
********************************************************************************
* Copyright (C) 2019-2024 by Extreme Networks , Inc.                           *
* This file is part of rBreeze Dump                                            *
*                                                                              *
* Author: Pradeep Raj.                                                         *
*                                                                              *
*                                                                              *
* Directions to Use:                                                           *
* 1. Replace all the values enclosed in the "%" with                           *
*    the values to be configured. The string present with in the braces        * 
*    indicates its type.                                                       *
* 2. To pass "" in the request replace the " with %22.                         *
* 3. To pass multiple keys in the URI enclose seperate them with %2c or        *
*    comma(",").                                                               *
* 4. Avoid using the requests with [DO NOT USE] tag in the payload. These could*
*    be defective because of the tailf extensions they have.                   *
*                                                                              *
* Disclaimer:                                                                  *
* 1. The queries mentioned here do not have a one-to-one correlation with CLI. *
* 2. The queries inferred here are based on an automated tool and are not      *
*    gauranteed to work. Its the functional teams responsibilty to ensure its  *
*    working.                                                                  *
* 3. In case if you find any discrepancy you can always contact the author to  *
*    get it fixed.                                                             *
* 4. Avoid using the requests with [DO NOT USE] tag in the payload. These could*
*    be defective because of the tailf extensions they have.                   *
********************************************************************************

curl -v -X PATCH -d "<access-group><access-group-name>%mac-ip-acl-name%</access-group-name></access-group>"  -u admin:password http://%ipaddress%:80/rest/config/running/class-map/%name%/match/access-group


curl -v -X PATCH -d "[DO NOT USE]<vlan><vlan-range>%interface:ui32-vlan-20k-range%</vlan-range></vlan>"  -u admin:password http://%ipaddress%:80/rest/config/running/class-map/%name%/match/vlan


curl -v -X PATCH -d "[DO NOT USE]<bridge-domain><bridge-domain-range>%bd:ui32-bridge-domain-range%</bridge-domain-range></bridge-domain>"  -u admin:password http://%ipaddress%:80/rest/config/running/class-map/%name%/match/bridge-domain


curl -v -X PATCH -d "<police><cir>%uint64%</cir></police>"  -u admin:password http://%ipaddress%:80/rest/config/running/policy-map/%name%/class/%cl-name%/police


curl -v -X PATCH -d "<police><cbs>%uint64%</cbs></police>"  -u admin:password http://%ipaddress%:80/rest/config/running/policy-map/%name%/class/%cl-name%/police


curl -v -X PATCH -d "<police><eir>%uint64%</eir></police>"  -u admin:password http://%ipaddress%:80/rest/config/running/policy-map/%name%/class/%cl-name%/police


curl -v -X PATCH -d "[DO NOT USE]<police><ebs>%uint64%</ebs></police>"  -u admin:password http://%ipaddress%:80/rest/config/running/policy-map/%name%/class/%cl-name%/police


curl -v -X PATCH -d "[DO NOT USE]<set><cos>%uint8%</cos></set>"  -u admin:password http://%ipaddress%:80/rest/config/running/policy-map/%name%/class/%cl-name%/set


curl -v -X PATCH -d "[DO NOT USE]<set><traffic-class>%uint8%</traffic-class></set>"  -u admin:password http://%ipaddress%:80/rest/config/running/policy-map/%name%/class/%cl-name%/set


curl -v -X PATCH -d "[DO NOT USE]<set><dscp>%uint16%</dscp></set>"  -u admin:password http://%ipaddress%:80/rest/config/running/policy-map/%name%/class/%cl-name%/set


curl -v -X PATCH -d "[DO NOT USE]<span><session>%session-type%</session></span>"  -u admin:password http://%ipaddress%:80/rest/config/running/policy-map/%name%/class/%cl-name%/span


curl -v -X PATCH -d "[DO NOT USE]<map><cos-mutation>%map-name-type%</cos-mutation></map>"  -u admin:password http://%ipaddress%:80/rest/config/running/policy-map/%name%/class/%cl-name%/map


curl -v -X PATCH -d "[DO NOT USE]<map><cos-mutation>%qos-mls:builtin-map-name-type%</cos-mutation></map>"  -u admin:password http://%ipaddress%:80/rest/config/running/policy-map/%name%/class/%cl-name%/map


curl -v -X PATCH -d "<map><cos-traffic-class>%map-name-type%</cos-traffic-class></map>"  -u admin:password http://%ipaddress%:80/rest/config/running/policy-map/%name%/class/%cl-name%/map


curl -v -X PATCH -d "<map><cos-traffic-class>%qos-mls:builtin-map-name-type%</cos-traffic-class></map>"  -u admin:password http://%ipaddress%:80/rest/config/running/policy-map/%name%/class/%cl-name%/map


curl -v -X PATCH -d "[DO NOT USE]<map><dscp-cos>%map-name-type%</dscp-cos></map>"  -u admin:password http://%ipaddress%:80/rest/config/running/policy-map/%name%/class/%cl-name%/map


curl -v -X PATCH -d "[DO NOT USE]<map><dscp-cos>%qos-mls:builtin-map-name-type%</dscp-cos></map>"  -u admin:password http://%ipaddress%:80/rest/config/running/policy-map/%name%/class/%cl-name%/map


curl -v -X PATCH -d "<map><dscp-traffic-class>%map-name-type%</dscp-traffic-class></map>"  -u admin:password http://%ipaddress%:80/rest/config/running/policy-map/%name%/class/%cl-name%/map


curl -v -X PATCH -d "<map><dscp-traffic-class>%qos-mls:builtin-map-name-type%</dscp-traffic-class></map>"  -u admin:password http://%ipaddress%:80/rest/config/running/policy-map/%name%/class/%cl-name%/map


curl -v -X PATCH -d "[DO NOT USE]<map><dscp-mutation>%map-name-type%</dscp-mutation></map>"  -u admin:password http://%ipaddress%:80/rest/config/running/policy-map/%name%/class/%cl-name%/map


curl -v -X PATCH -d "[DO NOT USE]<map><dscp-mutation>%qos-mls:builtin-map-name-type%</dscp-mutation></map>"  -u admin:password http://%ipaddress%:80/rest/config/running/policy-map/%name%/class/%cl-name%/map


curl -v -X PATCH -d "[DO NOT USE]<class><sflow-profile>%sflow:profile-name-type%</sflow-profile></class>"  -u admin:password http://%ipaddress%:80/rest/config/running/policy-map/%name%/class/%cl-name%


curl -v -X PATCH -d "<shape><shaping_rate>%shaping-rate-limit%</shaping_rate></shape>"  -u admin:password http://%ipaddress%:80/rest/config/running/policy-map/%name%/class/%cl-name%/shape


curl -v -X PATCH -d "[DO NOT USE]<strict-priority><priority-number>%uint8%</priority-number><scheduler-type>%enumeration%</scheduler-type><dwrr-traffic-class0>%uint32%</dwrr-traffic-class0><dwrr-traffic-class1>%uint32%</dwrr-traffic-class1><dwrr-traffic-class2>%uint32%</dwrr-traffic-class2><dwrr-traffic-class3>%uint32%</dwrr-traffic-class3><dwrr-traffic-class4>%uint32%</dwrr-traffic-class4><dwrr-traffic-class5>%uint32%</dwrr-traffic-class5><dwrr-traffic-class6>%uint32%</dwrr-traffic-class6><dwrr-traffic-class-last>%uint32%</dwrr-traffic-class-last></strict-priority>"  -u admin:password http://%ipaddress%:80/rest/config/running/policy-map/%name%/class/%cl-name%/scheduler/strict-priority


curl -v -X PATCH -d "[DO NOT USE]<strict-priority><TC1>%shaping-rate-limit%</TC1></strict-priority>"  -u admin:password http://%ipaddress%:80/rest/config/running/policy-map/%name%/class/%cl-name%/scheduler/strict-priority


curl -v -X PATCH -d "[DO NOT USE]<strict-priority><TC2>%shaping-rate-limit%</TC2></strict-priority>"  -u admin:password http://%ipaddress%:80/rest/config/running/policy-map/%name%/class/%cl-name%/scheduler/strict-priority


curl -v -X PATCH -d "[DO NOT USE]<strict-priority><TC3>%shaping-rate-limit%</TC3></strict-priority>"  -u admin:password http://%ipaddress%:80/rest/config/running/policy-map/%name%/class/%cl-name%/scheduler/strict-priority


curl -v -X PATCH -d "[DO NOT USE]<strict-priority><TC4>%shaping-rate-limit%</TC4></strict-priority>"  -u admin:password http://%ipaddress%:80/rest/config/running/policy-map/%name%/class/%cl-name%/scheduler/strict-priority


curl -v -X PATCH -d "[DO NOT USE]<strict-priority><TC5>%shaping-rate-limit%</TC5></strict-priority>"  -u admin:password http://%ipaddress%:80/rest/config/running/policy-map/%name%/class/%cl-name%/scheduler/strict-priority


curl -v -X PATCH -d "[DO NOT USE]<strict-priority><TC6>%shaping-rate-limit%</TC6></strict-priority>"  -u admin:password http://%ipaddress%:80/rest/config/running/policy-map/%name%/class/%cl-name%/scheduler/strict-priority


curl -v -X PATCH -d "[DO NOT USE]<strict-priority><TC7>%shaping-rate-limit%</TC7></strict-priority>"  -u admin:password http://%ipaddress%:80/rest/config/running/policy-map/%name%/class/%cl-name%/scheduler/strict-priority


curl -v -X PATCH -d "<service-policy><in>%map-name-type%</in></service-policy>"  -u admin:password http://%ipaddress%:80/rest/config/running/interface/Ethernet/%name%/service-policy


curl -v -X PATCH -d "<service-policy><out>%map-name-type%</out></service-policy>"  -u admin:password http://%ipaddress%:80/rest/config/running/interface/Ethernet/%name%/service-policy


curl -v -X PATCH -d "<service-policy><in>%map-name-type%</in></service-policy>"  -u admin:password http://%ipaddress%:80/rest/config/running/interface/Port-channel/%name%/service-policy


curl -v -X PATCH -d "<service-policy><out>%map-name-type%</out></service-policy>"  -u admin:password http://%ipaddress%:80/rest/config/running/interface/Port-channel/%name%/service-policy


curl -v -X PATCH -d "<service-policy><in>%map-name-type%</in></service-policy>"  -u admin:password http://%ipaddress%:80/rest/config/running/interface/Ve/%name%/service-policy


curl -v -X PATCH -d "<service-policy><out>%map-name-type%</out></service-policy>"  -u admin:password http://%ipaddress%:80/rest/config/running/interface/Ve/%name%/service-policy

