/AWS1/IF_IOT=>LISTDETECTMIGACTIONSEXECS()¶
About ListDetectMitigationActionsExecutions¶
Lists mitigation actions executions for a Device Defender ML Detect Security Profile.
Requires permission to access the ListDetectMitigationActionsExecutions action.
Method Signature¶
METHODS /AWS1/IF_IOT~LISTDETECTMIGACTIONSEXECS
IMPORTING
!IV_TASKID TYPE /AWS1/IOTMIGACTIONSTASKID OPTIONAL
!IV_VIOLATIONID TYPE /AWS1/IOTVIOLATIONID OPTIONAL
!IV_THINGNAME TYPE /AWS1/IOTDEVDEFENDERTHINGNAME OPTIONAL
!IV_STARTTIME TYPE /AWS1/IOTTIMESTAMP OPTIONAL
!IV_ENDTIME TYPE /AWS1/IOTTIMESTAMP OPTIONAL
!IV_MAXRESULTS TYPE /AWS1/IOTMAXRESULTS OPTIONAL
!IV_NEXTTOKEN TYPE /AWS1/IOTNEXTTOKEN OPTIONAL
RETURNING
VALUE(OO_OUTPUT) TYPE REF TO /aws1/cl_iotlstdetectmigacte01
RAISING
/AWS1/CX_IOTINTERNALFAILUREEX
/AWS1/CX_IOTINVALIDREQUESTEX
/AWS1/CX_IOTTHROTTLINGEX
/AWS1/CX_IOTCLIENTEXC
/AWS1/CX_IOTSERVEREXC
/AWS1/CX_RT_TECHNICAL_GENERIC
/AWS1/CX_RT_SERVICE_GENERIC.
IMPORTING¶
Optional arguments:¶
iv_taskid TYPE /AWS1/IOTMIGACTIONSTASKID /AWS1/IOTMIGACTIONSTASKID¶
The unique identifier of the task.
iv_violationid TYPE /AWS1/IOTVIOLATIONID /AWS1/IOTVIOLATIONID¶
The unique identifier of the violation.
iv_thingname TYPE /AWS1/IOTDEVDEFENDERTHINGNAME /AWS1/IOTDEVDEFENDERTHINGNAME¶
The name of the thing whose mitigation actions are listed.
iv_starttime TYPE /AWS1/IOTTIMESTAMP /AWS1/IOTTIMESTAMP¶
A filter to limit results to those found after the specified time. You must specify either the startTime and endTime or the taskId, but not both.
iv_endtime TYPE /AWS1/IOTTIMESTAMP /AWS1/IOTTIMESTAMP¶
The end of the time period for which ML Detect mitigation actions executions are returned.
iv_maxresults TYPE /AWS1/IOTMAXRESULTS /AWS1/IOTMAXRESULTS¶
The maximum number of results to return at one time. The default is 25.
iv_nexttoken TYPE /AWS1/IOTNEXTTOKEN /AWS1/IOTNEXTTOKEN¶
The token for the next set of results.
RETURNING¶
oo_output TYPE REF TO /aws1/cl_iotlstdetectmigacte01 /AWS1/CL_IOTLSTDETECTMIGACTE01¶
Domain /AWS1/RT_ACCOUNT_ID Primitive Type NUMC
Examples¶
Syntax Example¶
This is an example of the syntax for calling the method. It includes every possible argument and initializes every possible value. The data provided is not necessarily semantically accurate (for example the value "string" may be provided for something that is intended to be an instance ID, or in some cases two arguments may be mutually exclusive). The syntax shows the ABAP syntax for creating the various data structures.
DATA(lo_result) = lo_client->listdetectmigactionsexecs(
iv_endtime = '20150101000000.0000000'
iv_maxresults = 123
iv_nexttoken = |string|
iv_starttime = '20150101000000.0000000'
iv_taskid = |string|
iv_thingname = |string|
iv_violationid = |string|
).
This is an example of reading all possible response values
lo_result = lo_result.
IF lo_result IS NOT INITIAL.
LOOP AT lo_result->get_actionsexecutions( ) into lo_row.
lo_row_1 = lo_row.
IF lo_row_1 IS NOT INITIAL.
lv_mitigationactionstaskid = lo_row_1->get_taskid( ).
lv_violationid = lo_row_1->get_violationid( ).
lv_mitigationactionname = lo_row_1->get_actionname( ).
lv_devicedefenderthingname = lo_row_1->get_thingname( ).
lv_timestamp = lo_row_1->get_executionstartdate( ).
lv_timestamp = lo_row_1->get_executionenddate( ).
lv_detectmitigationactione = lo_row_1->get_status( ).
lv_detectmitigationactione_1 = lo_row_1->get_errorcode( ).
lv_errormessage = lo_row_1->get_message( ).
ENDIF.
ENDLOOP.
lv_nexttoken = lo_result->get_nexttoken( ).
ENDIF.