloud Compute to scan the Ubuntu 16.04 repository on Docker Hub: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -64,7 +64,7 @@ To add settings for a GitLab Container Registry, you must specify the following Refer to the following example cURL command: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/settings/registry_put.md b/openapi-specs/cwpp/desc/settings/registry_put.md index 3768914f6..75d6c79a2 100644 --- a/openapi-specs/cwpp/desc/settings/registry_put.md +++ b/openapi-specs/cwpp/desc/settings/registry_put.md @@ -127,7 +127,7 @@ To remove a registry from the list: To delete all entries, submit an empty `specifications` array. For example: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/cwpp/desc/settings/saml_get.md b/openapi-specs/cwpp/desc/settings/saml_get.md index f2228a440..4fb940e80 100644 --- a/openapi-specs/cwpp/desc/settings/saml_get.md +++ b/openapi-specs/cwpp/desc/settings/saml_get.md @@ -5,7 +5,7 @@ Returns the configured SAML settings that is used to authenticate to the Prisma Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/settings/saml_post.md b/openapi-specs/cwpp/desc/settings/saml_post.md index 0bd9c4a25..dfe8d380f 100644 --- a/openapi-specs/cwpp/desc/settings/saml_post.md +++ b/openapi-specs/cwpp/desc/settings/saml_post.md @@ -7,7 +7,7 @@ For more information, see [Okta via SAML 2.0](https://docs.paloaltonetworks.com/ Refer to the following example cURL request that uses the basic auth to set up and enable the SAML integration with Prisma Cloud Compute: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/settings/scan_get.md b/openapi-specs/cwpp/desc/settings/scan_get.md index 5c1df30a2..543ea7662 100644 --- a/openapi-specs/cwpp/desc/settings/scan_get.md +++ b/openapi-specs/cwpp/desc/settings/scan_get.md @@ -5,7 +5,7 @@ Returns the global settings for image, host, container, and registry scanning. Refer to the following example cURL request: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/settings/scan_post.md b/openapi-specs/cwpp/desc/settings/scan_post.md index f043d1c9f..9ddb521a2 100644 --- a/openapi-specs/cwpp/desc/settings/scan_post.md +++ b/openapi-specs/cwpp/desc/settings/scan_post.md @@ -9,7 +9,7 @@ Refer to the following example cURL request that configures the following scan i * Scan images, containers, and hosts once per day. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/settings/secrets_get.md b/openapi-specs/cwpp/desc/settings/secrets_get.md index 75e2b32c7..339009641 100644 --- a/openapi-specs/cwpp/desc/settings/secrets_get.md +++ b/openapi-specs/cwpp/desc/settings/secrets_get.md @@ -3,7 +3,7 @@ This endpoint will return configured secret store already configured in the cons The following example curl command retrieves any configured secret stores, as well as the refresh period in hours: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/settings/secrets_post.md b/openapi-specs/cwpp/desc/settings/secrets_post.md index d302ecdf8..730d031bf 100644 --- a/openapi-specs/cwpp/desc/settings/secrets_post.md +++ b/openapi-specs/cwpp/desc/settings/secrets_post.md @@ -5,7 +5,7 @@ Please note the data structure returned from endpoint /settings/secrets GET to s Refer to the following example curl command that adds a CyberArk secret store to the console with the appID set to `Prisma_Cloud_Compute_Console` and set the URL to `https://services-myca.twistlock.com:10882`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/settings/serverless-scan_get.md b/openapi-specs/cwpp/desc/settings/serverless-scan_get.md index bb8ce06ba..eb42e4a12 100644 --- a/openapi-specs/cwpp/desc/settings/serverless-scan_get.md +++ b/openapi-specs/cwpp/desc/settings/serverless-scan_get.md @@ -8,7 +8,7 @@ This endpoint maps to the **Function scope** table data in the **Defend > Vulner Refer to the following example cURL command that retrieves a list of serverless scan scopes: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/settings/serverless_get.md b/openapi-specs/cwpp/desc/settings/serverless_get.md index b6122c460..8c654807c 100644 --- a/openapi-specs/cwpp/desc/settings/serverless_get.md +++ b/openapi-specs/cwpp/desc/settings/serverless_get.md @@ -3,7 +3,7 @@ This endpoint will return any configured serverless function scanners found in * The following example curl command uses basic auth to retrieve serverless settings in an array, sorted by Cloud Provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/settings/serverless_post.md b/openapi-specs/cwpp/desc/settings/serverless_post.md index 6e26ea1d3..c0e0f3225 100644 --- a/openapi-specs/cwpp/desc/settings/serverless_post.md +++ b/openapi-specs/cwpp/desc/settings/serverless_post.md @@ -3,7 +3,7 @@ This endpoint will add serverless function providers to scan for vulnerabilities The following example curl command uses basic auth to add a serverless account to scan for serverless functions. This is assuming that you already have the [credential](https://docs.twistlock.com/docs/latest/configure/credentials_store.html) added to the console that is needed to scan that provider: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/settings/system_get.md b/openapi-specs/cwpp/desc/settings/system_get.md index 6f893abf0..0e8a3cba3 100644 --- a/openapi-specs/cwpp/desc/settings/system_get.md +++ b/openapi-specs/cwpp/desc/settings/system_get.md @@ -3,7 +3,7 @@ This endpoint will return all system settings in JSON format. The following example curl command does exactly that: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/settings/tas_get.md b/openapi-specs/cwpp/desc/settings/tas_get.md index 52f392433..d2d0017f0 100644 --- a/openapi-specs/cwpp/desc/settings/tas_get.md +++ b/openapi-specs/cwpp/desc/settings/tas_get.md @@ -5,7 +5,7 @@ Retrieves Tanzu Application Service (TAS) settings. Refer to the following example cURL command that retrieves all TAS settings: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/settings/telemetry_get.md b/openapi-specs/cwpp/desc/settings/telemetry_get.md index 6460c3fc3..46a807e77 100644 --- a/openapi-specs/cwpp/desc/settings/telemetry_get.md +++ b/openapi-specs/cwpp/desc/settings/telemetry_get.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that retrieves the settings if telemetry is enabled or not: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/settings/telemetry_post.md b/openapi-specs/cwpp/desc/settings/telemetry_post.md index bc97a6d0f..662846f33 100644 --- a/openapi-specs/cwpp/desc/settings/telemetry_post.md +++ b/openapi-specs/cwpp/desc/settings/telemetry_post.md @@ -7,7 +7,7 @@ For more information, see [telemetry](https://docs.paloaltonetworks.com/prisma/p Refer to the following example cURL request that uses basic auth to turn off telemetry: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/settings/trusted_certificate_post.md b/openapi-specs/cwpp/desc/settings/trusted_certificate_post.md index 5a2a30bda..c54b96fa5 100644 --- a/openapi-specs/cwpp/desc/settings/trusted_certificate_post.md +++ b/openapi-specs/cwpp/desc/settings/trusted_certificate_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/trusted-certificates` endpoint. Refer to the following example cURL request that uses basic auth to add a certificate to the list: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/cwpp/desc/settings/trusted_certificates_post.md b/openapi-specs/cwpp/desc/settings/trusted_certificates_post.md index 78c07982b..e9bdc72a1 100644 --- a/openapi-specs/cwpp/desc/settings/trusted_certificates_post.md +++ b/openapi-specs/cwpp/desc/settings/trusted_certificates_post.md @@ -11,7 +11,7 @@ For more information, see the `/settings/certificates` endpoint. Refer to the following example cURL request that uses basic auth to enable this feature: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -w "\nResponse code: %{http_code}\n" \ diff --git a/openapi-specs/cwpp/desc/settings/vm_get.md b/openapi-specs/cwpp/desc/settings/vm_get.md index 8043742f5..b98b94240 100644 --- a/openapi-specs/cwpp/desc/settings/vm_get.md +++ b/openapi-specs/cwpp/desc/settings/vm_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **VM images scope** table data in the **Defend > Vulne Refer to the following example cURL command that retrieves all the scopes used for pattern matching on VM functions: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/signup/post.md b/openapi-specs/cwpp/desc/signup/post.md index 1db21df29..67344a0b1 100644 --- a/openapi-specs/cwpp/desc/signup/post.md +++ b/openapi-specs/cwpp/desc/signup/post.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i The following cURL command creates the initial admin user with the username `admin` and password `password`. ```bash -$ curl -k \ +$ curl \ -H 'Content-Type: application/json' \ -X POST \ -d '{"username": "admin", "password": "password"}' \ diff --git a/openapi-specs/cwpp/desc/static/capabilities_get.md b/openapi-specs/cwpp/desc/static/capabilities_get.md index ea119d2a9..f9b60278c 100644 --- a/openapi-specs/cwpp/desc/static/capabilities_get.md +++ b/openapi-specs/cwpp/desc/static/capabilities_get.md @@ -1,7 +1,7 @@ Returns a list of capabilities used in host models. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/static/regions_get.md b/openapi-specs/cwpp/desc/static/regions_get.md index 4a07097ee..3b1adb5f1 100644 --- a/openapi-specs/cwpp/desc/static/regions_get.md +++ b/openapi-specs/cwpp/desc/static/regions_get.md @@ -1,7 +1,7 @@ Returns a list of regions used in cloud radar. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/static/syscalls_get.md b/openapi-specs/cwpp/desc/static/syscalls_get.md index 9e2ddcde7..09505ba39 100644 --- a/openapi-specs/cwpp/desc/static/syscalls_get.md +++ b/openapi-specs/cwpp/desc/static/syscalls_get.md @@ -2,7 +2,7 @@ Returns a list of the Linux kernel system calls. Runtime rules for containers can allow-list and deny-list specific system calls. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/static/vulnerabilities_get.md b/openapi-specs/cwpp/desc/static/vulnerabilities_get.md index cb6acab28..19809472b 100644 --- a/openapi-specs/cwpp/desc/static/vulnerabilities_get.md +++ b/openapi-specs/cwpp/desc/static/vulnerabilities_get.md @@ -3,7 +3,7 @@ This data can be used for building out reports with the API. This data can be correlated with the `/api/v1/images` endpoint, specifically the the `complianceVulnerabilities` and `cveVulnerabilities` objects, to generate more thorough reports. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/stats/compliance.md b/openapi-specs/cwpp/desc/stats/compliance.md index 5c5be3991..4f4c90071 100644 --- a/openapi-specs/cwpp/desc/stats/compliance.md +++ b/openapi-specs/cwpp/desc/stats/compliance.md @@ -5,7 +5,7 @@ For the current day, the response will also include detailed compliance stats fo The following example command that uses curl and basic auth to retrieve compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/stats/compliance_get.md b/openapi-specs/cwpp/desc/stats/compliance_get.md index 314f6a179..2ef2f9f75 100644 --- a/openapi-specs/cwpp/desc/stats/compliance_get.md +++ b/openapi-specs/cwpp/desc/stats/compliance_get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Compliance > Compliance explorer* Refer to the following example cURL command that retrieves compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/stats/compliance_refresh.md b/openapi-specs/cwpp/desc/stats/compliance_refresh.md index b75491a69..d8ce211a8 100644 --- a/openapi-specs/cwpp/desc/stats/compliance_refresh.md +++ b/openapi-specs/cwpp/desc/stats/compliance_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/compliance endpoint return The following example command that uses curl and basic auth to refresh compliance statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/stats/compliance_refresh_post.md b/openapi-specs/cwpp/desc/stats/compliance_refresh_post.md index 541a54d16..0f329d1db 100644 --- a/openapi-specs/cwpp/desc/stats/compliance_refresh_post.md +++ b/openapi-specs/cwpp/desc/stats/compliance_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/compliance`, b Refer to the following example cURL command that refreshes compliance statistics for the current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/stats/daily.md b/openapi-specs/cwpp/desc/stats/daily.md index 082f58a27..9fd4c6138 100644 --- a/openapi-specs/cwpp/desc/stats/daily.md +++ b/openapi-specs/cwpp/desc/stats/daily.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/stats/daily_get.md b/openapi-specs/cwpp/desc/stats/daily_get.md index 0db89bdc3..fe852126c 100644 --- a/openapi-specs/cwpp/desc/stats/daily_get.md +++ b/openapi-specs/cwpp/desc/stats/daily_get.md @@ -3,7 +3,7 @@ Returns a historical list of per-day statistics for the resources protected by P The following example command uses curl and basic auth to retrieve the daily stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/stats/dashboard.md b/openapi-specs/cwpp/desc/stats/dashboard.md index be90a2d32..1e5fabf08 100644 --- a/openapi-specs/cwpp/desc/stats/dashboard.md +++ b/openapi-specs/cwpp/desc/stats/dashboard.md @@ -3,7 +3,7 @@ Returns daily statistics about the resources protected by Prisma Cloud Compute, The following example command that uses curl and basic auth to retrieve dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/stats/dashboard_get.md b/openapi-specs/cwpp/desc/stats/dashboard_get.md index 601769645..8f0bc827c 100644 --- a/openapi-specs/cwpp/desc/stats/dashboard_get.md +++ b/openapi-specs/cwpp/desc/stats/dashboard_get.md @@ -5,7 +5,7 @@ Returns statistics about the resources protected by Prisma Cloud Compute, includ Refer to the following example cURL command that retrieves dashboard stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/stats/events_get.md b/openapi-specs/cwpp/desc/stats/events_get.md index 3be5eb4e7..e64f98e57 100644 --- a/openapi-specs/cwpp/desc/stats/events_get.md +++ b/openapi-specs/cwpp/desc/stats/events_get.md @@ -5,7 +5,7 @@ Returns events statistics for your environment. Refer to the following example cURL command retrieves event stats: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/stats/vulnerabilities.md b/openapi-specs/cwpp/desc/stats/vulnerabilities.md index 40c4dd1f1..199cfab62 100644 --- a/openapi-specs/cwpp/desc/stats/vulnerabilities.md +++ b/openapi-specs/cwpp/desc/stats/vulnerabilities.md @@ -5,7 +5,7 @@ For the current day, the response will also include descriptions of the CVEs cur The following example command that uses curl and basic auth to retrieve vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/stats/vulnerabilities_download_get.md b/openapi-specs/cwpp/desc/stats/vulnerabilities_download_get.md index 753af8c7f..9930a636b 100644 --- a/openapi-specs/cwpp/desc/stats/vulnerabilities_download_get.md +++ b/openapi-specs/cwpp/desc/stats/vulnerabilities_download_get.md @@ -17,7 +17,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a summary count of the CVEs and detailed descriptions for each CVE in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/stats/vulnerabilities_get.md b/openapi-specs/cwpp/desc/stats/vulnerabilities_get.md index 2fe5d4e18..978e96cfe 100644 --- a/openapi-specs/cwpp/desc/stats/vulnerabilities_get.md +++ b/openapi-specs/cwpp/desc/stats/vulnerabilities_get.md @@ -20,7 +20,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a summary count of the CVEs and detailed descriptions for each CVE: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/stats/vulnerabilities_impacted_resources_download_get.md b/openapi-specs/cwpp/desc/stats/vulnerabilities_impacted_resources_download_get.md index 0821d6a9f..502c09a6c 100644 --- a/openapi-specs/cwpp/desc/stats/vulnerabilities_impacted_resources_download_get.md +++ b/openapi-specs/cwpp/desc/stats/vulnerabilities_impacted_resources_download_get.md @@ -15,7 +15,7 @@ Consider the following observations: Refer to the following example cURL command that downloads a list of impacted resources for `CVE-2015-0313` in a CSV format: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/stats/vulnerabilities_impacted_resources_get.md b/openapi-specs/cwpp/desc/stats/vulnerabilities_impacted_resources_get.md index c1e6d0ba2..014a5f4a2 100644 --- a/openapi-specs/cwpp/desc/stats/vulnerabilities_impacted_resources_get.md +++ b/openapi-specs/cwpp/desc/stats/vulnerabilities_impacted_resources_get.md @@ -18,7 +18,7 @@ Consider the following observations: Refer to the following example cURL command that retrieves a list of impacted resources for `CVE-2022-28391`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -95,7 +95,7 @@ Refer to the following example JSON response that shows the risk tree for the im Refer to the following example cURL command that retrieves a the impacted registry images `CVE-2015-0313` by using an optional query parameter `resourceType`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ @@ -108,7 +108,7 @@ $ curl -k \ Refer to the following example cURL command that retrieves a paginated list of impacted resources for `CVE-2015-0313` by using optional query parameters `limit` and `offset`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/stats/vulnerabilities_refresh.md b/openapi-specs/cwpp/desc/stats/vulnerabilities_refresh.md index 505a99d98..2aa7da8a1 100644 --- a/openapi-specs/cwpp/desc/stats/vulnerabilities_refresh.md +++ b/openapi-specs/cwpp/desc/stats/vulnerabilities_refresh.md @@ -5,7 +5,7 @@ The response will return exactly what the /statistics/vulnerabilities endpoint r The following example command that uses curl and basic auth to refresh vulnerability statistics: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/stats/vulnerabilities_refresh_post.md b/openapi-specs/cwpp/desc/stats/vulnerabilities_refresh_post.md index 1e3210e18..85e3ddd7a 100644 --- a/openapi-specs/cwpp/desc/stats/vulnerabilities_refresh_post.md +++ b/openapi-specs/cwpp/desc/stats/vulnerabilities_refresh_post.md @@ -7,7 +7,7 @@ This endpoint returns the same response as `/api/v/stats/vulnerabilitie Refer to the following example cURL command that refreshes the vulnerability statistics for current day: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/stats/workload_get.md b/openapi-specs/cwpp/desc/stats/workload_get.md index a25deed5c..940a835ee 100644 --- a/openapi-specs/cwpp/desc/stats/workload_get.md +++ b/openapi-specs/cwpp/desc/stats/workload_get.md @@ -1,7 +1,7 @@ Returns the workload statistics from Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/statuses/intelligence.md b/openapi-specs/cwpp/desc/statuses/intelligence.md index 74da8c7ff..ac102e81f 100644 --- a/openapi-specs/cwpp/desc/statuses/intelligence.md +++ b/openapi-specs/cwpp/desc/statuses/intelligence.md @@ -3,7 +3,7 @@ Returns the connection status of the intelligence stream and the last intelligen The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/statuses/intelligence_get.md b/openapi-specs/cwpp/desc/statuses/intelligence_get.md index c18dd9611..b5f620ad9 100644 --- a/openapi-specs/cwpp/desc/statuses/intelligence_get.md +++ b/openapi-specs/cwpp/desc/statuses/intelligence_get.md @@ -3,7 +3,7 @@ Returns the connection status for the Intelligence Stream, along with the time o The following is an example curl using basic auth to find the intelligence stream status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/statuses/registry_get.md b/openapi-specs/cwpp/desc/statuses/registry_get.md index 427c4915c..e4fd09fe9 100644 --- a/openapi-specs/cwpp/desc/statuses/registry_get.md +++ b/openapi-specs/cwpp/desc/statuses/registry_get.md @@ -13,7 +13,7 @@ To view the more details about the progress of a regular or on-demand registry s Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/statuses/secrets_get.md b/openapi-specs/cwpp/desc/statuses/secrets_get.md index 510f15161..e77c5ed70 100644 --- a/openapi-specs/cwpp/desc/statuses/secrets_get.md +++ b/openapi-specs/cwpp/desc/statuses/secrets_get.md @@ -3,7 +3,7 @@ Returns the connection status of any secret stores you have configured, as well The following is an example curl using basic auth to find the secret store status: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/statuses/serverless-radar_get.md b/openapi-specs/cwpp/desc/statuses/serverless-radar_get.md index 3bfdbb5bf..4ab5d0c1d 100644 --- a/openapi-specs/cwpp/desc/statuses/serverless-radar_get.md +++ b/openapi-specs/cwpp/desc/statuses/serverless-radar_get.md @@ -1,7 +1,7 @@ Returns the status of the serverless scans. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/tags/get.md b/openapi-specs/cwpp/desc/tags/get.md index 6da7ad135..604eee98e 100644 --- a/openapi-specs/cwpp/desc/tags/get.md +++ b/openapi-specs/cwpp/desc/tags/get.md @@ -5,7 +5,7 @@ Retrieves a list of tags. Refer to the following example cURL command that retrieves a list of tags: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/tags/name_delete.md b/openapi-specs/cwpp/desc/tags/name_delete.md index 2ed010e57..6dedfce8f 100644 --- a/openapi-specs/cwpp/desc/tags/name_delete.md +++ b/openapi-specs/cwpp/desc/tags/name_delete.md @@ -5,7 +5,7 @@ Deletes a tag from the system. Refer to the following example cURL command that deletes a tag named *my tag*: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/cwpp/desc/tags/name_put.md b/openapi-specs/cwpp/desc/tags/name_put.md index cbaea40d3..a5923b8ef 100644 --- a/openapi-specs/cwpp/desc/tags/name_put.md +++ b/openapi-specs/cwpp/desc/tags/name_put.md @@ -9,7 +9,7 @@ You must define all parameters in your PUT request. Refer to the following example cURL command that updates the parameters in a tag named `my_tag`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/cwpp/desc/tags/post.md b/openapi-specs/cwpp/desc/tags/post.md index d55ae8b96..8e1a493d6 100644 --- a/openapi-specs/cwpp/desc/tags/post.md +++ b/openapi-specs/cwpp/desc/tags/post.md @@ -8,7 +8,7 @@ You can use tags as policy exceptions or assign them to vulnerabilities for acti Refer to the following example cURL command that creates a tag named "my-tag": ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/tags/tag_cve_delete.md b/openapi-specs/cwpp/desc/tags/tag_cve_delete.md index 8caed79cf..3031029b9 100644 --- a/openapi-specs/cwpp/desc/tags/tag_cve_delete.md +++ b/openapi-specs/cwpp/desc/tags/tag_cve_delete.md @@ -6,7 +6,7 @@ When you delete a tag, the tag is deleted from a wider scope. All the packages a Refer to the following example cURL command that removes the tag named `ignored` from the CVE `CVE-2017-15088`: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/cwpp/desc/tags/tag_cve_post.md b/openapi-specs/cwpp/desc/tags/tag_cve_post.md index 966a80bd8..1b4ead89b 100644 --- a/openapi-specs/cwpp/desc/tags/tag_cve_post.md +++ b/openapi-specs/cwpp/desc/tags/tag_cve_post.md @@ -45,7 +45,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the source package `perl`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -72,7 +72,7 @@ Consider the following scenarios for source and binary packages: Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2021-20305` on the binary package `gnutls`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -98,7 +98,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156`: ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -120,7 +120,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `image` and to all the packages and resources. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -140,7 +140,7 @@ Consider the following scenarios when you want to tag a vulnerability to all pac Refer to the following example cURL command that tags `Ignored` to the CVE `CVE-2020-16156` on the resource type `host`, resource `servo-vmware71`, and to all the packages. ```bash - $ curl -k \ + $ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/tas-droplets/download_get.md b/openapi-specs/cwpp/desc/tas-droplets/download_get.md index db92ec66a..7fdd6e259 100644 --- a/openapi-specs/cwpp/desc/tas-droplets/download_get.md +++ b/openapi-specs/cwpp/desc/tas-droplets/download_get.md @@ -9,7 +9,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo The following cURL command downloads all TAS droplets to a CSV file called `tas_droplets.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/tas-droplets/get.md b/openapi-specs/cwpp/desc/tas-droplets/get.md index d820517c2..ce07f8527 100644 --- a/openapi-specs/cwpp/desc/tas-droplets/get.md +++ b/openapi-specs/cwpp/desc/tas-droplets/get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > VMware Tanzu bl The following cURL command retrieves all TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/tas-droplets/get_tas_addresses.md b/openapi-specs/cwpp/desc/tas-droplets/get_tas_addresses.md index 528281613..8333cd24f 100644 --- a/openapi-specs/cwpp/desc/tas-droplets/get_tas_addresses.md +++ b/openapi-specs/cwpp/desc/tas-droplets/get_tas_addresses.md @@ -9,7 +9,7 @@ Gets the Cloud Controller Addresses of scanned Tanzu Application Service (TAS) d The following cURL command retrieves the Cloud Controller Addresses of scanned TAS droplets. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/tas-droplets/progress_get.md b/openapi-specs/cwpp/desc/tas-droplets/progress_get.md index 504a21e84..507d001bf 100644 --- a/openapi-specs/cwpp/desc/tas-droplets/progress_get.md +++ b/openapi-specs/cwpp/desc/tas-droplets/progress_get.md @@ -5,7 +5,7 @@ Returns the details of the TAS Droplets ongoing scan. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/tas-droplets/scan_post.md b/openapi-specs/cwpp/desc/tas-droplets/scan_post.md index aad2174af..13c4eeeb9 100644 --- a/openapi-specs/cwpp/desc/tas-droplets/scan_post.md +++ b/openapi-specs/cwpp/desc/tas-droplets/scan_post.md @@ -5,7 +5,7 @@ Scans the TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/tas-droplets/stop_post.md b/openapi-specs/cwpp/desc/tas-droplets/stop_post.md index 5f5a019b1..53d709ec7 100644 --- a/openapi-specs/cwpp/desc/tas-droplets/stop_post.md +++ b/openapi-specs/cwpp/desc/tas-droplets/stop_post.md @@ -5,7 +5,7 @@ Stops the ongoing scan of TAS Droplets. Refer to the following cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/trust/data_get.md b/openapi-specs/cwpp/desc/trust/data_get.md index dd55d47a3..88983f139 100644 --- a/openapi-specs/cwpp/desc/trust/data_get.md +++ b/openapi-specs/cwpp/desc/trust/data_get.md @@ -5,7 +5,7 @@ Returns the trusted registries, repositories, and images. Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/trust/data_put.md b/openapi-specs/cwpp/desc/trust/data_put.md index 0e6a0ba49..733514505 100644 --- a/openapi-specs/cwpp/desc/trust/data_put.md +++ b/openapi-specs/cwpp/desc/trust/data_put.md @@ -6,7 +6,7 @@ Specify trusted images using either the image name or layers properties. Refer to the following example cURL command that uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ @@ -19,7 +19,7 @@ To edit a trust group based on image base layers, use PUT to specify a list of S Refer to the following example that specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/cwpp/desc/trust/get.md b/openapi-specs/cwpp/desc/trust/get.md index 1226cd0a3..57ff5bdb5 100644 --- a/openapi-specs/cwpp/desc/trust/get.md +++ b/openapi-specs/cwpp/desc/trust/get.md @@ -3,7 +3,7 @@ Retrieves a list of all trusted images. The following example curl command uses basic auth to retrieve all trusted images: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/trust/id_delete.md b/openapi-specs/cwpp/desc/trust/id_delete.md index b3114775f..d63cdf71a 100644 --- a/openapi-specs/cwpp/desc/trust/id_delete.md +++ b/openapi-specs/cwpp/desc/trust/id_delete.md @@ -4,7 +4,7 @@ The following example curl command uses basic auth to specify a image trust grou ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/cwpp/desc/trust/id_put.md b/openapi-specs/cwpp/desc/trust/id_put.md index 44d2c8b8b..c98617bcd 100644 --- a/openapi-specs/cwpp/desc/trust/id_put.md +++ b/openapi-specs/cwpp/desc/trust/id_put.md @@ -9,7 +9,7 @@ For more information about handles, see the `_id` in the response body for the G The following example curl command uses basic auth to modify the image property for an existing trusted image entry, where the handle for the entry is `docker-ubuntu-group`. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X PUT \ diff --git a/openapi-specs/cwpp/desc/trust/learn_get.md b/openapi-specs/cwpp/desc/trust/learn_get.md index d8a3414d0..004b16b02 100644 --- a/openapi-specs/cwpp/desc/trust/learn_get.md +++ b/openapi-specs/cwpp/desc/trust/learn_get.md @@ -1,7 +1,7 @@ Returns the state of the trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/trust/learn_post.md b/openapi-specs/cwpp/desc/trust/learn_post.md index 094817738..008657fa2 100644 --- a/openapi-specs/cwpp/desc/trust/learn_post.md +++ b/openapi-specs/cwpp/desc/trust/learn_post.md @@ -1,7 +1,7 @@ Sets the state of trusted images model. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/trust/post.md b/openapi-specs/cwpp/desc/trust/post.md index 1072275a1..23a324c6c 100644 --- a/openapi-specs/cwpp/desc/trust/post.md +++ b/openapi-specs/cwpp/desc/trust/post.md @@ -7,7 +7,7 @@ For more information about handles, see the `_id` key in the response body for t The following example curl command uses basic auth to specify that the Ubuntu 16.04 image on Docker Hub is a trusted image. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ @@ -19,7 +19,7 @@ To create a trust group based on image base layers, POST a list of SHA256 hashes The following example specifies the Ubuntu 16.04 image is a trusted base OS. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/users/get.md b/openapi-specs/cwpp/desc/users/get.md index e4e6966ec..cd5a661ba 100644 --- a/openapi-specs/cwpp/desc/users/get.md +++ b/openapi-specs/cwpp/desc/users/get.md @@ -7,7 +7,7 @@ This endpoint maps to **Manage > Authentication > Users** in the Console UI. The following cURL command retrieves all users. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/users/id_delete.md b/openapi-specs/cwpp/desc/users/id_delete.md index 1cfa5642d..66a1102f9 100644 --- a/openapi-specs/cwpp/desc/users/id_delete.md +++ b/openapi-specs/cwpp/desc/users/id_delete.md @@ -17,7 +17,7 @@ To invoke this endpoint in the Console UI: The following cURL command deletes user `ID` from the system. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X DELETE \ diff --git a/openapi-specs/cwpp/desc/util/osx_twistcli_arm64_get.md b/openapi-specs/cwpp/desc/util/osx_twistcli_arm64_get.md index b385d0d3b..a30686374 100644 --- a/openapi-specs/cwpp/desc/util/osx_twistcli_arm64_get.md +++ b/openapi-specs/cwpp/desc/util/osx_twistcli_arm64_get.md @@ -7,7 +7,7 @@ Downloads the twistcli binary executable for MacOS platforms based on ARM64 arch Refer to the following example cURL command that downloads and saves the “twistcli” binary executable for ARM64 bit MacOS platforms to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/cwpp/desc/util/osx_twistcli_get.md b/openapi-specs/cwpp/desc/util/osx_twistcli_get.md index c49f96c41..2353ea338 100644 --- a/openapi-specs/cwpp/desc/util/osx_twistcli_get.md +++ b/openapi-specs/cwpp/desc/util/osx_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **MacOS platform** hyperlink in **Manage > System > Ut The following cURL command downloads the twistcli binary executable for MacOS platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli \ diff --git a/openapi-specs/cwpp/desc/util/twistcli_arm64_get.md b/openapi-specs/cwpp/desc/util/twistcli_arm64_get.md index 7ec36d3f5..a3d7318ab 100644 --- a/openapi-specs/cwpp/desc/util/twistcli_arm64_get.md +++ b/openapi-specs/cwpp/desc/util/twistcli_arm64_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET -o \ diff --git a/openapi-specs/cwpp/desc/util/twistcli_get.md b/openapi-specs/cwpp/desc/util/twistcli_get.md index f9d2d295c..08a3ae8aa 100644 --- a/openapi-specs/cwpp/desc/util/twistcli_get.md +++ b/openapi-specs/cwpp/desc/util/twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Linux platform** hyperlink in **Manage > System > Ut Refer to the following example cURL command that downloads and saves the “twistcli” binary executable to your HOME directory: ```bash -$ curl -k \ +$ curl \ -u \ -X GET -o \ 'https:///api/v/util/twistcli' diff --git a/openapi-specs/cwpp/desc/util/twistlock_jenkins_plugin_get.md b/openapi-specs/cwpp/desc/util/twistlock_jenkins_plugin_get.md index 9fb8d4a02..c9f180e5e 100644 --- a/openapi-specs/cwpp/desc/util/twistlock_jenkins_plugin_get.md +++ b/openapi-specs/cwpp/desc/util/twistlock_jenkins_plugin_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-jenkins-plugin.hpi \ diff --git a/openapi-specs/cwpp/desc/util/twistlock_tas_tile_get.md b/openapi-specs/cwpp/desc/util/twistlock_tas_tile_get.md index fea28aaad..3fd114e2d 100644 --- a/openapi-specs/cwpp/desc/util/twistlock_tas_tile_get.md +++ b/openapi-specs/cwpp/desc/util/twistlock_tas_tile_get.md @@ -7,7 +7,7 @@ Although this endpoint is supported, no backwards compatibility is offered for i Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistlock-tile.pivotal \ diff --git a/openapi-specs/cwpp/desc/util/windows_twistcli_get.md b/openapi-specs/cwpp/desc/util/windows_twistcli_get.md index 1c545dbbb..38c609b08 100644 --- a/openapi-specs/cwpp/desc/util/windows_twistcli_get.md +++ b/openapi-specs/cwpp/desc/util/windows_twistcli_get.md @@ -7,7 +7,7 @@ This endpoint maps to the **Windows platform** hyperlink in **Manage > System > The following cURL command downloads the twistcli binary executable for Windows platforms. ```bash -$ curl -k \ +$ curl \ -u \ -L \ -o twistcli.exe \ diff --git a/openapi-specs/cwpp/desc/version/get.md b/openapi-specs/cwpp/desc/version/get.md index 28be315e0..5787e90fd 100644 --- a/openapi-specs/cwpp/desc/version/get.md +++ b/openapi-specs/cwpp/desc/version/get.md @@ -5,7 +5,7 @@ Retrieves the version number for Console. The following cURL command retrieves the version number for Console. ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/vms/download_get.md b/openapi-specs/cwpp/desc/vms/download_get.md index e65e4efc9..3cc813bc5 100644 --- a/openapi-specs/cwpp/desc/vms/download_get.md +++ b/openapi-specs/cwpp/desc/vms/download_get.md @@ -7,7 +7,7 @@ Returns all VM image scan reports in CSV format. Refer to the following example cURL command that retrieves all VM image scan reports and saves the results in a CSV file called `vm_images_scan.csv`: ```bash -curl -k \ +curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/vms/get.md b/openapi-specs/cwpp/desc/vms/get.md index e78a28c76..03ed8deb3 100644 --- a/openapi-specs/cwpp/desc/vms/get.md +++ b/openapi-specs/cwpp/desc/vms/get.md @@ -11,7 +11,7 @@ This endpoint maps to the table in **Monitor > Vulnerabilities > Hosts > VM imag Refer to the following example cURL command that retrieves all VM image scan reports: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/vms/labels_get.md b/openapi-specs/cwpp/desc/vms/labels_get.md index 0aed1a217..f509da479 100644 --- a/openapi-specs/cwpp/desc/vms/labels_get.md +++ b/openapi-specs/cwpp/desc/vms/labels_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -u \ -H 'Content-Type: application/json' \ -X GET \ diff --git a/openapi-specs/cwpp/desc/vms/names_get.md b/openapi-specs/cwpp/desc/vms/names_get.md index 1145cfa0d..9f92e0156 100644 --- a/openapi-specs/cwpp/desc/vms/names_get.md +++ b/openapi-specs/cwpp/desc/vms/names_get.md @@ -7,7 +7,7 @@ _**Note:**_ The query parameters `issueType` is not supported for this API endpo Refer to the following example cURL command: ```bash -$ curl -k \ +$ curl \ -X GET \ -u \ -H 'Content-Type: application/json' \ diff --git a/openapi-specs/cwpp/desc/vms/scan_post.md b/openapi-specs/cwpp/desc/vms/scan_post.md index 1caa2dcaf..4d4de3ab1 100644 --- a/openapi-specs/cwpp/desc/vms/scan_post.md +++ b/openapi-specs/cwpp/desc/vms/scan_post.md @@ -5,7 +5,7 @@ Re-scans all VM images immediately. This endpoint returns the time that the scan Refer to the following example cURL command that forces Prisma Cloud to re-scan all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \ diff --git a/openapi-specs/cwpp/desc/vms/stop_post.md b/openapi-specs/cwpp/desc/vms/stop_post.md index 4a74743eb..49b2b26f9 100644 --- a/openapi-specs/cwpp/desc/vms/stop_post.md +++ b/openapi-specs/cwpp/desc/vms/stop_post.md @@ -7,7 +7,7 @@ Note: It might take a few minutes for the scan to stop completely. Refer to the following example cURL command that forces Prisma Cloud to stop scanning all VM images: ```bash -$ curl -k \ +$ curl \ -u \ H 'Content-Type: application/json' \ -X POST \