Vulnerabilities API - PUT mute or unmute a remediation item

  • Reference

Set the mute status of a remediation tracking process group or, in the case of Kubernetes vulnerabilities, of a remediation tracking Kubernetes node, to mute or unmute.

The request consumes an application/json payload.

PUTManagedDynatrace for Governmenthttps://{your-domain}/e/{your-environment-id}/api/v2/securityProblems/{id}/remediationItems/{remediationItemId}/muteState
Environment and Cluster ActiveGate (default port 9999)https://{your-activegate-domain}:9999/e/{your-environment-id}/api/v2/securityProblems/{id}/remediationItems/{remediationItemId}/muteState

Authentication

To execute this request, you need an access token with securityProblems.write scope.

To learn how to obtain and use it, see Tokens and authentication.

Parameters

ParameterTypeDescriptionInRequired
idstring

The ID of the requested third-party security problem.

pathRequired
remediationItemIdstring

The ID of the remediation item.

pathRequired
bodyRemediationItemMuteStateChange

The JSON body of the request. Contains the mute state information to be applied.

bodyOptional

Request body objects

The RemediationItemMuteStateChange object

An updated configuration of the remediation item's mute state.

ElementTypeDescriptionRequired
commentstring

A comment about the mute state change reason.

Required
mutedboolean

The desired mute state of the remediation item.

Required
reasonstring

The reason for the mute state change.

The element can hold these values
  • AFFECTED
  • CONFIGURATION_NOT_AFFECTED
  • FALSE_POSITIVE
  • IGNORE
  • INITIAL_STATE
  • OTHER
  • VULNERABLE_CODE_NOT_IN_USE
Required

Request body JSON model

This is a model of the request body, showing the possible elements. It has to be adjusted for usage in an actual request.

{
"comment": "string",
"muted": true,
"reason": "IGNORE"
}

Response

Response codes

CodeTypeDescription
200-

Success. The requested mute state has been applied to the remediation item.

204-

Not executed. The remediation item was previously put into the requested mute state by the same user with the same reason and comment.

4XXErrorEnvelope

Client side error.

5XXErrorEnvelope

Server side error.

Response body objects

The ErrorEnvelope object

ElementTypeDescription
errorError-

The Error object

ElementTypeDescription
codeinteger

The HTTP status code

constraintViolationsConstraintViolation[]

A list of constraint violations

messagestring

The error message

The ConstraintViolation object

A list of constraint violations

ElementTypeDescription
locationstring-
messagestring-
parameterLocationstring-
The element can hold these values
  • HEADER
  • PATH
  • PAYLOAD_BODY
  • QUERY
pathstring-

Response body JSON models

{
"error": {
"code": 1,
"constraintViolations": [
{
"location": "string",
"message": "string",
"parameterLocation": "HEADER",
"path": "string"
}
],
"message": "string"
}
}

Example

Mute the PROCESS_GROUP-70DF2C1374244F5A remediation item of the 8788643471842202915 vulnerability from the GET request example. The response code of 200 indicates a successful request.

Curl

curl --request PUT \
--url https://mySampleEnv.live.dynatrace.com/api/v2/securityProblems/8788643471842202915/remediationItems/PROCESS_GROUP-70DF2C1374244F5A/muteState \
--header 'Authorization: Api-Token [your_token]' \
--header 'Content-Type: application/json' \
--data '{
"muted": true,
"reason": "OTHER",
"comment": "API test"
}'

Request URL

https://mySampleEnv.live.dynatrace.com/api/v2/securityProblems/8788643471842202915/remediationItems/PROCESS_GROUP-70DF2C1374244F5A/muteState

Request body

{
"muted": true,
"reason": "OTHER",
"comment": "API test"
}

Response code

200