appfwglobal_auditnslogpolicy_binding
Binding object showing the auditnslogpolicy that can be bound to appfwglobal.
Properties
(click to see Operations)
Name | Data Type | Permissions | Description |
---|---|---|---|
priority | <Double> | Read-write | The priority of the policy. |
policyname | <String> | Read-write | Name of the policy. |
labelname | <String> | Read-write | Name of the policy label to invoke if the current policy evaluates to TRUE, the invoke parameter is set, and Label Type is set to Policy Label. |
state | <String> | Read-write | Enable or disable the binding to activate or deactivate the policy. This is applicable to classic policies only.<br>Possible values = ENABLED, DISABLED |
gotopriorityexpression | <String> | Read-write | Expression or other value specifying the next policy to evaluate if the current policy evaluates to TRUE. Specify one of the following values: * NEXT - Evaluate the policy with the next higher priority number. * END - End policy evaluation. * USE_INVOCATION_RESULT - Applicable if this policy invokes another policy label. If the final goto in the invoked policy label has a value of END, the evaluation stops. If the final goto is anything other than END, the current policy label performs a NEXT. * A default syntax or classic expression that evaluates to a number. If you specify an expression, the number to which it evaluates determines the next policy to evaluate, as follows: * If the expression evaluates to a higher numbered priority, the policy with that priority is evaluated next. * If the expression evaluates to the priority of the current policy, the policy with the next higher numbered priority is evaluated next. * If the expression evaluates to a number that is larger than the largest numbered priority, policy evaluation ends. An UNDEF event is triggered if: * The expression is invalid. * The expression evaluates to a priority number that is smaller than the current policys priority number. * The expression evaluates to a priority number that is between the current policys priority number (say, 30) and the highest priority number (say, 100), but does not match any configured priority number (for example, the expression evaluates to the number 85). This example assumes that the priority number increments by 10 for every successive policy, and therefore a priority number of 85 does not exist in the policy label. |
invoke | <Boolean> | Read-write | If the current policy evaluates to TRUE, terminate evaluation of policies bound to the current policy label, and then forward the request to the specified virtual server or evaluate the specified policy label. |
type | <String> | Read-write | Bind point to which to policy is bound.<br>Possible values = REQ_OVERRIDE, REQ_DEFAULT, NONE |
labeltype | <String> | Read-write | Type of policy label to invoke if the current policy evaluates to TRUE and the invoke parameter is set. Available settings function as follows: * reqvserver. Invoke the unnamed policy label associated with the specified request virtual server. * policylabel. Invoke the specified user-defined policy label.<br>Possible values = reqvserver, policylabel |
policytype | <String> | Read-only | .<br>Possible values = Classic Policy, Advanced Policy |
__count | <Double> | Read-only | count parameter |
Operations
(click to see Properties)
Some options that you can use for each operations:
Getting warnings in response: NITRO allows you to get warnings in an operation by specifying the "warning" query parameter as "yes". For example, to get warnings while connecting to the NetScaler appliance, the URL is as follows:
http://<netscaler-ip-address>/nitro/v1/config/login?warning=yes
If any, the warnings are displayed in the response payload with the HTTP code "209 X-NITRO-WARNING".
Authenticated access for individual NITRO operations: NITRO allows you to logon to the NetScaler appliance to perform individual operations. You can use this option instead of creating a NITRO session (using the login object) and then using that session to perform all operations,
To do this, you must specify the username and password in the request header of the NITRO request as follows:
X-NITRO-USER:<username>
X-NITRO-PASS:<password>
Note: In such cases, make sure that the request header DOES not include the following:
Cookie:NITRO_AUTH_TOKEN=<tokenvalue>
Note:
Mandatory parameters are marked in red and placeholder content is marked in <green>.
add:
URL: http://NS_IP/nitro/v1/config
HTTP Method: PUT
Request Payload:
{ "params":{ "warning":<String_value>, "onerror":<String_value> }, sessionid":"##sessionid","appfwglobal_auditnslogpolicy_binding":{ "policyname":<String_value>, "priority":<Double_value>, "state":<String_value>, "gotopriorityexpression":<String_value>, "type":<String_value>, "invoke":<Boolean_value>, "labeltype":<String_value>, "labelname":<String_value>, }}
Response Payload:
{ "errorcode": 0, "message": "Done", "severity":
delete:
URL: http://NS_IP/nitro/v1/config/appfwglobal_auditnslogpolicy_binding
HTTP Method: DELETE
Response Payload:
{ "errorcode": 0, "message": "Done", "severity":
get
URL: http://<NS_IP>/nitro/v1/config/appfwglobal_auditnslogpolicy_binding
Query-parameters:
filter
http://<NS_IP>/nitro/v1/config/appfwglobal_auditnslogpolicy_binding?filter=property-name1:property-value1,property-name2:property-value2
Use this query-parameter to get the filtered set of appfwglobal_auditnslogpolicy_binding resources configured on NetScaler.Filtering can be done on any of the properties of the resource.
pagesize=#no;pageno=#no
http://<NS_IP>/nitro/v1/config/appfwglobal_auditnslogpolicy_binding?pagesize=#no;pageno=#no
Use this query-parameter to get the appfwglobal_auditnslogpolicy_binding resources in chunks.
HTTP Method: GET
Response Payload:
{ "errorcode": 0, "message": "Done", "appfwglobal_auditnslogpolicy_binding": [ { "priority":<Double_value>, "policyname":<String_value>, "labelname":<String_value>, "state":<String_value>, "gotopriorityexpression":<String_value>, "invoke":<Boolean_value>, "type":<String_value>, "labeltype":<String_value>, "policytype":<String_value>, }]}
count
URL: http://<NS_IP>/nitro/v1/config/appfwglobal_auditnslogpolicy_binding?count=yes
HTTP Method: GET
Response Payload:
{ "errorcode": 0, "message": "Done",appfwglobal_auditnslogpolicy_binding: [ { "__count": "#no"} ] }