diff --git a/docs/api-generated/README.md b/docs/api-generated/README.md index 6eda1a4d2e9f1..3f453ea7a02af 100644 --- a/docs/api-generated/README.md +++ b/docs/api-generated/README.md @@ -14,6 +14,8 @@ or a similar tool that can generate HTML output from OAS. . Generate HTML output. For example: ``` + openapi-generator-cli generate -g html -i $GIT_HOME/kibana/x-pack/plugins/alerting/docs/openapi/bundled.yaml -o $GIT_HOME/kibana/docs/api-generated/rules -t $GIT_HOME/kibana/docs/api-generated/template + openapi-generator-cli generate -g html -i $GIT_HOME/kibana/x-pack/plugins/cases/docs/openapi/bundled.yaml -o $GIT_HOME/kibana/docs/api-generated/cases -t $GIT_HOME/kibana/docs/api-generated/template openapi-generator-cli generate -g html -i $GIT_HOME/kibana/x-pack/plugins/actions/docs/openapi/bundled.yaml -o $GIT_HOME/kibana/docs/api-generated/connectors -t $GIT_HOME/kibana/docs/api-generated/template @@ -23,6 +25,7 @@ or a similar tool that can generate HTML output from OAS. . Rename the output files. For example: ``` + mv $GIT_HOME/kibana/docs/api-generated/rules/index.html $GIT_HOME/kibana/docs/api-generated/rules/rule-apis-passthru.asciidoc mv $GIT_HOME/kibana/docs/api-generated/cases/index.html $GIT_HOME/kibana/docs/api-generated/cases/case-apis-passthru.asciidoc mv $GIT_HOME/kibana/docs/api-generated/connectors/index.html $GIT_HOME/kibana/docs/api-generated/connectors/connector-apis-passthru.asciidoc mv $GIT_HOME/kibana/docs/api-generated/machine-learning/index.html $GIT_HOME/kibana/docs/api-generated/machine-learning/ml-apis-passthru.adoc diff --git a/docs/api-generated/rules/rule-apis-passthru.asciidoc b/docs/api-generated/rules/rule-apis-passthru.asciidoc new file mode 100644 index 0000000000000..2b193c2c20201 --- /dev/null +++ b/docs/api-generated/rules/rule-apis-passthru.asciidoc @@ -0,0 +1,321 @@ +//// +This content is generated from the open API specification. +Any modifications made to this file will be overwritten. +//// + +++++ +
get /s/{spaceId}/api/alerting/rules/_findread privileges for the appropriate Kibana features, depending on the consumer and rule_type_id of the rules you're seeking. For example, you must have privileges for the Management > Stack rules feature, Analytics > Discover and Machine Learning features, Observability features, or Security features. To find rules associated with the Stack Monitoring feature, use the monitoring_user built-in role./s/ and the identifier are omitted from the path, the default space is used. default: null attributes key of the response. default: null savedObjectType.attributes.title: "myTitle". However, if you used a direct attribute of a saved object, such as updatedAt, you must define your filter, for example, savedObjectType.updatedAt > 2018-12-22. default: null attributes key of the response. default: null {
+ "per_page" : 2,
+ "total" : 7,
+ "data" : [ {
+ "throttle" : "10m",
+ "created_at" : "2022-12-05T23:36:58.284Z",
+ "last_run" : {
+ "alerts_count" : {
+ "new" : 0,
+ "ignored" : 6,
+ "recovered" : 1,
+ "active" : 5
+ },
+ "outcome_msg" : "outcome_msg",
+ "warning" : "warning",
+ "outcome" : "succeeded"
+ },
+ "params" : {
+ "key" : ""
+ },
+ "created_by" : "elastic",
+ "enabled" : true,
+ "muted_alert_ids" : [ "muted_alert_ids", "muted_alert_ids" ],
+ "rule_type_id" : "monitoring_alert_cluster_health",
+ "tags" : [ "tags", "tags" ],
+ "api_key_owner" : "elastic",
+ "schedule" : {
+ "interval" : "1m"
+ },
+ "notify_when" : "onActiveAlert",
+ "next_run" : "2022-12-06T00:14:43.818Z",
+ "updated_at" : "2022-12-05T23:36:58.284Z",
+ "execution_status" : {
+ "last_execution_date" : "2022-12-06T00:13:43.89Z",
+ "last_duration" : 55,
+ "status" : "ok"
+ },
+ "name" : "cluster_health_rule",
+ "updated_by" : "elastic",
+ "scheduled_task_id" : "b530fed0-74f5-11ed-9801-35303b735aef",
+ "id" : "b530fed0-74f5-11ed-9801-35303b735aef",
+ "mute_all" : false,
+ "actions" : [ {
+ "id" : "9dca3e00-74f5-11ed-9801-35303b735aef",
+ "params" : {
+ "key" : ""
+ },
+ "group" : "default"
+ }, {
+ "id" : "9dca3e00-74f5-11ed-9801-35303b735aef",
+ "params" : {
+ "key" : ""
+ },
+ "group" : "default"
+ } ],
+ "consumer" : "alerts"
+ }, {
+ "throttle" : "10m",
+ "created_at" : "2022-12-05T23:36:58.284Z",
+ "last_run" : {
+ "alerts_count" : {
+ "new" : 0,
+ "ignored" : 6,
+ "recovered" : 1,
+ "active" : 5
+ },
+ "outcome_msg" : "outcome_msg",
+ "warning" : "warning",
+ "outcome" : "succeeded"
+ },
+ "params" : {
+ "key" : ""
+ },
+ "created_by" : "elastic",
+ "enabled" : true,
+ "muted_alert_ids" : [ "muted_alert_ids", "muted_alert_ids" ],
+ "rule_type_id" : "monitoring_alert_cluster_health",
+ "tags" : [ "tags", "tags" ],
+ "api_key_owner" : "elastic",
+ "schedule" : {
+ "interval" : "1m"
+ },
+ "notify_when" : "onActiveAlert",
+ "next_run" : "2022-12-06T00:14:43.818Z",
+ "updated_at" : "2022-12-05T23:36:58.284Z",
+ "execution_status" : {
+ "last_execution_date" : "2022-12-06T00:13:43.89Z",
+ "last_duration" : 55,
+ "status" : "ok"
+ },
+ "name" : "cluster_health_rule",
+ "updated_by" : "elastic",
+ "scheduled_task_id" : "b530fed0-74f5-11ed-9801-35303b735aef",
+ "id" : "b530fed0-74f5-11ed-9801-35303b735aef",
+ "mute_all" : false,
+ "actions" : [ {
+ "id" : "9dca3e00-74f5-11ed-9801-35303b735aef",
+ "params" : {
+ "key" : ""
+ },
+ "group" : "default"
+ }, {
+ "id" : "9dca3e00-74f5-11ed-9801-35303b735aef",
+ "params" : {
+ "key" : ""
+ },
+ "group" : "default"
+ } ],
+ "consumer" : "alerts"
+ } ],
+ "page" : 5
+}
+
+ application/jsonfindRules_200_response - findRules_200_response_data_inner - findRules_200_response_data_inner_actions_inner - findRules_200_response_data_inner_execution_status - findRules_200_response_data_inner_last_run - findRules_200_response_data_inner_last_run_alerts_count - findRules_200_response_data_inner_schedule - findRules_has_reference_parameter - findRules_search_fields_parameter - findRules_200_response - UpfindRules_200_response_data_inner - Upalerts, apm, discover, infrastructure, logs, metrics, ml, monitoring, securitySolution, siem, stackAlerts, or uptime. .es-query, .index-threshold, logs.alert.document.count, monitoring_alert_cluster_health, siem.thresholdRule, or xpack.ml.anomaly_detection_alert. notify_when is set to onThrottleInterval. It is specified in seconds, minutes, hours, or days. findRules_200_response_data_inner_actions_inner - UpfindRules_200_response_data_inner_last_run - UpfindRules_200_response_data_inner_schedule - UpfindRules_search_fields_parameter - Up