The Palisade API enables programmatic interaction with the various features of the Palisade platform
https://docs.ripple.com/_mock/products/palisade/api-docs/palisade-api/palisade-api-1/
https://api.sandbox.palisade.co/
https://api.palisade.co/
- Mock server
https://docs.ripple.com/_mock/products/palisade/api-docs/palisade-api/palisade-api-1/v2/audit/firehose/configuration
- Sandbox server (uses TESTNET data, private keys and accounts)
https://api.sandbox.palisade.co/v2/audit/firehose/configuration
- Palisade server (uses MAINNET data, private keys and accounts)
https://api.palisade.co/v2/audit/firehose/configuration
- curl
- JavaScript
- Node.js
- Python
- Java
- C#
- PHP
- Go
- Ruby
- R
- Payload
curl -i -X GET \
https://docs.ripple.com/_mock/products/palisade/api-docs/palisade-api/palisade-api-1/v2/audit/firehose/configuration \
-H 'Authorization: YOUR_API_KEY_HERE'ARN of the role for the Palisade auditor to assume for Firehose access. Must have firehose:PutRecordBatch permissions on the stream.
Last error message if any
{ "streamName": "audit-logs-stream", "region": "eu-west-2", "assumeRoleArn": "arn:aws:iam::123456789012:role/my-audit-logs-role", "status": { "state": "FIREHOSE_CONFIG_STATE_PENDING", "lastError": "User: arn:aws:iam::663932549156:user/audit-service is not authorized to perform: sts:AssumeRole", "lastErrorAt": "2022-03-29T10:22:22.420Z", "consecutiveFailures": 3, "successfulUploads": 120, "failedUploads": 30 } }
ARN of the role for the Palisade auditor to assume for Firehose access. Must have firehose:PutRecordBatch permissions on the stream.
- Mock server
https://docs.ripple.com/_mock/products/palisade/api-docs/palisade-api/palisade-api-1/v2/audit/firehose/configuration
- Sandbox server (uses TESTNET data, private keys and accounts)
https://api.sandbox.palisade.co/v2/audit/firehose/configuration
- Palisade server (uses MAINNET data, private keys and accounts)
https://api.palisade.co/v2/audit/firehose/configuration
- curl
- JavaScript
- Node.js
- Python
- Java
- C#
- PHP
- Go
- Ruby
- R
- Payload
curl -i -X PUT \
https://docs.ripple.com/_mock/products/palisade/api-docs/palisade-api/palisade-api-1/v2/audit/firehose/configuration \
-H 'Authorization: YOUR_API_KEY_HERE' \
-H 'Content-Type: application/json' \
-d '{
"streamName": "audit-logs-stream",
"region": "eu-west-2",
"assumeRoleArn": "arn:aws:iam::123456789012:role/my-audit-logs-role",
"enabled": true
}'ARN of the role for the Palisade auditor to assume for Firehose access. Must have firehose:PutRecordBatch permissions on the stream.
Last error message if any
{ "streamName": "audit-logs-stream", "region": "eu-west-2", "assumeRoleArn": "arn:aws:iam::123456789012:role/my-audit-logs-role", "status": { "state": "FIREHOSE_CONFIG_STATE_PENDING", "lastError": "User: arn:aws:iam::663932549156:user/audit-service is not authorized to perform: sts:AssumeRole", "lastErrorAt": "2022-03-29T10:22:22.420Z", "consecutiveFailures": 3, "successfulUploads": 120, "failedUploads": 30 } }