/AWS1/CL_IOT=>LISTDETECTMIGACTIONSEXECS()
¶
About ListDetectMitigationActionsExecutions¶
Lists mitigation actions executions for a Device Defender ML Detect Security Profile.
Requires permission to access the ListDetectMitigationActionsExecutions action.
Method Signature¶
IMPORTING¶
Optional arguments:¶
iv_taskid
TYPE /AWS1/IOTMIGACTIONSTASKID
/AWS1/IOTMIGACTIONSTASKID
¶
The unique identifier of the task.
iv_violationid
TYPE /AWS1/IOTVIOLATIONID
/AWS1/IOTVIOLATIONID
¶
The unique identifier of the violation.
iv_thingname
TYPE /AWS1/IOTDEVDEFENDERTHINGNAME
/AWS1/IOTDEVDEFENDERTHINGNAME
¶
The name of the thing whose mitigation actions are listed.
iv_starttime
TYPE /AWS1/IOTTIMESTAMP
/AWS1/IOTTIMESTAMP
¶
A filter to limit results to those found after the specified time. You must specify either the startTime and endTime or the taskId, but not both.
iv_endtime
TYPE /AWS1/IOTTIMESTAMP
/AWS1/IOTTIMESTAMP
¶
The end of the time period for which ML Detect mitigation actions executions are returned.
iv_maxresults
TYPE /AWS1/IOTMAXRESULTS
/AWS1/IOTMAXRESULTS
¶
The maximum number of results to return at one time. The default is 25.
iv_nexttoken
TYPE /AWS1/IOTNEXTTOKEN
/AWS1/IOTNEXTTOKEN
¶
The token for the next set of results.
RETURNING¶
oo_output
TYPE REF TO /aws1/cl_iotlstdetectmigacte01
/AWS1/CL_IOTLSTDETECTMIGACTE01
¶
Domain /AWS1/RT_ACCOUNT_ID Primitive Type NUMC
Examples¶
Syntax Example¶
This is an example of the syntax for calling the method. It includes every possible argument and initializes every possible value. The data provided is not necessarily semantically accurate (for example the value "string" may be provided for something that is intended to be an instance ID, or in some cases two arguments may be mutually exclusive). The syntax shows the ABAP syntax for creating the various data structures.
DATA(lo_result) = lo_client->/aws1/if_iot~listdetectmigactionsexecs(
iv_endtime = '20150101000000.0000000'
iv_maxresults = 123
iv_nexttoken = |string|
iv_starttime = '20150101000000.0000000'
iv_taskid = |string|
iv_thingname = |string|
iv_violationid = |string|
).
This is an example of reading all possible response values
lo_result = lo_result.
IF lo_result IS NOT INITIAL.
LOOP AT lo_result->get_actionsexecutions( ) into lo_row.
lo_row_1 = lo_row.
IF lo_row_1 IS NOT INITIAL.
lv_mitigationactionstaskid = lo_row_1->get_taskid( ).
lv_violationid = lo_row_1->get_violationid( ).
lv_mitigationactionname = lo_row_1->get_actionname( ).
lv_devicedefenderthingname = lo_row_1->get_thingname( ).
lv_timestamp = lo_row_1->get_executionstartdate( ).
lv_timestamp = lo_row_1->get_executionenddate( ).
lv_detectmitigationactione = lo_row_1->get_status( ).
lv_detectmitigationactione_1 = lo_row_1->get_errorcode( ).
lv_errormessage = lo_row_1->get_message( ).
ENDIF.
ENDLOOP.
lv_nexttoken = lo_result->get_nexttoken( ).
ENDIF.