PATH:
opt
/
imunify360
/
venv
/
lib
/
python3.11
/
site-packages
/
im360
/
simple_rpc
/
schema
�� }�(�get�}�(�help��List incidents ��return_type��IncidentsAgentResponse��cli�}��users�]��root�as�type��dict��schema�}�(�by_abuser_ip�}�(�type��string��nullable���help��Filter by abuser IP address �u�by_country_code�}�(�type��string��nullable���help��Filter by country code �u� by_panel_user�}�(�type��string��nullable���help��Filter by panel user domains �u� by_plugin�}�(�type��string��nullable���help��2Filter by plugin name (e.g., modsec, ossec, etc.) �u�by_list�}�(�type��list��nullable���schema�}�(�type��string��allowed�]�(�white��black��gray�eu�help�� (internal)�u� by_purpose�}�(�type��list��nullable���schema�}�(�type��string��allowed�]�(�white��drop��captcha�eu�help�� (internal)�u�severity�}�(�type��integer��coerce��int��nullable���help���Filter by minimum severity (1-15). See https://www.ossec.net/docs/manual/rules-decoders/rule-levels.html for details on severity levels. �u�search�}�(�type��string��nullable���help��)Search by IP address, name, description. �u�limit�}�(�type��integer��coerce��int��default�K2�help�� Page size�u�offset�}�(�type��integer��coerce��int��default�K �help��Page offset�u�since�}�(�type��integer��coerce��int��excludes��period�� check_with�]�� timestamp�a�help��*Show incidents after this unix timestamp. �u�to�}�(�type��integer��coerce��int�� check_with�]�� timestamp�a�default_setter��now��help��+Show incidents before this unix timestamp. �u�period�}�(�type��period��coerce��period��excludes��since��help�� (internal)�u�order_by�}�(�type��list��schema�}�(�type��order_by��coerce��order_by�u�nullable���help���List of fields to order by, each followed by a `+` (ascending) or `-` (descending). E.g. `["severity+","timestamp-"]` would order by event severity ascending and timestamp descending. �uuu�clean�}�(�help�� (internal)��cli�}��users�]��root�as�type��dict��schema�}�(�days�}�(�type��integer��coerce��int��min�K � check_with�]��max_days�au�limit�}�(�type��integer��coerce��int�uuuu.
[-] myimunify.yaml
[edit]
[-] uninstall-cleanup.pickle
[edit]
[-] incidents.yaml
[edit]
[-] configuration_management.pickle
[edit]
[-] custom-lists.pickle
[edit]
[-] control-panel.pickle
[edit]
[-] smtp-blocking.pickle
[edit]
[-] conflicts.pickle
[edit]
[-] whitelist_rbl.pickle
[edit]
[-] control-panel.yaml
[edit]
[-] configuration_management.yaml
[edit]
[-] malware-generic-event.yaml
[edit]
[-] hosting-panel.pickle
[edit]
[-] proactive.pickle
[edit]
[-] myimunify.pickle
[edit]
[-] whitelist_rbl.yaml
[edit]
[-] whitelisted-crawlers.pickle
[edit]
[-] kcarectl.pickle
[edit]
[-] ignored-rules.pickle
[edit]
[-] incidents.pickle
[edit]
[-] remote_proxy.pickle
[edit]
[-] ignored-rules.yaml
[edit]
[-] malware-generic-event.pickle
[edit]
[-] conflicts.yaml
[edit]
[-] remote_proxy.yaml
[edit]
[-] smtp-blocking.yaml
[edit]
[-] smart_advice.yaml
[edit]
[-] proactive.yaml
[edit]
[-] features.pickle
[edit]
[-] import.pickle
[edit]
[-] uninstall-cleanup.yaml
[edit]
[-] import.yaml
[edit]
[-] smart_advice.pickle
[edit]
[-] features.yaml
[edit]
[-] hosting-panel.yaml
[edit]
[-] whitelist-domain.pickle
[edit]
[-] kcarectl.yaml
[edit]
[-] health.yaml
[edit]
[-] whitelisted-crawlers.yaml
[edit]
[+]
..
[+]
lists
[-] whitelist-domain.yaml
[edit]
[-] custom-lists.yaml
[edit]
[-] health.pickle
[edit]