list¶
The fugue list
command returns a list of environment details, events, families, groups, invites, rules, rule waivers, scans, or users.
list¶
List a collection of resources Usage: fugue list [command] Available Commands: environments Lists details for multiple environments events List environment events families List details for multiple families groups Lists details for multiple groups invites Lists details for multiple invites rules List rules in the organization rule-waivers List rule waivers in the organization scans List scans belonging to an environment users Lists details for multiple users Flags: -h, --help help for list Global Flags: --output string The formatting style for command output [table | json] (default "table") Use "fugue list [command] --help" for more information about a command.
list environments¶
Lists details for multiple environments
Usage:
fugue list environments [flags]
Aliases:
environments, envs, env
Flags:
--all Retrieve all environments
--arn string AWS Role arn filter (substring match)
--columns strings Columns to show (default [ID,Name,Provider,Regions,HasBaseline,ScanInterval,ScanStatus])
-h, --help help for environments
--id string ID filter (substring match, including provider account identifiers)
--max-items int Max items to return (default 100)
--name string Name filter (substring match, case insensitive)
--offset int Offset into results
--order-by string Order by attribute (default "name")
--order-direction string Order by direction [asc | desc] (default "asc")
--provider string Provider filter
--search string Combined filter for id (including provider account identifiers), name, and provider
--status string Scan Status filter (exact match)
Global Flags:
--output string The formatting style for command output [table | json] (default "table")
Note
For detailed information about a single environment, see fugue get environment.
list events¶
Arguments:
[environment_id]
List environment events
Usage:
fugue list events [environment_id] [flags]
Flags:
--change strings Change
--columns strings columns to show (default [EventType,CreatedAt,ResourceID,ResourceType,Change,OldState,NewState])
--event-type strings Event types
-h, --help help for events
--max-items int Max items (default 20)
--offset int Offset
--range-from int Range from
--range-to int Range to
--remediated strings Enforced
--resource-type strings Resource types
Global Flags:
--output string The formatting style for command output [table | json] (default "table")
list families¶
Lists details for multiple families
Usage:
fugue list families [flags]
Aliases:
families, family
Flags:
--all Retrieve all families
--always-enabled string Always Enabled filter (substring match, case insensitive)
--columns strings Columns to show (default [ID,Name,Source,Description,Providers,Recommended,AlwaysEnabled])
--description string Description filter (substring match, case insensitive)
-h, --help help for families
--id string ID filter (substring match, case sensitive)
--max-items int Max items to return (default 100)
--name string Name filter (substring match, case insensitive)
--offset int Offset into results
--order-by string Order by attribute (default "name")
--order-direction string Order by direction [asc | desc] (default "asc")
--providers string Providers filter (substring match, case insensitive)
--recommended string Recommended filter (substring match, case insensitive)
--search string Combined filter for Id, Name, Description, Provider, Source and Recommended
--source string Source filter (substring match, case insensitive)
Global Flags:
--output string The formatting style for command output [table | json] (default "table")
list groups¶
Lists details for multiple groups
Usage:
fugue list groups [flags]
Flags:
--all Retrieve all groups
-h, --help help for groups
--max-items int Max items to return (default 10)
--offset int Offset into results
--order-by string Order by attribute (default "name")
--order-direction string Order by direction [asc | desc] (default "asc")
Global Flags:
--output string The formatting style for command output [table | json] (default "table")
list invites¶
Lists details for multiple invites
Usage:
fugue list invites [flags]
Flags:
--all Retrieve all invites
--email string Retrieve invites with a provided email address
-h, --help help for invites
--max-items int Max items to return (default 100)
--offset int Offset into results
--order-direction string Order by direction [asc | desc] (default "asc")
Global Flags:
--output string The formatting style for command output [table | json] (default "table")
Note
For detailed information about a single invite, see fugue get invite.
list rules¶
List rules in the organization
Usage:
fugue list rules [flags]
Flags:
--columns strings Columns to show (default [ID,Name,Provider,Severity,ResourceType,Status,Description,Families])
-h, --help help for rules
Global Flags:
--output string The formatting style for command output [table | json] (default "table")
Note
For detailed information about a single rule, see fugue get rule.
list rule-waivers¶
List rule waivers in the organization
Usage:
fugue list rule-waivers [flags]
Aliases:
rule-waivers, waivers, rule_waivers
Flags:
--all Retrieve all environments
--columns strings Columns to show (default [ID,Name,EnvironmentID,EnvironmentName,RuleID,ResourceID,ResourceType,ResourceProvider,ResourceTag])
--environment-id string Environment ID filter (substring match)
-h, --help help for rule waivers
--id string ID filter (substring match, including provider account identifiers)
--max-items int Max items to return (default 100)
--name string Name filter (substring match, case insensitive)
--offset int Offset into results
--order-by string Order by attribute (default "name")
--order-direction string Order by direction [asc | desc] (default "asc")
--resource-id string Resource ID filter (substring match)
--resource-provider string Resource Provider filter (substring match)
--resource-type string Resource Type filter (substring match)
--rule-id string Rule ID filter (substring match)
--search string Combined filter for ID, Name, and Rule ID
Global Flags:
--output string The formatting style for command output [table | json] (default "table")
Note
For detailed information about a single rule waiver, see fugue get rule-waiver.
list scans¶
Arguments:
[environment_id]
List scans belonging to an environment
Usage:
fugue list scans [environment_id] [flags]
Aliases:
scans, scan
Flags:
-h, --help help for scans
--max-items int max items to return (default 20)
--offset int offset into results
--order-by string order by attribute
--order-direction string order by direction [asc | desc]
--range-from int Range from time filter
--range-to int Range to time filter
--status strings Scan status filter [IN_PROGRESS | SUCCESS | ERROR]
Global Flags:
--output string The formatting style for command output [table | json] (default "table")
Note
For detailed information about a single scan, see fugue get scan.
list users¶
Lists details for multiple users
Usage:
fugue list users [flags]
Flags:
--all Retrieve all users
--email string Retrieve users with a provided email address
-h, --help help for users
--max-items int Max items to return (default 100)
--offset int Offset into results
--order-direction string Order by direction [asc | desc] (default "asc")
Global Flags:
--output string The formatting style for command output [table | json] (default "table")
Note
For detailed information about a single user, see fugue get user.
Output Attributes¶
Environment Details Output¶
The fugue list environments output includes the following attributes:
ID
ID of the environment.
NAME
Name of the environment.
PROVIDER
Name of the provider for the environment. Values -
aws
,aws_govcloud
,azure
(applies to both Azure and Azure Government environments),google
,repository
REGIONS
The AWS or AWS GovCloud region(s) to scan and enforce infrastructure in. Values - see Service Coverage.
"*"
denotes all regions. AWS and AWS GovCloud onlyHAS_BASELINE
Whether a baseline is enabled.
SCAN_INTERVAL
Time in seconds between the end of one scan to the start of the next.
SCAN_STATUS
Status of the current or most recently completed scan for the environment. Values -
CREATED
,QUEUED
,IN_PROGRESS
,ERROR
,SUCCESS
,CANCELED
Environment Events Output¶
The fugue list events output includes the following attributes:
EVENT_TYPE
Type of event.
DRIFT
,REMEDIATION
,COMPLIANCE
CREATED_AT
When the event occurred, Unix time.
RESOURCE_ID
ID of the resource given by the provider.
RESOURCE_TYPE
Resource type.
CHANGE
Type of change which occurred. Values -
ADDED
,MODIFIED
,REMOVED
OLD_STATE
Value of the attribute before the event.
NEW_STATE
Value of the attribute as a result of the event.
Families Output¶
The fugue list families output includes the following attributes:
ID
ID of the compliance family.
NAME
The name of the compliance family.
SOURCE
Lists whether the compliance family is created by the user or is a fugue-defined family.
CUSTOM
orFUGUE
DESCRIPTION
Lists the description for the compliance family.
PROVIDERS
Name of the cloud service provider for the environment. Values -
aws
,aws_govcloud
,azure
(applies to both Azure and Azure Government environments),google
RECOMMENDED
Lists whether the compliance family is included in the recommended compliance family list.
true
,t
,false
, orf
ALWAYS_ENABLED
Lists whether the compliance family is set to always run in your tenant.
true
,t
,false
, orf
Groups Output¶
The fugue list groups output includes the following attributes:
ID
ID of the group.
NAME
Name of the group.
POLICY
Name of the attached policy. Values -
fugue:ADMIN
,fugue:READONLY
,fugue:EDITOR
,fugue:AUDITOR
, orfugue:CONTRIBUTOR
.ENVIRONMENTS
Number of environments associated with the group.
USERS
Number of users attached to the group.
Invites Output¶
The fugue list invites output includes the following attributes:
ID
ID of the invite.
EMAIL
Email of the invited user.
GROUPS
Name of the attached group(s).
STATUS
Status of the invite. Values -
INVITE_EXPIRED
orINVITE_PENDING
.CREATED_AT
Date and time that the invite was sent.
EXPIRES_AT
Date and time that the invite expires.
Custom Rule Output¶
The fugue list rules output includes the following attributes:
ID
ID of the custom rule.
NAME
Human readable name of the custom rule.
PROVIDER
Provider of the custom rule. Values -
AWS
,AWS_GOVCLOUD
,AZURE
(applies to both Azure and Azure Government),GOOGLE
,REPOSITORY
RESOURCE_TYPE
Resource type to which the custom rule applies.
SEVERITY
Rule severity. Values -
Informational
,Low
,Medium
,High
,Critical
STATUS
The current status of the rule. Values -
ENABLED
,DISABLED
,INVALID
DESCRIPTION
Description of the custom rule.
FAMILIES
List of compliance families mapped to the rule.
Rule Waiver Output¶
The fugue list rule-waivers output includes the following attributes:
ID
ID of the rule waiver.
NAME
Human readable name of the rule waiver.
ENVIRONMENT_ID
ID of the environment.
ENVIRONMENT_NAME
Name of the environment.
RULE_ID
ID of the rule being waived.
RESOURCE_ID
ID of the resource that the waiver is applied to.
RESOURCE_TYPE
Type of resource that the waiver is applied to.
RESOURCE_PROVIDER
Provider that the waiver is applied to. Includes both the provider and the region if relevant.
RESOURCE_TAG
Tag that the waiver is applied to.
Environment Scan Output¶
The fugue list scans output includes the following attributes:
Users Output¶
The fugue list users output includes the following attributes:
ID
ID of the user.
EMAIL
Email of the invited user.
FIRST_NAME
The first name of the user.
LAST_NAME
The last name of the user.
GROUPS
Name of the attached group(s).
OWNER
Is the user the owner of the organization. Values -
TRUE
orFALSE
.
Examples¶
Listing all environments¶
Note
For detailed information about a single environment, see fugue get environment.
To list all of your environments, use the fugue list environments command:
fugue list environments
You’ll see output like this:
===================================================================================================================================================
ID | NAME | PROVIDER | REGIONS | HAS_BASELINE | SCAN_INTERVAL | SCAN_STATUS
===================================================================================================================================================
19d77f18-cf71-47b5-8003-123412341234 | AWS CLI Example | aws | us-west-1,us-west-2 | false | 3600 | IN_PROGRESS
2d19968b-e527-4672-8c01-111111111111 | AWS GovCloud Dev | aws_govcloud | us-gov-west-1 | false | 86400 | SUCCESS
d66a951b-3c2b-4a92-8e4d-222222222222 | All AWS Regions - Prod | aws | * | true | 86400 | SUCCESS
fb578bdf-ed81-4782-a615-333333333333 | Azure Dev Test | azure | - | true | 86400 | ERROR
See Output Attributes for details.
Filtering environment list by name¶
You can filter the list of environments by name using the --name
flag. The flag filters on substring match and is case insensitive:
fugue list environments --name dev
You’ll see output like this:
===================================================================================================================================================
ID | NAME | PROVIDER | REGIONS | HAS_BASELINE | SCAN_INTERVAL | SCAN_STATUS
===================================================================================================================================================
2d19968b-e527-4672-8c01-111111111111 | AWS GovCloud Dev | aws_govcloud | us-gov-west-1 | false | 86400 | SUCCESS
fb578bdf-ed81-4782-a615-333333333333 | Azure Dev Test | azure | - | true | 86400 | ERROR
For a list of other flags you can filter on, see usage.
Listing environment events¶
To list drift, baseline enforcement, and compliance events for an environment, use the fugue list events command. The [environment_id]
argument is required:
fugue list events ffc3aac1-9338-4965-ae30-333333333333
You’ll see output like this:
===============================================================================================================================
EVENT_TYPE | CREATED_AT | RESOURCE_ID | RESOURCE_TYPE | CHANGE | OLD_STATE | NEW_STATE
===============================================================================================================================
DRIFT | 2019-06-05T17:00:04-04:00 | fugue-sphinx-poc | AWS.S3.Bucket | ADDED | - | -
DRIFT | 2019-06-05T17:00:04-04:00 | redis-no-cluster | AWS.ElastiCache.ReplicationGroup | MODIFIED | - | -
DRIFT | 2019-06-05T17:00:04-04:00 | fugue-sphinx-poc | AWS.S3.BucketPolicy | ADDED | - | -
See Output Attributes for details.
To learn how to find your environment ID, see fugue list environments.
Filtering event list by date¶
You can filter the list of events by date by using the --range-from
and/or --range-to
flags. You must specify the date using Unix time. Learn how to convert to or from Unix time in the API User Guide.
The command below shows a maximum of 5 events between 09/03/2019 noon UTC and 09/12/2019 midnight UTC:
fugue list events adeeeb2b-12a6-4120-80e6-112233445566 --max-items 5 --range-from 1567468800 --range-to 1567987200
You’ll see output like this:
===================================================================================================================================================
EVENT_TYPE | CREATED_AT | RESOURCE_ID | RESOURCE_TYPE | CHANGE | OLD_STATE | NEW_STATE
===================================================================================================================================================
DRIFT | 2019-09-11T16:33:08-04:00 | vpc-03945f71432586f9e | AWS.EC2.Vpc | MODIFIED | - | -
DRIFT | 2019-09-11T16:33:08-04:00 | sg-0dda8f22f5e76a65c | AWS.EC2.SecurityGroup | ADDED | - | -
COMPLIANCE | 2019-09-11T16:33:08-04:00 | vpc-03ac7259e8650bb0f | AWS.EC2.Vpc | - | | NONCOMPLIANT
COMPLIANCE | 2019-09-04T19:48:33-04:00 | fugue-installer-us-east-1 | AWS.IAM.Role | - | COMPLIANT |
DRIFT | 2019-09-04T19:48:33-04:00 | rtb-024e84c4f5623164f | AWS.EC2.RouteTable | REMOVED | - | -
Filtering event list by resource type¶
You can filter the list of environments by resource type using the --resource-type
flag.
The command below filters events for environment adeeeb2b-12a6-4120-80e6-112233445566
by the resource types "AWS.EC2.Vpc"
, "AWS.EC2.SecurityGroup"
, and "AWS.S3.Bucket"
:
fugue list events adeeeb2b-12a6-4120-80e6-112233445566 \
--resource-type "AWS.EC2.Vpc","AWS.EC2.SecurityGroup","AWS.S3.Bucket"
Multiple resource types are separated by a comma, as above. For a list of supported resource types formatted for the CLI, see our service coverage pages for AWS & AWS GovCloud, Azure, and Google.
For a list of other flags you can filter on, see usage.
Listing families¶
To list all the compliance families for your tenant, use the fugue list families command:
fugue list families
You’ll see output like this:
===========================================================================================================================================================================================
ID | NAME | SOURCE | DESCRIPTION | PROVIDERS | RECOMMENDED | ALWAYS_ENABLED
===========================================================================================================================================================================================
CIS-AWS_v1.2.0 | CIS AWS Foundations Benchmark (v1.2.0) | FUGUE | CIS AWS Foundations Benchmark... | AWS,AWS_GOVCLOUD | true | false
CIS-AWS_v1.3.0 | CIS AWS Foundations Benchmark (v1.3.0) | FUGUE | CIS AWS Foundations Benchmark... | AWS,AWS_GOVCLOUD | true | false
CIS-Azure_v1.1.0 | CIS Azure (v1.1.0) | FUGUE | CIS Azure Foundations Benchma... | AZURE | true | false
CIS-Azure_v1.3.0 | CIS Azure (v1.3.0) | FUGUE | CIS Azure Foundations Benchma... | AZURE | true | false
CIS-Controls_v7.1 | CIS Controls (v7.1) | FUGUE | The Critical Security Control... | AWS,AWS_GOVCLOUD,AZURE,GOOGLE | true | false
CIS-Docker_v1.2.0 | CIS Docker Benchmark (v1.2.0) | FUGUE | The CIS Docker Benchmark prov... | AWS,AWS_GOVCLOUD | true | false
CIS-Google_v1.1.0 | CIS Google Foundations Benchmark (v1.1.0) | FUGUE | CIS Google Cloud Foundations ... | GOOGLE | true | false
535fd330-54f4-4f73-a009-07708360533f | Critical, High CIS AWS v1.3.0 | CUSTOM | The high and critical rules f... | AWS,GOOGLE | true | false
cdefbb0e-3a35-46b4-92af-0df9a8d9dc73 | Critical, High Rules | CUSTOM | This compliance family has cr... | AWS_GOVCLOUD,AZURE,AWS,GOOGLE | true | false
CSA-CCM_v3.0.1 | CSA CCM (v3.0.1) | FUGUE | The Cloud Controls Matrix is ... | AWS,AWS_GOVCLOUD,AZURE,GOOGLE | true | false
Custom | Custom Rules | FUGUE | Custom rules created for this... | AWS_GOVCLOUD,AZURE,AWS | false | false
FBP | Fugue Best Practices | FUGUE | The Fugue Best Practices Fram... | AWS,AWS_GOVCLOUD | true | false
GDPR_v2016 | GDPR (v2016) | FUGUE | GDPR refers to the European G... | AWS,AWS_GOVCLOUD,AZURE,GOOGLE | true | false
HIPAA_v2013 | HIPAA (v2013) | FUGUE | HIPAA refers to the Health In... | AWS,AWS_GOVCLOUD,AZURE,GOOGLE | true | false
ISO-27001_v2013 | ISO 27001 (v2013) | FUGUE | ISO 27001 is a specification ... | AWS,AWS_GOVCLOUD,AZURE,GOOGLE | true | false
4b6eaa98-7031-4528-992b-d6ebc3d51d23 | MegaBank Compliance Family | CUSTOM | High, critical rules applicab... | GOOGLE | true | false
6b701936-673e-46b8-af56-9c127ab96819 | MegaBank Dev | CUSTOM | Rules applicable to the dev e... | AZURE,AWS,GOOGLE | true | false
3bf3c24b-7859-431a-b1aa-395d896e8bce | MegaBank Policy | CUSTOM | This policy is applied to all... | AWS_GOVCLOUD,AZURE,AWS,GOOGLE | true | false
e4792832-62a0-468f-8d91-3b5d80407abe | MegaBank Production Policy | CUSTOM | High, critical rules applicab... | AWS | false | false
54958c86-11b2-4a18-a753-dc9e384566ca | MegaBank Security Policy | CUSTOM | The rules are associated with... | AWS_GOVCLOUD,AZURE,AWS,GOOGLE | true | false
NIST-800-53_vRev4 | NIST 800-53 (vRev4) | FUGUE | NIST SP 800-53 provides stand... | AWS,AWS_GOVCLOUD,AZURE,GOOGLE | true | false
PCI-DSS_v3.2.1 | PCI DSS (v3.2.1) | FUGUE | PCI-DSS provides security pol... | AWS,AWS_GOVCLOUD,AZURE,GOOGLE | true | false
SOC-2_v2017 | SOC 2 (v2017) | FUGUE | SOC 2 is an auditing procedur... | AWS,AWS_GOVCLOUD,AZURE,GOOGLE | true | false
Listing groups¶
To list groups for an organization, use the fugue list groups command:
fugue list groups
You’ll see output like this:
=================================================================================================
ID | NAME | POLICY | ENVIRONMENTS | USERS
=================================================================================================
default-admin-group | Admin | fugue:ADMIN | * | 10
a8f40b62-34d3-442c-a18b-111111111111 | Azure Environments | fugue:READONLY | 2 | 1
348029a1-1e7f-426c-83e1-c38b941e4d97 | Editor | fugue:EDITOR | 8 | 0
Listing invites¶
Note
For detailed information about a single invite, see fugue get invite.
To list groups for an organization, use the fugue list invites command:
fugue list invites
You’ll see output like this:
===============================================================================================================================================
ID | EMAIL | GROUPS | STATUS | CREATED_AT | EXPIRES_AT
===============================================================================================================================================
cb5ec39d-1e33-4e68-b622-bf0000000000 | christophers@fugue.co | Admin | INVITE_EXPIRED | 2019-11-05T17:06:57-05:00 | 2020-02-13T15:48:25-05:00
7f5c7075-afc2-4a82-b94a-210000000000 | noah@example.com | Admin | INVITE_PENDING | 2021-01-27T19:01:35-05:00 | 2021-02-03T19:01:35-05:00
=========================================================================================================================
Listing custom rules¶
Note
For detailed information about a single rule, see fugue get rule.
To list custom rules for a tenant, use the fugue list rules command:
fugue list rules
You’ll see output like this:
==================================================================================================================================================================================================================================================
ID | NAME | PROVIDER | SEVERITY | RESOURCE_TYPE | STATUS | DESCRIPTION | FAMILIES
==================================================================================================================================================================================================================================================
7b643bde-76c1-4640-92fb-439d1e3c5805 | An AWS account must have a password policy requiring a minimum of 16 characters | AWS | Medium | MULTIPLE | ENABLED | An AWS account must have a pa... | Custom
0ac0cff4-c797-4b25-a025-88baf6c5ba70 | Azure VMs should be in availability sets | AZURE | Medium | Azure.Compute.VirtualMachine | ENABLED | Azure Virtual Machines should... | Custom
cc421c21-14ee-46ed-bf15-0a4b6c4d4efd | Azure VMs should only be in East US region | AZURE | Medium | Azure.Compute.VirtualMachine | ENABLED | Azure VMs shouldn't be in oth... | Custom
e3b3d6d8-529d-45de-9244-802c795302c8 | DDB tables should be tagged. | AWS | Medium | MULTIPLE | INVALID | DDB tables should be tagged. | Custom
634999a6-1700-4691-b52a-67668022eabe | EC2-AMIs must be whitelisted | AWS | Informational | AWS.EC2.Instance | ENABLED | EC2 AMI IDs must be from an a... | Custom
06c33acb-4658-4704-9f46-19b43adbcb86 | Govcloud subnets should be tagged Stage:Prod | AWS_GOVCLOUD | Critical | AWS.EC2.Subnet | ENABLED | Govcloud subnets should be ta... | cdefbb0,Custom
d930a981-fd21-46a6-a2a5-4acf987e6df2 | IAM roles used for trust relationships should have MFA or external IDs | AWS | High | AWS.IAM.Role | ENABLED | IAM roles used for trust rela... | cdefbb0,Custom
cf9285f2-a5f7-4ae2-ad7b-e342ae42532e | Virtual Machine instances should be assigned to availability sets | AZURE | High | Azure.Compute.VirtualMachine | ENABLED | Virtual Machine instances sho... | cdefbb0,Custom
591b8619-f951-4b45-87d9-ee0dcfa634d4 | VMs should not allow over provisioning | AWS | Medium | MULTIPLE | INVALID | VMs should not allow overprov... | Custom
See Output Attributes for details.
Listing rule waivers¶
Note
For detailed information about a single rule waiver, see fugue get rule-waiver.
To list rule waivers for an organization, use the fugue list rule-waivers command:
fugue list rule-waivers
You’ll see output like this:
==============================================================================================================================================================================================================================================================================
ID | NAME | ENVIRONMENT_ID | ENVIRONMENT_NAME | RULE_ID | RESOURCE_ID | RESOURCE_TYPE | RESOURCE_PROVIDER | RESOURCE_TAG
==============================================================================================================================================================================================================================================================================
36283aca-b747-43cf-8af2-ee20b7b51b9c | Waive CMK for frontend-security-function | 95705e29-3605-4b5f-b8cb-35a7af93ba06 | Demo 3 | FG_R00068 | /aws/lambda/us-east-1.frontend-security-function | AWS.CloudWatchLogs.LogGroup | aws.us-west-2 | Organization:Dev*
dc5cb324-ad63-4e1a-a9d9-f33969451767 | Waive MFA and ext IDs for IAM roles. | 95705e29-3605-4b5f-b8cb-35a7af93ba06 | Demo 3 | FG_R00255 | * | AWS.IAM.Role | * | -
For a list of other flags you can filter on, see usage.
Listing environment scans¶
Note
For detailed information about a single scan, see fugue get scan.
To list all scans for an environment, use the list scans command. The [environment_id]
argument is required:
fugue list scans ffc3aac1-9338-4965-ae30-333333333333
You’ll see output like this:
======================================================================================================
SCAN_ID | CREATED_AT | FINISHED_AT | STATUS
======================================================================================================
f5972ea2-adae-4cd5-9e52-fc36a041234 | 2019-09-11T14:31:45-04:00 | 2019-09-11T14:34:02-04:00 | SUCCESS
23574d04-cf1f-48d9-a485-205b46682345 | 2019-09-10T14:28:44-04:00 | 2019-09-10T14:30:59-04:00 | SUCCESS
a109499e-a425-4625-b27c-6cf6a6f33456 | 2019-09-09T14:25:45-04:00 | 2019-09-09T14:28:11-04:00 | SUCCESS
0c4b8d22-0eac-443f-88a9-2ca8cc5a4567 | 2019-09-08T14:22:45-04:00 | 2019-09-08T14:24:59-04:00 | SUCCESS
d20ff3e1-a1d7-4a8e-83e5-15168d7d5678 | 2019-09-07T14:19:44-04:00 | 2019-09-07T14:22:04-04:00 | SUCCESS
See Output Attributes for details.
To learn how to find your environment ID, see Environment and Scan IDs as Parameters.
Filtering scan list by status¶
You can filter the list of scans by status by using the --status
flag and specifying either SUCCESS
, IN_PROGRESS
, or ERROR
.
The command below returns only scans resulting in an ERROR
for environment ffc3aac1-9338-4965-ae30-333333333333
:
fugue list scans ffc3aac1-9338-4965-ae30-333333333333 --status ERROR
You’ll see output like this:
=====================================================================================================
SCAN_ID | CREATED_AT | FINISHED_AT | STATUS
=====================================================================================================
6709a903-e7e1-4e66-894d-6a58dab11234 | 2019-09-11T11:28:45-04:00 | 2019-09-11T11:29:22-04:00 | ERROR
1dbf0050-8945-4292-8eb3-70f489225678 | 2019-09-10T11:27:59-04:00 | 2019-09-10T11:28:35-04:00 | ERROR
Listing users¶
Note
For detailed information about a single user, see fugue get user.
To list users for an organization, use the fugue list users command:
fugue list users
You’ll see output like this:
=========================================================================================================================
ID | EMAIL | FIRST_NAME | LAST_NAME | GROUPS | OWNER
=========================================================================================================================
299574ea-2c01-4954-84b6-000000000000 | beckismith@fugue.co | Becki | Smiths | Azure Environments | false
2234ce40-b7b7-4a68-8404-000000000000 | michaelwin1234@fugue.co | Michel | Win | Read | false
ea43575a-011c-482b-918b-000000000000 | amelia@fugue.co | Amelia | Rogers | Admin | true
For a list of other flags you can filter on, see usage.