infoblox:api
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| infoblox:api [2025/11/23 12:23] – [Quick Sample] bstafford | infoblox:api [2026/03/07 00:25] (current) – bstafford | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== BloxOne API ====== | ====== BloxOne API ====== | ||
| ([[infoblox: | ([[infoblox: | ||
| + | |||
| REMEMBER, in Linux you can pipe output into " | REMEMBER, in Linux you can pipe output into " | ||
| Line 8: | Line 9: | ||
| * [[https:// | * [[https:// | ||
| * [[https:// | * [[https:// | ||
| + | |||
| + | ===== Convert JSON ===== | ||
| + | The " | ||
| + | |||
| + | Page on transforming JSON with jq [[www.digitalocean.com/ | ||
| ===== Quick CURL===== | ===== Quick CURL===== | ||
| < | < | ||
| Line 34: | Line 40: | ||
| or even | or even | ||
| < | < | ||
| - | curl -s -X GET -H " | + | curl -s -X GET -H " |
| - | " | + | |
| ==== External Networks ==== | ==== External Networks ==== | ||
| API documentation [[https:// | API documentation [[https:// | ||
| Line 281: | Line 286: | ||
| sys.exit(1)</ | sys.exit(1)</ | ||
| ===== Reference ===== | ===== Reference ===== | ||
| + | API Docs [[https:// | ||
| + | |||
| + | ===== Subnet Filter ===== | ||
| + | |||
| + | |||
| + | < | ||
| + | --header ' | ||
| + | --header ' | ||
| + | | jq -r ' | ||
| + | |||
| + | This command will find all subnets that have the tag " | ||
| + | |||
| + | You can then use the jq command to filter the subnet address value and the subnet CIDR value and display in format address/ | ||
| + | ==== AWS IPAM ==== | ||
| + | To get the Infoblox ID needed by AWS IPAM for management: | ||
| + | < | ||
| + | ==== Get Internal Domain List ==== | ||
| + | The following gets the full list of Internal Domain lists (Security) as well as their contents. You can use this to get the ID of each list. | ||
| + | < | ||
| + | |||
| + | The code below is for when you want to filter the query to show just the contents of a specific list (in this case, the ID is 1234) | ||
| + | < | ||
| + | |||
| ==== Get Data of Threat Feed ==== | ==== Get Data of Threat Feed ==== | ||
| < | < | ||
| Line 879: | Line 907: | ||
| For very large results, you may need to add ''& | For very large results, you may need to add ''& | ||
| The return object will contain a next_page_id field, which you call in the following call with the same query but adding ''& | The return object will contain a next_page_id field, which you call in the following call with the same query but adding ''& | ||
| + | ===== NIOS Perl API ===== | ||
| + | The Perl API (PAPI) has been officially deprecated since NIOS version 8.4. | ||
| + | |||
| + | Starting from NIOS version 9.0.6, Perl module access is disabled by default. | ||
| + | |||
| + | All future enhancements and fixes are now provided through the RESTful API (WAPI). | ||
| + | |||
| + | To enable PAPI, the following CLI command must be executed: < | ||
| + | |||
| + | When you enable or disable the perl_mod_access, | ||
infoblox/api.1763900632.txt.gz · Last modified: by bstafford
