Overview
The UpGuard Core API provides a feature rich method of interacting with many Core features in a programatic way. The API comes in two versions, version 1 and version 2. Version 1 is not recommended for use as it has been deprecated, but still exists for backwards compatibility. For more information on the differences between the two versions, please see the section below on API v1 vs. V2.
Authentication is achieved via an API key and secret pair and can be provided
to the server using either the Authentication
header, or using Basic Auth
.
Accessing API Key and Secret
Aside from a few API endpoints that are considered standard operations and are required for general usage, a secret key must be provided along with the API key on each request to gain access to the rest of the API methods.
Only one secret key is created per account and it is automatically generated when you enable or disable the the API through the account management page.
- To access your account keys, firstly login and then click on your Account Name in the top
right of the website, then click Manage⦠from the drop down list.
- Click on your account name to bring up the account management page.
- Finally, enable API Access to generate your API Secret Key.
Authentication Methods
There are 2 ways to form the API request headers for Authorization
:
- The
Authorization
request header is formed by concatenating your Service API Key and your Secret Key:
Authorization: Token token="[Service API Key][Secret Key]"
- Alternatively, the
Authorization
request header can also be formed with the Basic Auth method, where the username is supplied with theService API Key
, and the password will be yourSecret Key
.
cURL Example
Authorization Header
curl -H 'Authorization: Token token="[Service API Key][Secret Key]"' https://app.upguard.com/api/v2/nodes.json
Basic Auth
curl --user [Service API Key]:[Secret Key] https://app.upguard.com/api/v2/nodes.json
PowerShell client users are highly recommended to use the HTTPS endpoints instead of HTTP. The Windows .NET Framework does not propagate the original request headers as a security measure. While the HTTP endpoints will redirect (via a 301 status code) to the corresponding HTTPS endpoints, PowerShell will drop the authorization token headers during the redirect, resulting in a 401 Unauthorized Error as a response.
API v1 vs. v2
Version 1 of the API has been deprecated.
While v1 and v2 of the UpGuard API are similar, and in many cases identical, there are important differences which are noted here.
-
Parts of the v1 API have been deprecated. The v1 API as a whole is no longer under active development, and will not receive new features or bugfixes.
-
The v2 API is capable of working with parts of UpGuard that v1 is not. For example, v2 has support for Connection Manager Groups and Policies.
Incompatible Changes
-
Some URLs have changed for more consistent behavior across the API. For example, the Connection Manager API index is queried at
/api/v2/connection_managers.json
instead of/api/v1/connection_managers
. - The structure of JSON data returned by API endpoints may differ
between v1 and v2.
- Sometimes this is additive, and should not affect code written for the v1 API. For example, the v2 Nodes API returns the same data as v1, with extra data fields added.
- However, some endpoints return very different data.
- Some v1 API endpoints have been deprecated. Deprecated v1 APIs are marked as such in the API v1 endpoint documentation.
If you are considering a migration, please consult the documentation for each API endpoint that you require.
Usage Recommendations
Because v1 of the API is deprecated, and does not include some of the functionality provided in v2, we encourage customers to use v2 for new development.
However, v1 is not end-of-life and will continue to work normally for the foreseeable future. If v1 provides the features that you require, it is not necessary to migrate at this time.
Saving Requests
If you are planning to use the API for development work or for an extended period of time, using an app such as Postman can help you save time by saving queries and nicely formatting (and presenting) JSON responses.
HTTP Status Code Summary
Code | Status | Description |
---|---|---|
200 | OK | Everything worked as expected |
201 | Created | A new record was successfully created after a POST request |
204 | No Content | A record was successfully updated after a PUT request |
400 | Bad Request | Submitting malformed JSON or bad syntax |
401 | Unauthorized | No valid API key provided |
403 | Forbidden | Parameters were valid but request failed due to lack of permissions. (e.g. Trying to show details of a node that is not yours.) |
422 | Unprocessable Entity | The request is logically incorrect - often missing a required parameter. (e.g. Not specifying a policy_id when asking for a list of policy versions.) |
500-504 | Server Errors | Server errors |
Ignoring self-signed Certificates
If your appliance is using a self-signed certificate, you may need to implicitly trust the server before making an API request. Simply add this to the script in question, and all web requests will ignore the self-signed certificate.
cURL
Add the -k
option to ignore SSL certificate checks.
PowerShell
Ruby
If using HTTParty
, add the :verify => false
option.
response = HTTParty.get(url, :headers => <auth_headers>, :verify => false)