Set the mute status of a remediation tracking process group or, in the case of Kubernetes vulnerabilities, of a remediation tracking Kubernetes node, to mute or unmute.
The request consumes an application/json payload.
| PUT | SaaS | https://{your-environment-id}.live.dynatrace.com/api/v2/securityProblems/{id}/remediationItems/{remediationItemId}/muteState |
| Environment ActiveGateCluster ActiveGate | https://{your-activegate-domain}:9999/e/{your-environment-id}/api/v2/securityProblems/{id}/remediationItems/{remediationItemId}/muteState |
To execute this request, you need an access token with securityProblems.write scope.
To learn how to obtain and use it, see Tokens and authentication.
| Parameter | Type | Description | In | Required |
|---|---|---|---|---|
| id | string | The ID of the requested third-party security problem. | path | required |
| remediationItemId | string | The ID of the remediation item. | path | required |
| body | Remediation | The JSON body of the request. Contains the mute state information to be applied. | body | optional |
RemediationItemMuteStateChange objectAn updated configuration of the remediation item's mute state.
| Element | Type | Description | Required |
|---|---|---|---|
| comment | string | A comment about the mute state change reason. | required |
| muted | boolean | The desired mute state of the remediation item. | required |
| reason | string | The reason for the mute state change.
| required |
This is a model of the request body, showing the possible elements. It has to be adjusted for usage in an actual request.
{"comment": "string","muted": true,"reason": "IGNORE"}
| Code | Type | Description |
|---|---|---|
| 200 | - | Success. The requested mute state has been applied to the remediation item. |
| 204 | - | Not executed. The remediation item was previously put into the requested mute state by the same user with the same reason and comment. |
| 4XX | Error | Client side error. |
| 5XX | Error | Server side error. |
Mute the PROCESS_GROUP-70DF2C1374244F5A remediation item of the 8788643471842202915 vulnerability from the GET request example. The response code of 200 indicates a successful request.
curl --request PUT \--url https://mySampleEnv.live.dynatrace.com/api/v2/securityProblems/8788643471842202915/remediationItems/PROCESS_GROUP-70DF2C1374244F5A/muteState \--header 'Authorization: Api-Token [your_token]' \--header 'Content-Type: application/json' \--data '{"muted": true,"reason": "OTHER","comment": "API test"}'
https://mySampleEnv.live.dynatrace.com/api/v2/securityProblems/8788643471842202915/remediationItems/PROCESS_GROUP-70DF2C1374244F5A/muteState
{"muted": true,"reason": "OTHER","comment": "API test"}
200