Skip to content

/AWS1/CL_IOT=>LISTDETECTMIGACTIONSEXECS()

About ListDetectMitigationActionsExecutions

Lists mitigation actions executions for a Device Defender ML Detect Security Profile.

Requires permission to access the ListDetectMitigationActionsExecutions action.

Method Signature

IMPORTING

Optional arguments:

iv_taskid TYPE /AWS1/IOTMIGACTIONSTASKID /AWS1/IOTMIGACTIONSTASKID

The unique identifier of the task.

iv_violationid TYPE /AWS1/IOTVIOLATIONID /AWS1/IOTVIOLATIONID

The unique identifier of the violation.

iv_thingname TYPE /AWS1/IOTDEVDEFENDERTHINGNAME /AWS1/IOTDEVDEFENDERTHINGNAME

The name of the thing whose mitigation actions are listed.

iv_starttime TYPE /AWS1/IOTTIMESTAMP /AWS1/IOTTIMESTAMP

A filter to limit results to those found after the specified time. You must specify either the startTime and endTime or the taskId, but not both.

iv_endtime TYPE /AWS1/IOTTIMESTAMP /AWS1/IOTTIMESTAMP

The end of the time period for which ML Detect mitigation actions executions are returned.

iv_maxresults TYPE /AWS1/IOTMAXRESULTS /AWS1/IOTMAXRESULTS

The maximum number of results to return at one time. The default is 25.

iv_nexttoken TYPE /AWS1/IOTNEXTTOKEN /AWS1/IOTNEXTTOKEN

The token for the next set of results.

RETURNING

oo_output TYPE REF TO /aws1/cl_iotlstdetectmigacte01 /AWS1/CL_IOTLSTDETECTMIGACTE01

Domain /AWS1/RT_ACCOUNT_ID
Primitive Type NUMC

Examples

Syntax Example

This is an example of the syntax for calling the method. It includes every possible argument and initializes every possible value. The data provided is not necessarily semantically accurate (for example the value "string" may be provided for something that is intended to be an instance ID, or in some cases two arguments may be mutually exclusive). The syntax shows the ABAP syntax for creating the various data structures.

DATA(lo_result) = lo_client->/aws1/if_iot~listdetectmigactionsexecs(
  iv_endtime = '20150101000000.0000000'
  iv_maxresults = 123
  iv_nexttoken = |string|
  iv_starttime = '20150101000000.0000000'
  iv_taskid = |string|
  iv_thingname = |string|
  iv_violationid = |string|
).

This is an example of reading all possible response values

lo_result = lo_result.
IF lo_result IS NOT INITIAL.
  LOOP AT lo_result->get_actionsexecutions( ) into lo_row.
    lo_row_1 = lo_row.
    IF lo_row_1 IS NOT INITIAL.
      lv_mitigationactionstaskid = lo_row_1->get_taskid( ).
      lv_violationid = lo_row_1->get_violationid( ).
      lv_mitigationactionname = lo_row_1->get_actionname( ).
      lv_devicedefenderthingname = lo_row_1->get_thingname( ).
      lv_timestamp = lo_row_1->get_executionstartdate( ).
      lv_timestamp = lo_row_1->get_executionenddate( ).
      lv_detectmitigationactione = lo_row_1->get_status( ).
      lv_detectmitigationactione_1 = lo_row_1->get_errorcode( ).
      lv_errormessage = lo_row_1->get_message( ).
    ENDIF.
  ENDLOOP.
  lv_nexttoken = lo_result->get_nexttoken( ).
ENDIF.