IP-Upload v1.1.1 serial key or number

IP-Upload v1.1.1 serial key or number

IP-Upload v1.1.1 serial key or number

IP-Upload v1.1.1 serial key or number

List of RFCs

#TitleDate publishedRelated articleMade obsolete byNotes RFC 20ASCII format for Network InterchangeOctober 16, 1969ASCIIRFC 768User Datagram ProtocolAugust 28, 1980UDPRFC 783THE TFTP PROTOCOL (REVISION 2)June 1981TFTPRFC 1350RFC 791Internet ProtocolSeptember 1981IPv4RFC 792INTERNET CONTROL MESSAGE PROTOCOLSeptember 1981ICMPRFC 793TRANSMISSION CONTROL PROTOCOLSeptember 1981TCPRFC 826An Ethernet Address Resolution ProtocolNovember 1982ARPRFC 854TELNET PROTOCOL SPECIFICATIONMay 1983TelnetRFC 855TELNET OPTION SPECIFICATIONSMay 1983RFC 862Echo ProtocolMay 1983EchoRFC 863Discard ProtocolMay 1983DISCARDRFC 864Character Generator ProtocolMay 1983CHARGENRFC 868Time ProtocolMay 1983TIMERFC 903A Reverse Address Resolution ProtocolJune 1984RARPRFC 937POST OFFICE PROTOCOL - VERSION 2February 1985POP v 2RFC 951BOOTSTRAP PROTOCOL (BOOTP)September 1985BOOTPRFC 959FILE TRANSFER PROTOCOL (FTP)October 1985FTPRFC 1034DOMAIN NAMES - CONCEPTS AND FACILITIESNovember 1987DNSRFC 1035DOMAIN NAMES - IMPLEMENTATION AND SPECIFICATIONNovember 1987DNSRFC 1036Standard for Interchange of USENET MessagesDecember 1987UsenetRFC 1055A Non-Standard for Transmission of IP Datagrams Over Serial Lines: SLIPJune 1988SLIPRFC 1058Routing Information ProtocolJune 1988RIP v 1RFC 1059Network Time Protocol (version 1) specification and implementationJuly 1988NTP v 1RFC 1087Ethics and the InternetJanuary 1989Internet EthicsRFC 1119Network Time Protocol (version 2) specification and implementationSeptember 1989NTP v 2RFC 1149A Standard for the Transmission of IP Datagrams on Avian CarriersApril 1, 1990IP over Avian CarriersRFC 1157A Simple Network Management Protocol (SNMP)May 1990SNMP v1RFC 1176INTERACTIVE MAIL ACCESS PROTOCOL - VERSION 2August 1990IMAP v 2RFC 1305Network Time Protocol (Version 3) Specification, Implementation and AnalysisMarch 1992NTP v 3RFC 5905Obsoletes RFC 1119, RFC 1059, RFC 958RFC 1321The MD5 Message-Digest AlgorithmApril 1992MD5RFC 1350THE TFTP PROTOCOL (REVISION 2)July 1992TFTPObsoletes RFC 783RFC 1436The Internet Gopher ProtocolMarch 1993GopherRFC 1441Introduction to version 2 of the Internet-standard Network Management FrameworkApril 1993SNMP v 2RFC 1459Internet Relay Chat ProtocolMay 1993IRCRFC 1730INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4December 1994IMAP v 4RFC 1777Lightweight Directory Access ProtocolMarch 1995LDAPRFC 1855Netiquette GuidelinesOctober 1995NetiquetteRFC 1918Address Allocation for Private InternetsFebruary 1996Private networkRFC 1939Post Office Protocol - Version 3May 1996POP v 3RFC 1945Hypertext Transfer Protocol—HTTP/1.0May 1996HTTP v 1.0RFC 1948Defending Against Sequence Number AttacksMay 1996IP spoofingRFC 1950ZLIB Compressed Data Format Specification version 3.3May 1996Zlib v 3.3RFC 1951DEFLATE Compressed Data Format Specification version 1.3May 1996DEFLATE v 1.3RFC 1952GZIP file format specification version 4.3May 1996Gzip v 4.3RFC 1964The Kerberos Version 5 GSS-API MechanismJune 1996Kerberos; GSSAPIRFC 2080RIPng for IPv6January 1997RIP v ngRFC 2119Key words for use in RFCs to Indicate Requirement LevelsMarch 1997Request for CommentsUpdated by RFC 8174RFC 2131Dynamic Host Configuration ProtocolMarch 1997DHCPRFC 2177IMAP4 IDLE commandJune 1997IMAP IDLERFC 2195IMAP/POP AUTHorize Extension for Simple Challenge/ResponseSeptember 1997CRAM-MD5RFC 2228FTP Security ExtensionsOctober 1997FTPRFC 2230Key Exchange Delegation Record for the DNSNovember 1997Secure DNSRFC 2246The TLS Protocol Version 1.0January 1999TLS 1.0RFC 2251Lightweight Directory Access Protocol (v3)December 1997LDAP v 3RFC 2252Lightweight Directory Access Protocol (v3): Attribute Syntax DefinitionsRFC 2253Lightweight Directory Access Protocol (v3): UTF-8 String Representation of Distinguished NamesRFC 2254The String Representation of LDAP Search FiltersRFC 2255The LDAP URL FormatRFC 2256A Summary of the X.500(96) User Schema for use with LDAPv3RFC 2326Real Time Streaming Protocol (RTSP)April 1998RTSPRFC 2327SDP: Session Description ProtocolApril 1998SDPRFC 2328OSPF Version 2April 1998OSPFRFC 2351Mapping of Airline Reservation, Ticketing, and Messaging Traffic over IPMay 1998MATIPRFC 2362Protocol Independent Multicast-Sparse Mode (PIM-SM)June 1998PIMRFC 2397The "data" URL schemeAugust 1998Data: URI schemeRFC 2407Internet IP Security Domain of Interpretation for ISAKMP.November 1998IKERFC 2408Internet Security Association and Key Management Protocol (ISAKMP)RFC 2409The Internet Key Exchange (IKE)RFC 2427Multiprotocol Interconnect over Frame RelaySeptember 1998Frame relay1294, 1490RFC 2453RIP Version 2November 1998RIP v 2RFC 2460Internet Protocol, Version 6 (IPv6) SpecificationDecember 1998IPv6RFC 2549IP over Avian Carriers with Quality of ServiceApril 1, 1999IP over Avian CarriersRFC 255530 Years of RFCs April 7, 1999 Retraces the history of RFCs RFC 2570Introduction to Version 3 of the Internet-standard Network Management FrameworkApril 1999SNMP v3RFC 2595Using TLS with IMAP, POP3 and ACAPJune 1999STARTTLS for IMAP, POP3 and ACAPRFC 2606Reserved Top Level DNS NamesJune 1999Fictitious domain nameexample.com, .test, ... RFC 2740OSPF for IPv6December 1999OSPFRFC 2743Generic Security Service Application Program Interface Version 2, Update 1January 2000GSSAPI v 2RFC 2744Generic Security Service API Version 2 : C-bindingsRFC 2801Internet Open Trading Protocol - IOTP Version 1.0 April 2000 Internet Open Trading ProtocolRFC 2802Digital Signatures for the v1.0 Internet Open Trading Protocol (IOTP) April 2000 Internet Open Trading ProtocolRFC 2810Internet Relay Chat: ArchitectureApril 2000IRCRFC 2811Internet Relay Chat: Channel ManagementRFC 2812Internet Relay Chat: Client ProtocolRFC 2813Internet Relay Chat: Server ProtocolRFC 2853Generic Security Service API Version 2 : Java BindingsJune 2000GSSAPI v 2RFC 2865Remote Authentication Dial In User Service (RADIUS)June 2000RADIUSRFC 2866RADIUS AccountingJune 2000RFC 2935Internet Open Trading Protocol (IOTP) HTTP Supplement September 2000 Internet Open Trading ProtocolRFC 2974Session Announcement ProtocolOctober 2000SAPRFC 3504Internet Open Trading Protocol (IOTP), Version 1, Errata March 2003 Internet Open Trading ProtocolRFC 3022Traditional IP Network Address Translator (Traditional NAT)January 2001NATRFC 3031Multiprotocol Label Switching ArchitectureJanuary 2001MPLSRFC 3053IPv6 Tunnel BrokerJanuary 2001Tunnel BrokerRFC 3056Connection of IPv6 Domains via IPv4 CloudsFebruary 20016to4RFC 3080The Blocks Extensible Exchange Protocol CoreMarch 2001BEEPRFC 3162RADIUS and IPv6August 2001RADIUS (IPv6)RFC 3207SMTP Service Extension for Secure SMTP over Transport Layer SecurityFebruary 2002STARTTLS for simple mail transfer protocolRFC 3261SIP: Session Initiation ProtocolJune 2002SIPRFC 3284The VCDIFF Generic Differencing and Compression Data Format June 2002VCDIFFRFC 3286An Introduction to the Stream Control Transmission Protocol (SCTP)May 2002SCTPRFC 3315Dynamic Host Configuration Protocol for IPv6 (DHCPv6)July 2003DHCP (IPv6)RFC 3339Date and Time on the Internet: TimestampsJuly 2002TimestampRFC 3376Internet Group Management Protocol, Version 3October 2002IGMP v 3RFC 3401Dynamic Delegation Discovery System (DDDS) Part One: The Comprehensive DDDSOctober 2002DDDSRFC 3402Dynamic Delegation Discovery System (DDDS) Part Two: The AlgorithmRFC 3403Dynamic Delegation Discovery System (DDDS) Part Three: The Domain Name System (DNS) DatabaseRFC 3404Dynamic Delegation Discovery System (DDDS) Part Four: The Uniform Resource Identifiers (URI) Resolution ApplicationRFC 3405Dynamic Delegation Discovery System (DDDS) Part Five: URI.ARPA Assignment ProceduresRFC 3492Punycode: A Bootstring encoding of Unicode for Internationalized Domain Names in Applications (IDNA)March 2003PunycodeRFC 3501INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4rev1March 2003IMAP v 4r1RFC 3530Network File System (NFS) version 4 ProtocolApril 2003NFS v 4RFC 3538Secure Electronic Transaction (SET) Supplement for the v1.0 Internet Open Trading Protocol (IOTP) June 2003 Internet Open Trading ProtocolRFC 3550RTP: A Transport Protocol for Real-Time ApplicationsJuly 2003RTPRFC 3711The Secure Real-time Transport Protocol (SRTP)March 2004SRTPRFC 3720Internet Small Computer Systems Interface (iSCSI)April 2004ISCSIRFC 3730Extensible Provisioning Protocol (EPP)March 2004Extensible Provisioning ProtocolRFC 3783Small Computer Systems Interface (SCSI) Command Ordering Considerations with iSCSIMay 2004ISCSIRFC 3801Voice Profile for Internet ProtocolJune 2004VPIMRFC 3830MIKEY: Multimedia Internet KEYingAugust 2004MIKEYRFC 3867Payment Application Programmers Interface (API) for v1.0 November 2004 Internet Open Trading ProtocolRFC 3977Network News Transfer ProtocolOctober 2006NNTPRFC 4122A Universally Unique IDentifier (UUID) URN NamespaceJuly 2005UUIDRFC 4151The 'tag' URI SchemeOctober 2005Tag URI schemeRFC 4213Basic Transition Mechanisms for IPv6 Hosts and RoutersOctober 20056in4RFC 4217Securing FTP with TLSOctober 2005SSL FTP (FTPS)RFC 4271Border Gateway Protocol 4January 2006Border Gateway ProtocolRFC 4287The Atom Syndication FormatDecember 2005AtomRFC 4251The Secure Shell (SSH) Protocol ArchitectureJanuary 2006SSH-2RFC 4291IP Version 6 Addressing ArchitectureFebruary 2006IPv6RFC 4353A Framework for Conferencing with the Session Initiation Protocol (SIP)February 2006Conference callRFC 4408Sender Policy Framework (SPF) for Authorizing Use of Domains in E-Mail, Version 1January 2006SPFRFC 4422Simple Authentication and Security Layer (SASL)June 2006SASLRFC 4541Considerations for Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Snooping SwitchesMay 2006IGMP snoopingRFC 4575A Session Initiation Protocol (SIP) Event Package for Conference StateAugust 2006Conference callRFC 4579Session Initiation Protocol (SIP) Call Control - Conferencing for User AgentsAugust 2006RFC 4634US Secure Hash Algorithms (SHA and HMAC-SHA)July 2006SHA-1, SHA-2RFC 4646Tags for Identifying LanguagesSeptember 2006language tagsRFC 4655A Path Computation Element (PCE)-Based ArchitectureAugust 2008Path computation elementRFC 4787Network Address Translation (NAT) Behavioral Requirements for Unicast UDPJanuary 2007NATRFC 4880OpenPGP Message FormatNovember 2007OpenPGPRFC 4960Stream Control Transmission ProtocolSeptember 2007SCTPRFC 5023The Atom Publishing ProtocolOctober 2007AtomRFC 5321Simple Mail Transfer ProtocolOctober 2008SMTPRFC 5322Internet Message FormatOctober 2008RFC 5533Shim6: Level 3 Multihoming Shim Protocol for IPv6June 2009Site Multihoming by IPv6 IntermediationRFC 5545iCalendar SpecificationSeptember 2009iCalendarRFC 5849The OAuth 1.0 ProtocolApril 2010OAuthRFC 5880Bidirectional Forwarding DetectionJune 2010BFDRFC 5881BFD for IPv4 and IPv6 (Single Hop)June 2010BFDRFC 5905Network Time Protocol Version 4: Protocol and Algorithms SpecificationJune 2010NTP v 4Obsoletes RFC 1305, RFC 4330RFC 5969IPv6 Rapid Deployment on IPv4 Infrastructures (6rd)January 2010IPv6 rapid deploymentRFC 6238TOTP: Time-Based One-Time Password AlgorithmMay 2011TOTPRFC 6265HTTP State Management MechanismApril 2011HTTP cookieRFC 6409Message submission for mailNovember 2011message submission agentreplaces 2476, 4409 RFC 6455The WebSocket ProtocolDecember 2011WebSocketRFC 6508Sakai-Kasahara Key Encryption (SAKKE)February 2012SAKKERFC 6716Definition of the Opus Audio CodecSeptember 2012Opus (audio format)Updated by RFC 8251RFC 6726File Delivery over Unidirectional Transport (FLUTE)November 2012FLUTEObsoletes RFC 3926RFC 6749The OAuth 2.0 Authorization FrameworkOctober 2012OAuthRFC 6797HTTP Strict Transport Security (HSTS)November 2012HTTP Strict Transport SecurityRFC 6805The Application of the Path Computation Element Architecture to the Determination of a Sequence of Domains in MPLS and GMPLSNovember 2012Path computation elementRFC 7230Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and RoutingJune 2014HTTP v1.1Obsoletes 2616 RFC 7231Hypertext Transfer Protocol (HTTP/1.1): Semantics and ContentJune 2014HTTP v1.1Obsoletes 2616 RFC 7232Hypertext Transfer Protocol (HTTP/1.1): Conditional RequestsJune 2014HTTP v1.1Obsoletes 2616 RFC 7233Hypertext Transfer Protocol (HTTP/1.1): Range RequestsJune 2014HTTP v1.1, Byte servingObsoletes 2616 RFC 7234Hypertext Transfer Protocol (HTTP/1.1): CachingJune 2014HTTP v1.1Obsoletes 2616 RFC 7235Hypertext Transfer Protocol (HTTP/1.1): AuthenticationJune 2014HTTP v1.1Obsoletes 2616 RFC 7301Transport Layer Security (TLS): Application-Layer Protocol Negotiation ExtensionJuly 2014Application-Layer Protocol NegotiationRFC 7348Virtual eXtensible Local Area Network (VXLAN): A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 NetworksAugust 2014VXLANRFC 7469Public Key Pinning Extension for HTTPApril 2015HTTP Public Key PinningRFC 7540Hypertext Transfer Protocol Version 2 (HTTP/2)May 2015HTTP/2RFC 7541HPACK: Header Compression for HTTP/2May 2015RFC 7567IETF Recommendations Regarding Active Queue ManagementJuly 2015Active Queue ManagementRFC 7725An HTTP Status Code to Report Legal ObstaclesDecember 2015HTTP 451RFC 7871Client Subnet in DNS QueriesMay 2016Domain Name SystemRFC 8391XMSS: eXtended Merkle Signature SchemeMay 2018Hash-based cryptography
Источник: [https://torrent-igruha.org/3551-portal.html]
, IP-Upload v1.1.1 serial key or number

Overview

The RESTful Interface Tool is a command-line interface that allows you to manage Hewlett Packard Enterprise products that take advantage of RESTful APIs. For this release of the tool, you can manage HPE Gen9 servers running iLO 4 2.10 or later through iLO RESTful APIs. You can install the tool on your computer for remote use or you can install the tool locally on a server with a Windows OS or Linux OS. In addition to using the tool manually to execute individual commands, you can create scripts to automate tasks.

The RESTful Interface Tool can display and set parameters for the following:

  • HPE BIOS/UEFI (including secure boot)
  • HPE iLO 4/iLO 5
  • HPE iLO Repository
  • Smart Array support

Requirements

The requirements for the server, which you will manage with the tool, are as follows:

  • Local management: Gen9 or greater server with a Windows OS or Linux OS (64–bit) installed.
  • Remote management: Gen9 or greater server with or without an OS installed.
  • iLO 4 2.10 or later.
  • Before you run the tool on a Linux system, the /tmp folder must be configured to allow code to execute. If the /tmp folder is set to no-execution, the tool will not run. You can work around this by exporting an environment variable to point to another location. You can assign a new location to any of the following environment variables: TMPDIR, TEMP, TMP.

Note: You can download the install packages from http://www.hpe.com/info/resttool.

Installing the RESTful Interface Tool

Perform the following steps to install the tool in a Windows OS or Linux OS.

Windows

  1. Download the RESTful Interface Tool (Windows MSI package) from http://www.hpe.com/info/resttool.
  2. Install the package on the server you prefer to manage for local management. For remote management, install the package on a laptop or server that has access to the managed server network.

Linux

  1. Download the RESTful Interface Tool (Linux RPM package) from http://www.hpe.com/info/resttool.
  2. Install the installation package on the server you prefer to manage for local management. For remote management, install the package on a laptop or server that has access to the managed server network.

Starting the RESTful Interface Tool

Windows

  1. Click the Start menu.
  2. Click Hewlett Packard EnterpriseHPE RESTful Interface Tool.
  3. Right-click the HPE RESTful Interface Tool prompt, and then click Run as Administrator.

Linux

  1. Open a terminal window.
  2. Run the following command as an administrator to start interactive mode:

RESTful Interface Tool Modes of Operation

The RESTful Interface Tool has three modes of operation. By default, the interactive mode is utilized when you start the RESTful Interface Tool. With scriptable mode, you can use a script that gives commands to the RESTful Interface Tool. The file-based mode allows you to use a script that gives commands to the RESTful Interface Tool and uses a file to load and save settings.

Interactive Mode

Interactive mode is started when you run the RESTful Interface Tool without any command-line parameters. The prompt is displayed and you can enter commands one at a time. You can exit the interactive mode by entering the command at the prompt. On Windows systems, double-click to start an interactive session. You must be an administrator to run .

Tab complete

Tab complete is available for interactive mode in multiple capacities. See the features below.

Commands

Tab complete is available for viewing and completing commands.

Types

Tab complete is available for viewing and completing types.

Properties and sub-properties

Tab complete is available for viewing and completing properties.

  • You must be logged in and have a type selected
  • Also available for set and list

Schema information for properties

Tab complete can also show schema information for properties.

  • You must be logged in and have a type selected
  • Also available for set and list

Scriptable Mode

The following script retrieves information regarding the Bios type:

:: This is a batch file that logs into a remote server, :: selects the Bios type, and gets the BootMode value :: Usage :: :: selectget.bat [URI] [USERNAME] [PASSWORD] @echo off set argC=0 for %%x in (%*) do Set /A argC+=1 if %argC% LSS 3 goto :failCondition goto :main :failCondition @echo Usage: @echo selectget.bat [URI] [USERNAME] [PASSWORD] goto :EOF :main @echo ***************************************** @echo ************* Logging in... ************* @echo ***************************************** ilorest.exe login %1 -u %2 -p %3 @echo ***************************************** @echo ******* selecting Bios type... ******** @echo ***************************************** ilorest.exe select Bios. @echo ***************************************** @echo ********** getting BootMode... ********** @echo ***************************************** ilorest.exe get BootMode pause

You can use the scriptable mode to script all the commands using an external input file. The script contains a list of the RESTful Interface Tool command lines that let users get and set properties of server objects.

In this example, first the type is selected, and then the command is used to retrieve information about the property of .

File-based mode

The following script allows you to save, edit, and load a file to the server.

File-based mode allows you to save and load settings from a file. This is similar to the files used by CONREP. File-based mode supports the JSON format.

When the example script is run, the following result is produced:

Here, the type is saved to a file called . Then, after you modify any properties, the command is used to make these changes on the server.

The properties of can be edited here, and then loaded on the server. When the file is loaded on the server, changes to read-only values are not reflected. The full list in this example is truncated to save space.

After saving this configuration, the ilorest1.json file looks like this:

Executing commands in parallel

Run the following command to start an iLOrest session in 10 different iLO servers:

When you run the example command, PDSH issues the following 10 commands in batch and background mode. For each command, the iLOrest tool saves the data in a different location. For example, for server1, the data is cached in directory server1, for server2, the data is cached in directory server2.

Now that an iLOrest session is created on each iLO, you can select, set, or get information from them.

The -R exec part of the example finds and locally executes the iLOrest executable. The -w server[1-10] part of the example replaces the string in the rest of the command with .

iLOrest uses a caching method to locally save servers' data. To send iLOrest commands to many different systems at once remotely, you will need to specify a different cache directory for each of them. The following example uses , but any method of parallel scripting will work as long as you are specifying different cache directories.

Running iLOrest on multiple systems locally can be done using automation tools such as Ansible, Chef, and Puppet.

Configuration file (ilorest.conf)

Windows default configuration file

Linux default configuration file

The configuration file contains the default settings for the tool. You can use a text editor to change the behavior of the tool such as adding a server IP address, username, and password. The settings that you add or update in the configuration file are automatically loaded each time you start the tool.

Configuration file locations:

  • Windows OS: The same location as the executable file that starts the tool.
  • Linux OS:

Higher Security Modes

This section describes how to set higher security modes and how to use the RESTful Interface Tool in these modes.

These security settings are only available in HPE Gen10 servers.

Setting iLO Higher Security Modes

To set security modes in RESTful Interface Tool, select the "HpeSecurityService." type, and then set the "SecurityState" property to one of the allowed values and commit.

After the commit operation has been completed, iLO will reset to apply the changes.

Using RESTful Interface Tool in iLO Higher Security Modes

RESTful Interface Tool in remote mode continues to function normally in higher security modes. To use RESTful Interface Tool locally in higher security modes, you must pass credentials along with your commands.

In interactive mode, you only need to pass your credentials during the login command. In command line mode, you must pass credentials for EACH COMMAND, even if you are already logged in.

RESTful Interface Tool functions normally with higher security settings in remote mode. To use RESTful Interface Tool locally in higher security modes, you must pass credentials to your commands. If you do not pass the proper credentials in local mode, you receive a similar error.

A note on OS FIPS modes

RESTful Interface Tool 2.2 and greater have OS FIPS support. If an OS is set to enforce FIPS, RESTful Interface Tool uses a FIPS version of OpenSSL.

For users running from source that would like FIPS support, please see this link for information on including this feature.

Global Options

This section lists all global options available.

-h, --help

Including the help flag will display general help for the tool.

-c, --config=CONFIGFILE

Use the provided configuration file instead of the default.

--cache-dir=CACHEPATH

Use the provided directory as the location to cache data instead of the default.

-v, --verbose

Display verbose information.

-d, --debug

Display debug information.

--logdir=LOGPATH

Use the provided directory as the location for the log file instead of the default.

--nocache

During execution the application will temporarily store data only in memory.

--nologo

Include to block copyright and logo.

--proxy=PROXYURL

Use the provided proxy for communication.

--redfish

Use this flag if you wish to enable Redfish only compliance. It is enabled by default in systems with iLO 5 and above.

The --redfish global option is not required for iLO 5.

--latestschema

Optionally use the latest schema instead of the one requested by the file.

Might cause errors in some data retrieval due to difference in schema versions.

Global commands

This section includes commands as well as their usage and examples of general commands in the RESTful Interface Tool. They include commands used to do things such as listing help for using commands, viewing, retrieving, modifying, and committing changes to server properties, and authenticating and logging in and out of the server.

Help Command

Help example commands:

Entering help will list the global iLOrest options and all available commands.

iLOrest > help Usage: iLOrest [GLOBAL OPTIONS] [COMMAND] [ARGUMENTS] [COMMAND OPTIONS] Options: -h, --help Show this help message and exit. -c FILE, --config=FILE Use the provided configuration file instead of the default one. --cache-dir=PATH Use the provided directory as the location to cache data (default location: C:\Users\kocurema\AppData\Roaming\.iLOrest) GLOBAL OPTIONS: -v, --verbose Display verbose information. -d, --debug Display debug information. --logdir=PATH Use the provided directory as the location for log file. --nocache During execution the application will temporarily store data only in memory. --nologo Include to block copyright and logo. --redfish Use this flag if you wish to to enable Redfish only compliance. It is enabled by default in systems with iLO5 and above. --latestschema Optionally use the latest schema instead of the one requested by the file. Note: May cause errors in some data retreval due to difference in schema versions. --proxy=URL Use the provided proxy for communication. BIOS COMMANDS biosdefaults - Set the currently logged in server to default BIOS settings. bootorder - Displays and sets the current boot order. iscsiconfig - Displays and configures the current iscsi settings. pending - Show the pending changes that will be applied on reboot. results - Show the results of changes which require a server reboot. setpassword - Sets the admin password and poweron password COMMANDS commit - Applies all the changes made during the current session. get - Displays the current value(s) of a property(ies) within a selected type. info - Displays detailed information about a property within a selected type. list - Displays the current value(s) of a property(ies) within a selected type including reserved properties. load - Loads the server configuration settings from a file. login - Connects to a server, establishes a secure session, and discovers data from iLO. logout - Ends the current session and disconnects from the server. save - Saves the selected type's settings to a file. select - Selects the object type to be used. set - Changes the value of a property within the currently selected type. status - Displays all pending changes within a selected type that need to be committed. types - Displays all selectable types within the currently logged in server. exit - Exits from the interactive shell. help - Displays command line syntax and help menus for individual commands. Example: help login RAW COMMANDS rawdelete - Raw form of the DELETE command. rawget - Raw form of the GET command. rawhead - Raw form of the HEAD command. rawpatch - Raw form of the PATCH command. rawpost - Raw form of the POST command. rawput - Raw form of the PUT command. SMART ARRAY COMMANDS clearcontrollerconfig - Clears smart array controller configuration. createlogicaldrive - Creates a new logical drive on the selected controller. deletelogicaldrive - Deletes logical drives from the selected controller. drivesanitize - Erase/Sanitizes physical drives factoryresetcontroller - Factory resets a controller by index or location. smartarray - Discovers all storage controllers installed in the server and managed by the SmartStorage. iLO COMMANDS certificate - Command for importing both iLO and login authorization certificates as well as generating iLO certificate signing requests clearrestapistate - Clears the persistent state of the REST API. Some portions of the API may not be available until after the server reboots. directory - Update directory settings, add/delete directory roles, and test directory settings. disableilofunctionality - disables iLO's accessibility via the network and resets iLO. WARNING: This should be used with caution as it will render iLO unable to respond to further network operations (including REST operations) until iLO is re-enabled using the RBSU menu. eskm - Command for all ESKM available actions. factorydefaults - Resets iLO to factory defaults. WARNING: user data will be removed use with caution. fwintegritycheck - Perform a firmware integrity check on the currently logged in server. firmwareupdate - Perform a firmware update on the currently logged in server. iloaccounts - Adds / deletes an iLO account on the currently logged in server. backuprestore - Backup and restore iLO to a server using a .bak file. iloclone - Clone the iLO config of the currently logged in server and copy it to the server in the arguments. ilofederation - Adds / deletes an iLO federaion group on the currently logged in server. ilolicense - Adds an iLO license key to the currently logged in server. iloreset - Reset iLO on the current logged in server. ipprofiles - This is used to manage hpeipprofile data store. onebuttonerase - Performs One Button Erase on a system . reboot - Reboot operations for the current logged in server. sendtest - Command for sending various tests to iLO. serverclone - Creates a JSON formated clone file of a system's iLO, Bios, and SSA configuration which can be duplicated onto other systems. User editable JSON file can be manipulated to modify settings before being loaded onto another machine. serverinfo - Shows aggregate health status and details of the currently logged in server. serverlogs - Download and perform log operations. serverstate - Returns the current state of the server. sigrecompute - Command to recalculate the signature of the computer's configuration. singlesignon - Command for all single sign on available actions. virtualmedia - Command for inserting and removing virtual media. iLO REPOSITORY COMMANDS deletecomp - Deletes components/binaries from the iLO Repository. downloadcomp - Downloads components/binaries from the iLO Repository. flashfwpkg - Flashes fwpkg components using the iLO repository. installset - Manages install sets for iLO. listcomp - Lists components/binaries from the iLO Repository. maintenancewindow - Manages the maintenance windows for iLO. makeinstallset - Creates install sets for iLO. taskqueue - Manages the update task queue for iLO. uploadcomp - Upload components/binary to the iLO Repository.

Providing a specific command will list help regarding that specific command.

iLOrest > help login Usage: login [URL] [OPTIONS] To login remotely run using iLO url and iLO credentials example: login

The alternate syntax to list details regarding a command is -h.

iLOrest > login -h Usage: login [URL] [OPTIONS] To login remotely run using iLO url and iLO credentials example: login

Syntax

help [command] [optional parameters]

Description

Displays command-line syntax and help menus for individual commands. Use this command if you want to know more about a command or need help using a command. Alternatively, you can use the command without specifying a particular command if you wish to see all the available commands and options.

Parameters

Supplying a command to help will display the help message corresponding to the given command, as well as the options relating to that particular command.

If no command is provided, the help command will list and provide a brief description of all available commands.

Running the command with the –h or –help command will display information on how to use the command.

Use the provided configuration file instead of the default one.

Use the provided directory as the location to cache data (default location: ).

Inputs

None

Outputs

None

Login command

Login example commands:

To login remotely, supply the URL, username, and password for the server.

iLOrest > login xx.xx.xx.xx -u username -p password Discovering data...Done

Here the selector option has been included so that the type is selected once the user is logged in. You can prove that the type has indeed been selected when we enter the select command.

iLOrest > login xx.xx.xx.xx -u username -p password --select Bios. Discovering data...Done iLOrest > select Current selection: Bios.v1_0_0

An IPv4, IPv6, or hostname can be specified. IPv6 should use the following format.

iLOrest > login [xxxx::xxxx:xxxx:xxxx:xxxx] -u username -p password Discovering data...Done

Here a SSL certificate was included so iLOrest validates the HTTPS connection

iLOrest > login system.domain.net -u username -p password --https \path\to\SSLcert.crt Discovering data...Done

Here the URL, username, and password information are not specified here or in the configuration file, and the server was logged in to locally.

iLOrest > login Discovering data...Done

Syntax

login [URL] [User] [Password] [Optional Parameters]

Description

Connects to a server, establishes a secure session, and discovers data from iLO. If you are logging in to a local server, run the command without arguments. If you are not logging in to a local server, supply the URL argument along with the user and password options.

Usage in Other Commands

Login remotely as part of other commands by including the --url, (-u, --user), and (-p, --password) flags. Optionally include the --https flag to validate the SSL certificate when logging in. Locally you will be logged in automatically unless running in higher security modes (see Higher Security Modes).

Parameters

Connect to the server located at the provided URL.

Including the help flag will display help for the command.

Connect to the server as the provided user.

Connect to the server with the password corresponding to the given user.

Use the provided CA bundle or SSL certificate with your login to connect securely to the system in remote mode. This flag has no effect in local mode.

Optionally choose to set the includelogs flag. Doing so will include logs in the data retrieval process.

Use this option to limit long login times.

Optionally including the selector flag allows you to select a type to run while running the current command. Use this flag when you wish to select a type without entering another command, or if you wish to work with a type that is different from the one you currently have selected.

Optionally set a starting point for data collection. If you do not specify a starting point, the default path will be /rest/v1.

The path flag can only be specified at the time of login, so if you are already logged into the server, the path flag will not change the path. If you are entering a command that isn’t the login command, but includes your login information, you can still specify the path flag there.
  • --biospassword=BIOSPASSWORD

Select this flag to input a BIOS password. Include this flag if second-level BIOS authentication is needed for the command to execute.

This option is only used on Gen 9 systems.

Types command

Types example commands:

This command will list all the available types that you can select. The full list has been truncated for space.

iLOrest > login xx.xx.xx.xx -u username -p password Discovering data...Done iLOrest > types Type options: AccountService.v1_3_0 Bios.v1_0_0 CertificateCollection Chassis.v1_6_0 ChassisCollection ComputerSystem.v1_4_0 ComputerSystemCollection EthernetInterface.v1_4_1 EthernetInterfaceCollection EventDestinationCollection EventService.v1_0_8 HostInterface.v1_1_1 HostInterfaceCollection HpeBaseConfigs.v2_0_0 HpeBaseNetworkAdapter.v2_0_0 HpeBaseNetworkAdapterCollection HpeBiosMapping.v2_0_0 HpeCertAuth.v1_1_0 HpeCertificate.v1_0_0 HpeCertificateCollection HpeComponent.v1_0_1 HpeComponentCollection HpeComponentInstallSet.v1_0_3 HpeComponentInstallSetCollection HpeComponentUpdateTaskQueueCollection HpeDirectoryTest.v1_0_0 HpeESKM.v2_0_0 ...

This command simultaneously logs in to the server at the provided URL with the provided username and password, and list all the available types that you can select. The full list has been truncated here for space.

iLOrest > types --url xx.xx.xx.xx -u username -p password Discovering data...Done Type options: AccountService.v1_3_0 Bios.v1_0_0 CertificateCollection Chassis.v1_6_0 ChassisCollection ComputerSystem.v1_4_0 ComputerSystemCollection EthernetInterface.v1_4_1 EthernetInterfaceCollection EventDestinationCollection EventService.v1_0_8 HostInterface.v1_1_1 HostInterfaceCollection HpeBaseConfigs.v2_0_0 HpeBaseNetworkAdapter.v2_0_0 HpeBaseNetworkAdapterCollection HpeBiosMapping.v2_0_0 HpeCertAuth.v1_1_0 HpeCertificate.v1_0_0 HpeCertificateCollection HpeComponent.v1_0_1 HpeComponentCollection HpeComponentInstallSet.v1_0_3 HpeComponentInstallSetCollection HpeComponentUpdateTaskQueueCollection HpeDirectoryTest.v1_0_0 HpeESKM.v2_0_0 ...

Adding the option will return the full type name instead of the default simplified versions. This is only available on Redfish systems.

iLOrest > types --fulltypes Type options: #AccountService.v1_3_0.AccountService #Bios.v1_0_0.Bios #CertificateCollection.CertificateCollection #Chassis.v1_6_0.Chassis #ChassisCollection.ChassisCollection #ComputerSystem.v1_4_0.ComputerSystem #ComputerSystemCollection.ComputerSystemCollection #EthernetInterface.v1_4_1.EthernetInterface #EthernetInterfaceCollection.EthernetInterfaceCollection #EventDestinationCollection.EventDestinationCollection #EventService.v1_0_8.EventService #HostInterface.v1_1_1.HostInterface #HostInterfaceCollection.HostInterfaceCollection #HpeBaseConfigs.v2_0_0.HpeBaseConfigs #HpeBaseNetworkAdapter.v2_0_0.HpeBaseNetworkAdapter #HpeBaseNetworkAdapterCollection.HpeBaseNetworkAdapterCollection #HpeBiosMapping.v2_0_0.HpeBiosMapping #HpeCertAuth.v1_1_0.HpeCertAuth #HpeCertificate.v1_0_0.HpeCertificate #HpeCertificateCollection.HpeCertificateCollection #HpeComponent.v1_0_1.HpeComponent #HpeComponentCollection.HpeComponentCollection #HpeComponentInstallSet.v1_0_3.HpeComponentInstallSet #HpeComponentInstallSetCollection.HpeComponentInstallSetCollection #HpeComponentUpdateTaskQueueCollection.HpeComponentUpdateTaskQueueCollection #HpeDirectoryTest.v1_0_0.HpeDirectoryTest #HpeESKM.v2_0_0.HpeESKM ...

Syntax

types [Optional Parameters]

Description

The command displays all selectable types available within the currently logged in server. Types include a name as well as version information. Types represent the schema used for the resource and indicate the version of the schema. Version information is (for example: ). Major versions are not backwards compatible, but everything else is.

See the iLO RESTful API Data Model Reference at https://hewlettpackard.github.io/ilo-rest-api-docs/ for a list and description of all the possible types.

Parameters

Including the help flag will display help for the command.

Optionally include this flag if you would prefer to return the full type name instead of the simplified versions.

Login Parameters

The following parameters can be included to login to a server in the same line as the command is run.

If you are not logged in yet, use the provided iLO URL along with the user and password flags to login to the server in the same command.

If you are not logged in yet, use this flag along with the password and URL flags to login to a server in the same command.

  • -p Password, --password=PASSWORD

If you are not logged in yet, use this flag along with the user and URL flags to login. Use the provided iLO password corresponding to the username you gave to login.

Use the provided CA bundle or SSL certificate with your login to connect securely to the system in remote mode. This flag has no effect in local mode.

Optionally choose to set the includelogs flag. Doing so will include logs in the data retrieval process.

Use this option to limit long login times.

Optionally set a starting point for data collection. If you do not specify a starting point, the default path will be. (see Path Option for more information).

The path flag can only be specified at the time of login, so if you are already logged into the server, the path flag will not change the path. If you are entering a command that isn’t the login command, but includes your login information, you can still specify the path flag there.

Inputs

None

Outputs

None

Select command

Select example commands:

This command simultaneously logs in to the server at the provided URL (--url) with the provided username (-u) and password (-p), and selects the type.

Adding a period after the selected type will ensure the selection is limited to one type. For example, selecting **Bios** will select both **Bios.v1_0_0** and **HpeBiosMapping.v2_0_0**. Selecting **Bios.** will only select the **Bios.v1_0_0** type. Supplying the type version is not required. The selection **Bios.** and **Bios.v1_0_0** are identical. iLOrest > select ComputerSystem. --url xx.xx.xx.xx -u username -p password Discovering data...Done iLOrest > select Current selection: ComputerSystem.v1_4_0

Running the select command with no argument will return the current selection.

iLOrest > select Error: No type currently selected. Please use the 'types' command to get a list of types, or pass your type by using the '--selector' flag. iLOrest > select Bios. iLOrest > select Current selection: Bios.v1_0_0

Adding a period after the type selected, , limits the selection, preventing accidentally also selecting anything else starting with . This also removes the need to include the version.

iLOrest > select Bios iLOrest > select Current selection: HpeBiosMapping.v2_0_0, Bios.v1_0_0 iLOrest > select Bios. iLOrest > select Current selection: Bios.v1_0_0

iLOrest caches data once a type has been selected for the first time. To refresh a type with the most up to date information use the option.

iLOrest > select ComputerSystem. iLOrest > get Oem/Hpe/PowerOnMinutes Oem= Hpe= PowerOnMinutes=814088 iLOrest > select ComputerSystem. --refresh iLOrest > get Oem/Hpe/PowerOnMinutes Oem= Hpe= PowerOnMinutes=814089

Syntax

select [Type] [Optional Parameters]

Description

Use to choose a specific type to work with. Eligible types for selection are those listed by the types command. Because commands are entered individually in the RESTful Interface Tool, working with specific types requires that you highlight or select the particular type you are working with. Use the command to highlight a type so that you can work with it.

Usage in Other Commands

Select a type from another command by including the (--select, --selector) option flag followed by the type to select. Not all commands have the flag, run help on the command to see available options.

Parameters

Specify the type you want to select. Omitting a type to select will cause select to display the currently selected type.

Including the help flag will display help for the command.

  • --biospassword=BIOSPASSWORD

Select this flag to input a BIOS password. Include this flag if second-level BIOS authentication is needed for the command to execute.

This option is only used on Gen 9 systems.

Login Parameters

The following parameters can be included to login to a server in the same line as the command is run.

If you are not logged in yet, use the provided iLO URL along with the user and password flags to login to the server in the same command.

If you are not logged in yet, use this flag along with the password and URL flags to login to a server in the same command.

  • -p Password, --password=PASSWORD

If you are not logged in yet, use this flag along with the user and URL flags to login. Use the provided iLO password corresponding to the username you gave to login.

Use the provided CA bundle or SSL certificate with your login to connect securely to the system in remote mode. This flag has no effect in local mode.

Optionally choose to set the includelogs flag. Doing so will include logs in the data retrieval process.

Use this option to limit long login times.

Optionally set a starting point for data collection. If you do not specify a starting point, the default path will be. (see Path Option for more information).

The path flag can only be specified at the time of login, so if you are already logged into the server, the path flag will not change the path. If you are entering a command that isn’t the login command, but includes your login information, you can still specify the path flag there.

Inputs

None

Outputs

None

List command

arguments are not case-sensitive.

List command examples:

With a Type selected, run the command without arguments to list all properties within the selected type, including reserved properties. The full list has been truncated here for space.

iLOrest > select Bios. iLOrest > list @odata.context=/redfish/v1/$metadata#Bios.Bios @odata.etag=W/"02E13BA89B606F6F6F02950EB3CA676D" @odata.id=/redfish/v1/systems/1/bios/settings/ @odata.type=#Bios.v1_0_0.Bios AcpiHpet=Enabled AcpiRootBridgePxm=Enabled AcpiSlit=Enabled AdjSecPrefetch=Enabled AdminEmail="" AdminName="" AdminOtherInfo="" AdminPhone="" AdvCrashDumpMode=Disabled AdvancedMemProtection=AdvancedEcc AsrStatus=Enabled AsrTimeoutMinutes=Timeout10 AssetTagProtection=Unlocked AttributeRegistry=BiosAttributeRegistryU32.v1_2_10 AutoPowerOn=RestoreLastState BootMode=Uefi ...

Including the , option preserves the JSON structure of the type’s information. The full list has been truncated here for space.

iLOrest > select ComputerSystem. iLOrest > list --json { "@odata.context": "/redfish/v1/$metadata#ComputerSystem.ComputerSystem", "@odata.etag": "W/\"9D48B4B7\"", "@odata.id": "/redfish/v1/Systems/1/", "@odata.type": "#ComputerSystem.v1_4_0.ComputerSystem", "Actions": { "#ComputerSystem.Reset": { "ResetType@Redfish.AllowableValues": [ "On", "ForceOff", "ForceRestart", "Nmi", "PushPowerButton" ], "target": "/redfish/v1/Systems/1/Actions/ComputerSystem.Reset/" } }, "AssetTag": "", "Bios": { "@odata.id": "/redfish/v1/systems/1/bios/" }, "BiosVersion": "U32 v2.10 (12/14/2018)", "Boot": { "BootSourceOverrideTarget": "None", "BootSourceOverrideTarget@Redfish.AllowableValues": [ "None", "Cd", "Hdd", ...

To return specific properties or sub-properties include them as arguments. If the property you want to return is a sub-property add them in the form .

iLOrest > list @odata.id Boot/BootSourceOverrideMode AssetTag @odata.id=/redfish/v1/Systems/1/ AssetTag="" Boot= BootSourceOverrideMode=UEFI

Syntax

list [Property(s)] [Optional Parameters]

Description

Displays the current values of the properties of a selected type including reserved properties in human-readable and optionally JSON formats. Optionally include arguments to only return the values of those properties.

The list command does display reserved properties for types, while the get command does not.

Parameters

Supplying a property or multiple properties will cause list to display the current value for that particular property or properties. Otherwise, if you wish to retrieve all the properties, run without arguments. Use this command only after a type has already been selected. If the value you are looking up is not available, it will return with no contents found for that property entry.

Including the help flag will display help for the command.

  • --filter [FILTER_ATTRIBUTE=FILTER_VALUE]

Optionally set a filter value for a filter attribute. This uses the provided filter for the currently selected type. (see Filter Option for more information).

Use this flag to narrow down your results. For example, selecting a common type might return multiple objects that are all of that type. If you want to modify the properties of only one of those objects, use the filter flag to narrow down results based on properties.

Optionally include this flag if you wish to change the displayed output to JSON format. Preserving the JSON data structure can make the information easier to parse.

Optionally include the logout flag to log out of the server after this command is completed. You need to be logged in to use this flag.

Login Parameters

The following parameters can be included to login to a server in the same line as the command is run.

If you are not logged in yet, use the provided iLO URL along with the user and password flags to login to the server in the same command.

If you are not logged in yet, use this flag along with the password and URL flags to login to a server in the same command.

  • -p Password, --password=PASSWORD

If you are not logged in yet, use this flag along with the user and URL flags to login. Use the provided iLO password corresponding to the username you gave to login.

Use the provided CA bundle or SSL certificate with your login to connect securely to the system in remote mode. This flag has no effect in local mode.

Optionally choose to set the includelogs flag. Doing so will include logs in the data retrieval process.

Use this option to limit long login times.

Optionally set a starting point for data collection. If you do not specify a starting point, the default path will be. (see Path Option for more information).

The path flag can only be specified at the time of login, so if you are already logged into the server, the path flag will not change the path. If you are entering a command that isn’t the login command, but includes your login information, you can still specify the path flag there.

Inputs

None

Outputs

None

Info Command

Info command examples:

Omitting a property when using the info command causes info to list all available options, given that you have already selected a type. The full list has been truncated for space.

iLOrest > select Bios. iLOrest > info Info options: AcpiHpet AcpiRootBridgePxm AcpiSlit AdjSecPrefetch AdminEmail AdminName AdminOtherInfo AdminPhone

This command simultaneously logs in to the server at the provided URL (--url) with the provided username (-u) and password (-p), selects the type, and displays the information.

iLOrest > info PowerSupplies -u username -p password --url xx.xx.xx.xx --select Power. Discovering data...Done NAME PowerSupplies DESCRIPTION Details of the power supplies associated with this system or device TYPE array READ-ONLY True SUB-PROPERTIES Redundancy, Name, SerialNumber, MemberId, @odata.id, PowerCapacityWatts, Model, PartNumber, Status, LastPowerOutputWatts, SparePartNumber, RelatedItem, LineInputVoltageType, Oem, PowerSupplyType, LineInputVoltage, FirmwareVersion, Manufacturer

Multiple properties under the VirtualMedia type are specified. By passing multiple properties, it returns the information on all of the properties passed.

iLOrest > select VirtualMedia. iLOrest > info Image WriteProtected NAME Image DESCRIPTION The valid URI indicating the image that is mounted on this server. A null value indicates that no image exists. TYPE string null READ-ONLY False ************************************************** NAME WriteProtected DESCRIPTION Indicates whether the virtual media is protected against write operations. TYPE boolean null READ-ONLY False POSSIBLE VALUES True or False

Any Sub-Properties shown in an info response can be queried in the same form as set, list, and get: .

iLOrest > select ComputerSystem. iLOrest > info Boot NAME Boot DESCRIPTION The boot information for the current resource. TYPE object READ-ONLY False SUB-PROPERTIES BootSourceOverrideTarget, BootSourceOverrideTarget@Redfish.AllowableValues, BootSourceOverrideEnabled, BootSourceOverrideMode, UefiTargetBootSourceOverride@Redfish.AllowableValues, UefiTargetBootSourceOverride iLOrest > info Boot/BootSourceOverrideTarget NAME BootSourceOverrideTarget DESCRIPTION The current boot source to be used at next boot instead of the normal boot device, if BootSourceOverrideEnabled is true. TYPE string null READ-ONLY False

Syntax

info [Property(s)] [Optional Parameters]

Description

Displays detailed information about a property within a selected type. Information displayed includes the data type of the value, if the property is read-only or not, a brief description, possible values, and any sub-properties associated with the property.

Parameters

Including the help flag will display help for the command.

Optionally use the latest schema instead of the one requested by the file.

This might cause errors in some data retrieval due to differences in the schema’s organizational structure between versions.

Optionally include this flag if you wish to change the displayed output to JSON format. Preserving the JSON data structure makes the information easier to read.

Optionally include the logout flag to log out of the server after this command is completed. You need to be logged in to use this flag.

Login Parameters

The following parameters can be included to login to a server in the same line as the command is run.

If you are not logged in yet, use the provided iLO URL along with the user and password flags to login to the server in the same command.

If you are not logged in yet, use this flag along with the password and URL flags to login to a server in the same command.

  • -p Password, --password=PASSWORD

If you are not logged in yet, use this flag along with the user and URL flags to login. Use the provided iLO password corresponding to the username you gave to login.

Use the provided CA bundle or SSL certificate with your login to connect securely to the system in remote mode. This flag has no effect in local mode.

Optionally choose to set the includelogs flag. Doing so will include logs in the data retrieval process.

Use this option to limit long login times.

Optionally set a starting point for data collection. If you do not specify a starting point, the default path will be. (see Path Option for more information).

The path flag can only be specified at the time of login, so if you are already logged into the server, the path flag will not change the path. If you are entering a command that isn’t the login command, but includes your login information, you can still specify the path flag there.

Inputs

None

Outputs

None

Get command

Get example commands:

Using get without any property specified shows the properties of the selected type. The full list is truncated for space.

No reserved properties are shown with the get command. Arguments are not case-sensitive. iLOrest > select Bios. iLOrest > get AcpiHpet=Enabled AcpiRootBridgePxm=Enabled AcpiSlit=Enabled AdjSecPrefetch=Enabled AdminEmail="" AdminName=Michael L AdminOtherInfo="" AdminPhone="" ...

Using get with a specific property lists the current value of that property, given that a type has already been selected.

iLOrest > get AdminName AdminName=Jason E

This command simultaneously logs in to the server at the provided URL (--url) with the provided username (-u) and password (-p), selects the type, and the command is used to retrieve the property of

iLOrest > get BootOrderPolicy --url xx.xx.xx.xx -u username -p password --select Bios. Discovering data...Done BootOrderPolicy=RetryIndefinitely

Because the logout flag was included, the user is logged out of the server after the get command is performed.

iLOrest > select ComputerSystem. iLOrest > get AssetTag --logout AssetTag="" Logging session out.

Any Sub-Properties shown can be queried in the same form as set, list, and info: . You can also specify multiple properties to get simultaneously.

iLOrest > select ComputerSystem. iLOrest > get MemorySummary MemorySummary= Status= HealthRollup=OK TotalSystemPersistentMemoryGiB=0 TotalSystemMemoryGiB=32 iLOrest > get MemorySummary/Status MemorySummary/TotalSystemMemoryGiB AssetTag AssetTag="" MemorySummary= Status= HealthRollup=OK TotalSystemMemoryGiB=32

You can use the flag to narrow down your results to only properties that can be changed.

iLOrest > select ComputerSystem. iLOrest > get AssetTag="" BiosVersion=U32 v2.10 (12/14/2018) Boot= BootSourceOverrideTarget=None BootSourceOverrideTarget@Redfish.AllowableValues=None Cd Hdd Usb SDCard Utilities Diags BiosSetup Pxe UefiShell UefiHttp UefiTarget BootSourceOverrideEnabled=Disabled ... iLOrest > get --noreadonly AssetTag="" Boot= BootSourceOverrideTarget=None BootSourceOverrideEnabled=Disabled BootSourceOverrideMode=Legacy UefiTargetBootSourceOverride=None HostName=ahostname IndicatorLED=Unknown Oem= Hpe= EndOfPostDelaySeconds=None PowerOnDelay=Minimum ServerFQDN="" PowerAutoOn=RemainOff PostMode=None ProcessorJitterControl= Mode=Auto PostDiscoveryMode=None PowerRegulatorMode=OSControl

Syntax

get [Property(s)] [Optional Parameters]

Description

Displays the current value of a property of the currently selected type. Use this command only after a type has already been selected. If the value you are looking up is not available, it will return with no contents found for that property entry.

The difference between the get command and the list command is that the list command displays details about the reserved properties, while the get command does not.

Parameters

Supplying a property or multiple properties will cause get to display the current value for that particular property or properties. Otherwise, if you wish to retrieve all the properties, run without arguments. This is still assuming you have a type already selected.

Including the help flag will display help for the command.

---selector=SELECTOR

Optionally including the selector flag allows you to select a type to run while running the current command. Use this command to select a type without entering another command, or to work with a type that is different from the one currently selected.

  • --filter [FILTER_ATTRIBUTE=FILTER_VALUE]

Optionally set a filter value for a filter attribute. This uses the provided filter for the currently selected type. (see Filter Option for more information).

Use this flag to narrow down your results. For example, selecting a common type might return multiple objects that are all of that type. If you want to modify the properties of only one of those objects, use the filter flag to narrow down results based on properties.

Optionally include this flag to change the displayed output to JSON format. Preserving the JSON data structure makes the information easier to read.

Optionally include this flag to display properties that are not read-only. This is useful to see what is configurable with the selected type(s).

Optionally include the logout flag to log out of the server after this command is completed. You need to be logged in to use this flag.

Login Parameters

The following parameters can be included to login to a server in the same line as the command is run.

If you are not logged in yet, use the provided iLO URL along with the user and password flags to login to the server in the same command.

If you are not logged in yet, use this flag along with the password and URL flags to login to a server in the same command.

  • -p Password, --password=PASSWORD

If you are not logged in yet, use this flag along with the user and URL flags to login. Use the provided iLO password corresponding to the username you gave to login.

Use the provided CA bundle or SSL certificate with your login to connect securely to the system in remote mode. This flag has no effect in local mode.

Optionally choose to set the includelogs flag. Doing so will include logs in the data retrieval process.

Use this option to limit long login times.

Optionally set a starting point for data collection. If you do not specify a starting point, the default path will be. (see Path Option for more information).

The path flag can only be specified at the time of login, so if you are already logged into the server, the path flag will not change the path. If you are entering a command that isn’t the login command, but includes your login information, you can still specify the path flag there.

Inputs

None

Outputs

None

Set command

Arguments are not case-sensitive.

Set example commands:

You can set multiple properties from the same type simultaneously. Add quotes around the property and value to add spaces in the value.

Even though the get command shows **ServiceName** is set to **ExampleService** and **AdminName** set to **Jason E**, the commit command must be performed next for the changes to be updated on the server.
iLOrest > select Bios. iLOrest > get AdminName ServiceName AdminName="" ServiceName="" iLOrest > set "AdminName=Jason E" ServiceName=ExampleService iLOrest > get AdminName ServiceName AdminName=Jason E ServiceName=ExampleService

This command simultaneously logs in to the server at the provided URL (--url) with the provided username (-u) and password (-p), and then selects the type. The command is used to set the property to , and the commit flag has been added to apply the changes to the server.

iLOrest > set "AdminName=Jason E" --url xx.xx.xx.xx -u username -p password --select Bios. --commit Discovering data...Done Committing changes... One or more properties were changed and will not take effect until system is reset.

To revert your changes on a type you can use the refresh flag.

iLOrest > select Bios. iLOrest > get AdminName AdminName=Jason E iLOrest > set AdminName=JohnDoe iLOrest > get AdminName AdminName=JohnDoe iLOrest > select Bios. --refresh iLOrest > get AdminName AdminName=Jason E

Description

Changes the value of a property in a currently selected type. Multiple properties can be set simultaneously.

The changes set will be reflected on the server only after committing them.

Syntax

set [Property=Value] [Path] [Optional Parameters]

The syntax formats used to set properties can be tricky if not done correctly. See the following examples to illustrate how the syntax works.

Correct syntax. This sets the to John.

Correct syntax. If the property has a space in it, use quotes around the entire property/value pair. Here the has been set to John Doe.

Correct syntax. Use this syntax, only quotes with no value, to remove the property value.

Correct syntax. This is an alternate syntax that also removes the property and sets it to nothing. Use single quotes with nothing between them.

Correct syntax. This deletes the value.

This is incorrect syntax, and will not be correctly reflected on the server.

Parameters

Supplying a property and a value will stage an update to that property with the supplied value.

Including the help flag will display help for the command.

Optionally including the selector flag allows you to select a type to run while running the current command. Use this flag when you wish to select a type without entering another command, or if you wish to work with a type that is different from the one you currently have selected.

  • --filter [FILTER_ATTRIBUTE=FILTER_VALUE]

Optionally set a filter value for a filter attribute. This uses the provided filter for the currently selected type. (see Filter Option for more information).

Use this flag to narrow down your results. For example, selecting a common type might return multiple objects that are all of that type. If you want to modify the properties of only one of those objects, use the filter flag to narrow down results based on properties.

Optionally use the latest schema instead of the one requested by the file.

This might cause errors in some data retrieval due to differences in the schema’s organizational structure between versions.

Use this flag when you are ready to commit all pending changes. Some changes made in this way will be updated instantly, while others will be reflected the next time the server is started.

  • --biospassword=BIOSPASSWORD

Select this flag to input a BIOS password. Include this flag if second-level BIOS authentication is needed for the command to execute.

This option is only used on Gen 9 systems.

Use this flag to perform a reboot command function after completion of operations. For help with parameters and descriptions regarding the reboot flag, run .

Override the measures stopping the tool from writing over items that are system unique.

Optionally include the logout flag to log out of the server after this command is completed. You need to be logged in to use this flag.

Login Parameters

The following parameters can be included to login to a server in the same line as the command is run.

If you are not logged in yet, use the provided iLO URL along with the user and password flags to login to the server in the same command.

If you are not logged in yet, use this flag along with the password and URL flags to login to a server in the same command.

  • -p Password, --password=PASSWORD

If you are not logged in yet, use this flag along with the user and URL flags to login. Use the provided iLO password corresponding to the username you gave to login.

Use the provided CA bundle or SSL certificate with your login to connect securely to the system in remote mode. This flag has no effect in local mode.

Optionally choose to set the includelogs flag. Doing so will include logs in the data retrieval process.

Use this option to limit long login times.

Optionally set a starting point for data collection. If you do not specify a starting point, the default path will be. (see Path Option for more information).

The path flag can only be specified at the time of login, so if you are already logged into the server, the path flag will not change the path. If you are entering a command that isn’t the login command, but includes your login information, you can still specify the path flag there.

Inputs

None

Outputs

None

Save command

Save example commands:

Here, the server is logged into, Bios is selected, and the corresponding JSON file is saved to a local directory as the file ilorest.json. The ilorest.json file holds all the information regarding the selected type. Here, the save function was performed on the Bios type, so the file that was saved holds the information about The file holding that information looks like the following.

iLOrest > save --select Bios. --url xx.xx.xx.xx -u username -p password Discovering data...Done Saving configuration... Configuration saved to: ilorest.json

Example json file:

Use the multisave option to specify multiple types to save in a single file. This file can be sent to load in order to load multiple types with a single command. All type strings are delimited by a ','.

iLOrest > save --multisave Bios.,ComputerSystem. Discovering data...Done Saving configuration... Configuration saved to: ilorest.json

This command simultaneously logs in to the server at the provided URL (--url) with the provided username (-u) and password (-p), selects the type, saves the JSON response to a file called in a local directory, and then logs out.

iLOrest > save --select Bios. --url xx.xx.xx.xx -u username -p password -f BiosInfo.json --logout Discovering data...Done Saving configuration... Configuration saved to: BiosInfo.json Logging session out.

Syntax

save [Optional Parameters]

Description

Saves the JSON information of a selected type to a local file. Use this command along with the command when you want to modify properties of a selected type through file editing. Using this command saves a local copy of your selected type’s JSON information.

Parameters

Including the help flag will display help for the command.

  • -f FILENAME, --filename=FILENAME

Use this flag if you wish to use a different filename than the default one. The default filename is .

Optionally including the selector flag allows you to select a type to run while running the current command. Use this flag when you wish to select a type without entering another command, or if you wish to work with a type that is different from the one you currently have selected.

Optionally include this flag to save multiple types of single file. Override the currently selected type.

  • --filter [FILTER_ATTRIBUTE=FILTER_VALUE]

Optionally set a filter value for a filter attribute. This uses the provided filter for the currently selected type. (see Filter Option for more information).

Use this flag to narrow down your results. For example, selecting a common type might return multiple objects that are all of that type. If you want to modify the properties of only one of those objects, use the filter flag to narrow down results based on properties.

Optionally include this flag if you wish to change the displayed output to JSON format. Preserving the JSON data structure makes the information easier to read.

Optionally include this flag to encrypt a file using the key provided.

Optionally include the logout flag to log out of the server after this command is completed. You need to be logged in to use this flag.

Login Parameters

The following parameters can be included to login to a server in the same line as the command is run.

If you are not logged in yet, use the provided iLO URL along with the user and password flags to login to the server in the same command.

If you are not logged in yet, use this flag along with the password and URL flags to login to a server in the same command.

  • -p Password, --password=PASSWORD

If you are not logged in yet, use this flag along with the user and URL flags to login. Use the provided iLO password corresponding to the username you gave to login.

Use the provided CA bundle or SSL certificate with your login to connect securely to the system in remote mode. This flag has no effect in local mode.

Optionally choose to set the includelogs flag. Doing so will include logs in the data retrieval process.

Use this option to limit long login times.

Optionally set a starting point for data collection. If you do not specify a starting point, the default path will be. (see Path Option for more information).

The path flag can only be specified at the time of login, so if you are already logged into the server, the path flag will not change the path. If you are entering a command that isn’t the login command, but includes your login information, you can still specify the path flag there.

Inputs

None

Outputs

JSON file

Save a selected type to a file in JSON format. You can edit the values in the file, and then use the command to upload the changes to the server.

Load command

Load example commands:

If no filename is supplied with the (-f, --filename) option, save looks for a file named in the current working directory. Save will automatically select the required type to make changes.

iLOrest > load Loading configuration... Committing changes... One or more properties were changed and will not take effect until system is reset.

This command simultaneously logs in to the server at the provided URL (--url) with the provided username (-u) and password (-p) and load a file from the current working directory called .

iLOrest > load --url xx.xx.xx.xx -u username -p password -f biosconfig.json Discovering data...Done Loading configuration... Committing changes... One or more properties were changed and will not take effect until system is reset.

This is the multi-server configuration setup. You must pass in a multi-server file in the following format.

iLOrest > load -m mpfilename.txt -f biosconfig.json Discovering data...Done Loading configuration for multiple servers... Logging session out. Checking given server information... Create multiple processes to load configuration concurrently to all servers... Loading Configuration for xx.xx.xx.xx : SUCCESS Loading Configuration for xx.xx.xx.xy : SUCCESS All servers have been successfully configured.

All servers are configured concurrently. Because the filename tag is included, it searches for the file called and loads that information to the servers. If no values have changed, the load process is complete. If any property values have changed, the changes are committed and the user is logged out of the server. Logs of the entire process are then stored in the same location as the iLOrest logs.

--url 10.0.0.100 -u username -p password --url 10.0.0.101 -u username -p password --url 10.0.0.102 -u username -p password --url 10.0.0.103 -u username -p password

Syntax

load [Optional Parameters]

Description

Loads the server configuration from a file. Run this command without parameters to use the configuration found in the file called . Otherwise, you can point this command to use any file you specify. Use this function to change the properties of a type to new values. This command uploads the new values of the type’s properties to the server.

Read-only properties are skipped, and non-read only properties continue to be set.

Parameters

Including the help flag will display help for the command.

  • -f FILENAME, --filename=FILENAME

Use this flag if you wish to use a different filename than the default one. The default filename is .

Optionally use the latest schema instead of the one requested by the file.

This might cause errors in some data retrieval due to differences in the schema’s organizational structure between versions.
  • --biospassword=BIOSPASSWORD

Select this flag to input a BIOS password. Include this flag if second-level BIOS authentication is needed for the command to execute.

This option is only used on Gen 9 systems.

Override the measures stopping the tool from writing over items that are system unique.

  • -m MPFILENAME, --multiprocessing=MPFILENAME

Optionally supply a filename to a multi-processing file to load concurrently on multiple servers.

  • -o OUTDIRECTORY, --outputdirectory=OUTDIRECTORY

Use the provided directory to output data for a multiple server configuration.

Optionally include this flag to decrypt a file using the key provided.

Optionally include the logout flag to log out of the server after this command is completed. You need to be logged in to use this flag.

Login Parameters

The following parameters can be included to login to a server in the same line as the command is run.

If you are not logged in yet, use the provided iLO URL along with the user and password flags to login to the server in the same command.

If you are not logged in yet, use this flag along with the password and URL flags to login to a server in the same command.

  • -p Password, --password=PASSWORD

If you are not logged in yet, use this flag along with the user and URL flags to login. Use the provided iLO password corresponding to the username you gave to login.

Use the provided CA bundle or SSL certificate with your login to connect securely to the system in remote mode. This flag has no effect in local mode.

Inputs

JSON Object

Input a JSON object to load from a custom configuration file, otherwise the configuration will default to looking for a file called .

Outputs

None

Status command

Status example commands:

The status command shows changes to be committed. The status command shows all pending changes, including changes for different types.

iLOrest > status Current changes found: Bios.v1_0_0(/redfish/v1/systems/1/bios/settings/) (Currently selected) Attributes/ServiceName=simpleservice ComputerSystem.v1_4_0(/redfish/v1/Systems/1/) AssetTag=newtag

Once changes are committed they no longer show in status.

iLOrest > status Current changes found: Bios.v1_0_0(/redfish/v1/systems/1/bios/settings/) (Currently selected) Attributes/ServiceName=simpleservice ComputerSystem.v1_4_0(/redfish/v1/Systems/1/) AssetTag=newtag iLOrest > commit Committing changes... One or more properties were changed and will not take effect until system is reset. The operation completed successfully. iLOrest > status No changes found

Syntax

status [Optional Parameters]

Description

Displays all pending changes, regardless of which type is currently selected. All the changes that have not been committed yet will be shown.

Parameters

Including the help flag will display help for the command.

Inputs

None

Outputs

None

Commit command

Commit example commands:

Commit all pending changes made by set by running the command.

Источник: [https://torrent-igruha.org/3551-portal.html]
IP-Upload v1.1.1 serial key or number

Last modified: September 22nd, 2020

Getting started

Cloudflare's API exposes the entire Cloudflare infrastructure via a standardized programmatic interface. Using Cloudflare's API, you can do just about anything you can do on cloudflare.com via the customer dashboard.

The Cloudflare API is a RESTful API based on HTTPS requests and JSON responses. If you are registered with Cloudflare, you can obtain your API key from the bottom of the "API Tokens" page, found here: Go to My account.

What is Cloudflare?

Cloudflare makes sites lightning fast, protects them from attacks, ensures they are always online, and makes it simple to add web apps with a single click. Every month, more than 1.8 billion people experience a faster, safer, better Internet thanks to Cloudflare.

Audience for APIs

Cloudflare offers public APIs with three audiences in mind.

  1. Cloudflare customers
  2. Cloudflare partners
  3. Developers

Customers: Individuals and organizations all over the world choose Cloudflare to protect and accelerate their web applications. Most customers manage their settings in the web dashboard, built using these APIs. Virtually anything you can do in the customer dashboard may be done via API. Example: purging the Cloudflare edge cache for a single file when it's updated on the origin server.

Partners: Many organizations make using Cloudflare a seamless option for improving their customers' performance and security. These APIs make that easier to do at scale. Example: a Cloudflare Certified Hosting Partner may use APIs to toggle basic security mode inside a hosting control panel.

Developers: Developers all over the world create useful applications which tie into Cloudflare services. These applications may include plugins and extensions to popular content management systems, apps that are offered in the Cloudflare Apps marketplace, runbooks for specific deployment systems, and many others.

Do's and Don'ts

What can you build with Cloudflare APIs?

Anything that's useful and follows the guidelines presented here.

What should you avoid doing with Cloudflare APIs?

Do not do any of the following:

  • Abuse Cloudflare systems or customers
  • Misuse Cloudflare trademarks
  • Misrepresent Cloudflare services as your own

Abuse: Follow all guidelines, including the rate limits defined below. Your ability to use the Cloudflare APIs may be terminated, temporarily or permanently, if our systems are abused. Similarly, anything in an application which goes against the goal of making Cloudflare more useful to Cloudflare customers or attempts to mistreat customers or their data will be grounds for termination.

Trademarks: Cloudflare has several registered trademarks. Details on how and when you may use Cloudflare trademarks are found at https://www.cloudflare.com/trademark, with links to specifics on logo use and spelling. Please review carefully.

Misrepresentation: Draw a clear line between the benefits you provide in your application and those benefits of the Cloudflare service that you enable via API. The APIs are not intended for "white labeling" or reselling Cloudflare services as your own. Nothing in your service or application should create a false sense of endorsement, sponsorship, or association with Cloudflare. You may sell your own application or service which utilizes the Cloudflare APIs, but may not sell Cloudflare services to customers without a commercial agreement with Cloudflare.

The full Cloudflare Terms of Use are found at https://www.cloudflare.com/terms.

getting-started-endpoints

Endpoints

The API is accessed by making HTTPS requests to a specific version endpoint URL, in which GET, POST, PUT, PATCH, and DELETE methods dictate how your interact with the information available. Every endpoint is accessed only via the SSL-enabled HTTPS (port 443) protocol.

Everything (methods, parameters, etc.) is fixed to a version number, and every call must contain one. The latest version is Version 4.

The stable base URL for all Version 4 HTTPS endpoints is:

https://api.cloudflare.com/client/v4/

getting-started-requests

Requests

Requests must be sent over HTTPS with any payload formatted in JSON. Depending on if a request is authenticated with the new API Tokens or the old API Keys, required headers differ and are detailed below.

API Tokens

API Tokens provide a new way to authenticate with the Cloudflare API. They allow for scoped and permissioned access to resources and use the RFC compliant Authorization Bearer Token Header.

Required parameters

API Token cURL (example)

curl -X GET "https://api.cloudflare.com/client/v4/zones/cd7d0123e3012345da9420df9514dad0" \ -H "Content-Type:application/json" \ -H "Authorization: Bearer YQSn-xWAQiiEh9qM58wZNnyQS7FUdoqGIUAbrh7T"

API Keys

All requests must include both X-Auth-Key and X-Auth-Email headers to authenticate. Requests that use X-Auth-User-Service-Key can use that instead of the Auth-Key and Auth-Email headers.

Required parameters

NameFormatDescription
API KeyX-Auth-KeyAPI key generated on the "My Account" page
EmailX-Auth-EmailEmail address associated with your account
User Service KeyX-Auth-User-Service-KeyA special Cloudflare API key good for a restricted set of endpoints. Always begins with "v1.0-", may vary in length.

Auth-Email cURL (example)

curl -X GET "https://api.cloudflare.com/client/v4/zones/cd7d0123e3012345da9420df9514dad0" \ -H "Content-Type:application/json" \ -H "X-Auth-Key:1234567893feefc5f0q5000bfo0c38d90bbeb" \ -H "X-Auth-Email:example@example.com"

User-Service cURL (example)

curl -X GET "https://api.cloudflare.com/client/v4/zones/cd7d0123e3012345da9420df9514dad0" \ -H "Content-Type:application/json" \ -H "X-Auth-User-Service-Key:v1.0-e24fd090c02efcfecb4de8f4ff246fd5c75b48946fdf0ce26c59f91d0d90797b-cfa33fe60e8e34073c149323454383fc9005d25c9b4c502c2f063457ef65322eade065975001a0b4b4c591c5e1bd36a6e8f7e2d4fa8a9ec01c64c041e99530c2-07b9efe0acd78c82c8d9c690aacb8656d81c369246d7f996a205fe3c18e9254a"`
NameTypeDescription
pageintegerWhich page of results to return
per_pageintegerHow many results to return per page
orderstringAttribute name to order the responses by
directionstringEither asc or desc
cURL (example)
GET zones/:zone_identifier/dns_records
curl -X GET "https://api.cloudflare.com/client/v4/zones/cd7d068de3012345da9420df9514dad0/dns_records?page=3&per_page=20&order=type&direction=asc" \ -H "Content-Type:application/json" \ -H "X-Auth-Key:1234567893feefc5f0q5000bfo0c38d90bbeb" \ -H "X-Auth-Email:example@example.com"
getting-started-responses

Responses

Format

Each response is a JSON object. The data requested is wrapped in the result tag. If you have a response, it will always be within the result field. We also include a success flag, an array of potential errors, and messages in the response. Some responses can have additional pagination info wrapped in the result_info

An error object will contain an integer code field and a message

Date fields will always be in UTC ISO-8601 format, including microseconds.

Success Response (example)
{ "result": { "id":"2d4d028de3015345da9420df5514dad0", "type":"A", "name":"blog.example.com", "content":"2.6.4.5", "proxiable":true, "proxied":false, "ttl":1, "priority":0, "locked":false, "zone_id":"cd7d068de3012345da9420df9514dad0", "zone_name":"example.com", "modified_on":"2014-05-28T18:46:18.764425Z", "created_on":"2014-05-28T18:46:18.764425Z" }, "success": true, "errors": [], "messages": [], "result_info": { "page": 1, "per_page": 20, "count": 1, "total_count": 200 } }
Error Response (example)
{ "result": null, "success": false, "errors": [{"code":1003,"message":"Invalid or missing zone id."}], "messages": [] }
Content-TypeDescription
application/jsonresponse is a JSON object
text/plainresponse is a textual item
application/x-yamlresponse is a YAML object
application/octet-streamresponse is a raw data (reserved for later use)
CodeStatusDescription
200OKrequest successful
304Not Modified
400Bad Requestrequest was invalid
401Unauthorizeduser does not have permission
403Forbiddenrequest not authenticated
429Too many requestsclient is rate limited
405Method Not Allowedincorrect HTTP method provided
415Unsupported Media Typeresponse is not valid JSON
getting-started-resource-ids

How to get a Zone ID, User ID, or Organization ID

Nearly every resource in the v4 API (Users, Zones, Settings, Organizations, etc.) may be uniquely identified by a 32-byte string of hex characters (). These identifiers may be referred to in the documentation as , , or even just . Identifier values are usually captured during resource creation (POST requests) or when fetching entire collections (GET requests) of resources. Typically they appear as an field in the JSON resource.

{ "result": { "id":"2d4d028de3015345da9420df5514dad0", "type":"example" } }

You can always find the IDs for API resources by making a GET request to its corresponding collection endpoint. For example, to list all Zone objects, a GET request may be sent to https://api.cloudflare.com/client/v4/zones. All objects listed in the result array will contain an field; this is also known as .

How to Get a Zone ID

curl -X GET "https://api.cloudflare.com/client/v4/zones" \ -H "X-Auth-Email: user@example.com" \ -H "X-Auth-Key: c2547eb745079dac9320b638f5e225cf483cc5cfdda41" \ -H "Content-Type: application/json"

User

The currently logged in/authenticated User

useruser-user-details
cURL (example)
curl -X GET "https://api.cloudflare.com/client/v4/user" \ -H "X-Auth-Email: user@example.com" \ -H "X-Auth-Key: c2547eb745079dac9320b638f5e225cf483cc5cfdda41" \ -H "Content-Type: application/json"
Response (example)
{ "success": true, "errors": [], "messages": [], "result": { "id": "7c5dae5552338874e5053f2534d2767a", "email": "user@example.com", "first_name": "John", "last_name": "Appleseed", "username": "cfuser12345", "telephone": "+1 123-123-1234", "country": "US", "zipcode": "12345", "created_on": "2014-01-01T05:20:00Z", "modified_on": "2014-01-01T05:20:00Z", "two_factor_authentication_enabled": false, "suspended": false } }
user-edit-user

Optional parameters

cURL (example)
curl -X PATCH "https://api.cloudflare.com/client/v4/user" \ -H "X-Auth-Email: user@example.com" \ -H "X-Auth-Key: c2547eb745079dac9320b638f5e225cf483cc5cfdda41" \ -H "Content-Type: application/json" \ --data '{"first_name":"John","last_name":"Appleseed","telephone":"+1 123-123-1234","country":"US","zipcode":"12345"}'
Response (example)
{ "success": true, "errors": [], "messages": [], "result": { "id": "7c5dae5552338874e5053f2534d2767a", "email": "user@example.com", "first_name": "John", "last_name": "Appleseed", "username": "cfuser12345", "telephone": "+1 123-123-1234", "country": "US", "zipcode": "12345", "created_on": "2014-01-01T05:20:00Z", "modified_on": "2014-01-01T05:20:00Z", "two_factor_authentication_enabled": false, "suspended": false } }

User API Tokens

Tokens that can be used to access Cloudflare v4 APIs

user-api-tokensuser-api-tokens-list-tokens

Optional parameters

cURL (example)
curl -X GET "https://api.cloudflare.com/client/v4/user/tokens?page=1&per_page=20&direction=desc" \ -H "Authorization: Bearer 8M7wS6hCpXVc-DoRnPPY_UCWPgy8aea4Wy6kCe5T"
Response (example)
{ "success": true, "errors": [], "messages": [], "result": [ { "id": "ed17574386854bf78a67040be0a770b0", "name": "readonly token", "status": "active", "issued_on": "2018-07-01T05:20:00Z", "modified_on": "2018-07-02T05:20:00Z", "not_before": "2018-07-01T05:20:00Z", "expires_on": "2020-01-01T00:00:00Z", "policies": [ { "id": "f267e341f3dd4697bd3b9f71dd96247f", "effect": "allow", "resources": { "com.cloudflare.api.account.zone.eb78d65290b24279ba6f44721b3ea3c4": "*", "com.cloudflare.api.account.zone.22b1de5f1c0e4b3ea97bb1e963b06a43": "*" }, "permission_groups": [ { "id": "c8fed203ed3043cba015a93ad1616f1f", "name": "Zone Read" }, { "id": "82e64a83756745bbbb1c9c2701bf816b", "name": "DNS Read" } ] } ], "condition": { "request.ip": { "in": [ "199.27.128.0/21", "2400:cb00::/32" ], "not_in": [ "199.27.128.0/21", "2400:cb00::/32" ] } } } ] }
user-api-tokens-create-token

Required parameters

Optional parameters

cURL (example)
curl -X POST "https://api.cloudflare.com/client/v4/user/tokens" \ -H "Authorization: Bearer 8M7wS6hCpXVc-DoRnPPY_UCWPgy8aea4Wy6kCe5T" \ -H "Content-Type: application/json" \ --data '{"name":"readonly token","not_before":"2018-07-01T05:20:00Z","expires_on":"2020-01-01T00:00:00Z","policies":[{"id":"f267e341f3dd4697bd3b9f71dd96247f","effect":"allow","resources":{"com.cloudflare.api.account.zone.eb78d65290b24279ba6f44721b3ea3c4":"*","com.cloudflare.api.account.zone.22b1de5f1c0e4b3ea97bb1e963b06a43":"*"},"permission_groups":[{"id":"c8fed203ed3043cba015a93ad1616f1f","name":"Zone Read"},{"id":"82e64a83756745bbbb1c9c2701bf816b","name":"DNS Read"}]}],"condition":{"request.ip":{"in":["199.27.128.0/21","2400:cb00::/32"],"not_in":["199.27.128.0/21","2400:cb00::/32"]}}}'
Response (example)
{ "success": true, "errors": [], "messages": [], "result": { "id": "ed17574386854bf78a67040be0a770b0", "name": "readonly token", "status": "active", "issued_on": "2018-07-01T05:20:00Z", "modified_on": "2018-07-02T05:20:00Z", "not_before": "2018-07-01T05:20:00Z", "expires_on": "2020-01-01T00:00:00Z", "policies": [ { "id": "f267e341f3dd4697bd3b9f71dd96247f", "effect": "allow", "resources": { "com.cloudflare.api.account.zone.eb78d65290b24279ba6f44721b3ea3c4": "*", "com.cloudflare.api.account.zone.22b1de5f1c0e4b3ea97bb1e963b06a43": "*" }, "permission_groups": [ { "id": "c8fed203ed3043cba015a93ad1616f1f", "name": "Zone Read" }, { "id": "82e64a83756745bbbb1c9c2701bf816b", "name": "DNS Read" } ] } ], "condition": { "request.ip": { "in": [ "199.27.128.0/21", "2400:cb00::/32" ], "not_in": [ "199.27.128.0/21", "2400:cb00::/32" ] } }, "value": "8M7wS6hCpXVc-DoRnPPY_UCWPgy8aea4Wy6kCe5T" } }
user-api-tokens-token-details
cURL (example)
curl -X GET "https://api.cloudflare.com/client/v4/user/tokens/ed17574386854bf78a67040be0a770b0" \ -H "Authorization: Bearer 8M7wS6hCpXVc-DoRnPPY_UCWPgy8aea4Wy6kCe5T"
Response (example)
{ "success": true, "errors": [], "messages": [], "result": { "id": "ed17574386854bf78a67040be0a770b0", "name": "readonly token", "status": "active", "issued_on": "2018-07-01T05:20:00Z", "modified_on": "2018-07-02T05:20:00Z", "not_before": "2018-07-01T05:20:00Z", "expires_on": "2020-01-01T00:00:00Z", "policies": [ { "id": "f267e341f3dd4697bd3b9f71dd96247f", "effect": "allow", "resources": { "com.cloudflare.api.account.zone.eb78d65290b24279ba6f44721b3ea3c4": "*", "com.cloudflare.api.account.zone.22b1de5f1c0e4b3ea97bb1e963b06a43": "*" }, "permission_groups": [ { "id": "c8fed203ed3043cba015a93ad1616f1f", "name": "Zone Read" }, { "id": "82e64a83756745bbbb1c9c2701bf816b", "name": "DNS Read" } ] } ], "condition": { "request.ip": { "in": [ "199.27.128.0/21", "2400:cb00::/32" ], "not_in": [ "199.27.128.0/21", "2400:cb00::/32" ] } } } }
user-api-tokens-update-token

Optional parameters

cURL (example)
curl -X PUT "https://api.cloudflare.com/client/v4/user/tokens/ed17574386854bf78a67040be0a770b0" \ -H "Authorization: Bearer 8M7wS6hCpXVc-DoRnPPY_UCWPgy8aea4Wy6kCe5T" \ -H "Content-Type: application/json" \ --data '{"id":"ed17574386854bf78a67040be0a770b0","name":"readonly token","status":"active","issued_on":"2018-07-01T05:20:00Z","modified_on":"2018-07-02T05:20:00Z","not_before":"2018-07-01T05:20:00Z","expires_on":"2020-01-01T00:00:00Z","policies":[{"id":"f267e341f3dd4697bd3b9f71dd96247f","effect":"allow","resources":{"com.cloudflare.api.account.zone.eb78d65290b24279ba6f44721b3ea3c4":"*","com.cloudflare.api.account.zone.22b1de5f1c0e4b3ea97bb1e963b06a43":"*"},"permission_groups":[{"id":"c8fed203ed3043cba015a93ad1616f1f","name":"Zone Read"},{"id":"82e64a83756745bbbb1c9c2701bf816b","name":"DNS Read"}]}],"condition":{"request.ip":{"in":["199.27.128.0/21","2400:cb00::/32"],"not_in":["199.27.128.0/21","2400:cb00::/32"]}}}'
Response (example)
{ "success": true, "errors": [], "messages": [], "result": { "id": "ed17574386854bf78a67040be0a770b0", "name": "readonly token", "status": "active", "issued_on": "2018-07-01T05:20:00Z", "modified_on": "2018-07-02T05:20:00Z", "not_before": "2018-07-01T05:20:00Z", "expires_on": "2020-01-01T00:00:00Z", "policies": [ { "id": "f267e341f3dd4697bd3b9f71dd96247f", "effect": "allow", "resources": { "com.cloudflare.api.account.zone.eb78d65290b24279ba6f44721b3ea3c4": "*", "com.cloudflare.api.account.zone.22b1de5f1c0e4b3ea97bb1e963b06a43": "*" }, "permission_groups": [ { "id": "c8fed203ed3043cba015a93ad1616f1f", "name": "Zone Read" }, { "id": "82e64a83756745bbbb1c9c2701bf816b", "name": "DNS Read" } ] } ], "condition": { "request.ip": { "in": [ "199.27.128.0/21", "2400:cb00::/32" ], "not_in": [ "199.27.128.0/21", "2400:cb00::/32" ] } } } }
user-api-tokens-delete-token
cURL (example)
curl -X DELETE "https://api.cloudflare.com/client/v4/user/tokens/ed17574386854bf78a67040be0a770b0" \ -H "Authorization: Bearer 8M7wS6hCpXVc-DoRnPPY_UCWPgy8aea4Wy6kCe5T"
Response (example)
{ "success": true, "errors": [], "messages": [], "result": { "id": "9a7806061c88ada191ed06f989cc3dac" } }
user-api-tokens-roll-token
cURL (example)
curl -X PUT "https://api.cloudflare.com/client/v4/user/tokens/ed17574386854bf78a67040be0a770b0/value" \ -H "Authorization: Bearer 8M7wS6hCpXVc-DoRnPPY_UCWPgy8aea4Wy6kCe5T" \ -H "Content-Type: application/json" \ --data '{}'
Response (example)
{ "success": true, "errors": [], "messages": [], "result": "8M7wS6hCpXVc-DoRnPPY_UCWPgy8aea4Wy6kCe5T" }
user-api-tokens-verify-token
cURL (example)
curl -X GET "https://api.cloudflare.com/client/v4/user/tokens/verify" \ -H "Authorization: Bearer 8M7wS6hCpXVc-DoRnPPY_UCWPgy8aea4Wy6kCe5T"
Response (example)
{ "success": true, "errors": [], "messages": [], "result": { "id": "ed17574386854bf78a67040be0a770b0", "status": "active", "not_before": "2018-07-01T05:20:00Z", "expires_on": "2020-01-01T00:00:00Z" } }

Permission Groups

Named groups of permissions used for creating API Tokens access policies

permission-groupspermission-groups-list-permission-groups
cURL (example)
curl -X GET "https://api.cloudflare.com/client/v4/user/tokens/permission_groups" \ -H "Authorization: Bearer 8M7wS6hCpXVc-DoRnPPY_UCWPgy8aea4Wy6kCe5T"
Response (example)
{ "success": true, "errors": [], "messages": [], "result": [ { "id": "7cf72faf220841aabcfdfab81c43c4f6", "name": "Billing Read", "scopes": [ "com.cloudflare.api.account" ] }, { "id": "9d24387c6e8544e2bc4024a03991339f", "name": "Load Balancing: Monitors and Pools Read", "scopes": [ "com.cloudflare.api.account" ] }, { "id": "d2a1802cc9a34e30852f8b33869b2f3c", "name": "Load Balancing: Monitors and Pools Write", "scopes": [ "com.cloudflare.api.account" ] }, { "id": "8b47d2786a534c08a1f94ee8f9f599ef", "name": "Workers KV Storage Read", "scopes": [ "com.cloudflare.api.account" ] }, { "id": "f7f0eda5697f475c90846e879bab8666", "name": "Workers KV Storage Write", "scopes": [ "com.cloudflare.api.account" ] }, { "id": "1a71c399035b4950a1bd1466bbe4f420", "name": "Workers Scripts Read", "scopes": [ "com.cloudflare.api.account" ] }, { "id": "e086da7e2179491d91ee5f35b3ca210a", "name": "Workers Scripts Write", "scopes": [ "com.cloudflare.api.account" ] } ] }

User's Account Memberships

A list of memberships of accounts this user can access

user-s-account-membershipsuser-s-account-memberships-list-memberships

Optional parameters

cURL (example)
curl -X GET "https://api.cloudflare.com/client/v4/memberships?status=accepted&account.name=Demo Account&page=1&per_page=20&order=status&direction=desc" \ -H "X-Auth-Email: user@example.com" \ -H "X-Auth-Key: c2547eb745079dac9320b638f5e225cf483cc5cfdda41" \ -H "Content-Type: application/json"
Response (example)
Источник: [https://torrent-igruha.org/3551-portal.html]
.

What’s New in the IP-Upload v1.1.1 serial key or number?

Screen Shot

System Requirements for IP-Upload v1.1.1 serial key or number

Add a Comment

Your email address will not be published. Required fields are marked *