@robinmordasiewicz/xcsh 6.19.0 → 6.21.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/completions/_xcsh CHANGED
@@ -26,48 +26,48 @@ _xcsh() {
26
26
  (domain)
27
27
  local -a domains builtins
28
28
  domains=(
29
- 'admin_console_and_ui:Provides management capabilities for static components used in the F5 XC admin console and user interface. Enables operations to deploy, retrieve, update, and list static UI assets within namespace boundaries. Supports configuration of console interface elements, component metadata management, and asset lifecycle operations. Use this domain to manage custom UI components, static resources, and interface configurations that extend or customize the admin console experience.'
30
- 'api:Comprehensive API lifecycle management including automatic discovery and cataloging of APIs across your infrastructure, security testing to identify vulnerabilities and validate behavior, credential management for secure API access, and policy-driven API grouping. Define testing policies to continuously validate API security posture, organize APIs into logical groups for governance, and integrate with WAF and network security controls. Supports marking endpoints as non-API traffic and...'
31
- 'authentication:F5 Distributed Cloud Authentication API specifications'
32
- 'bigip:Configure and manage BigIP F5 appliance integration with Distributed Cloud infrastructure. Create and deploy iRule scripts for advanced traffic manipulation, manage data groups for dynamic configuration, configure Access Policy Manager (APM) settings for authentication and access control, and define BigIP virtual servers. Provides metrics collection for APM performance monitoring and enables seamless hybrid deployments combining traditional BigIP infrastructure with cloud-native services...'
33
- 'billing_and_usage:Comprehensive billing and usage management for F5 XC tenants. Handle subscription plan transitions between tiers, configure primary and secondary payment methods, and download invoice PDFs. Monitor resource quota limits and current usage across namespaces. Supports custom invoice listing, quota configuration per namespace, and contact management for billing communications. Essential for financial operations, capacity planning, and subscription lifecycle management.'
34
- 'blindfold:Configure and manage cryptographic secret protection with policy-based access controls. Create secret policies and policy rules that govern how sensitive data is encrypted, shared, and accessed across namespaces. Retrieve public keys for encryption operations, process policy information for secret sharing workflows, and decrypt secrets with proper authorization. Monitor secret access through comprehensive audit logs with aggregation and scrolling capabilities. Enforce data protection...'
35
- 'bot_and_threat_defense:Manage comprehensive bot and threat defense capabilities including Shape bot defense instance configuration, threat protection manager (TPM) categories for threat classification, and API key provisioning for automated defense systems. Create and manage TPM categories to organize threats by type, configure bot defense instances per namespace, and handle TPM manager lifecycle operations. Supports preauthorization and provisioning workflows for integrating threat intelligence services with...'
36
- 'cdn:Content Delivery Network services for global content distribution and edge caching. Configure CDN load balancers with custom caching rules based on paths, headers, cookies, and query parameters. Define cache TTL policies, eligibility options, and cache-control behaviors. Monitor CDN performance through access logs and metrics aggregation. Perform cache purge operations for content invalidation. Manage addon subscriptions and track service operation status for CDN deployments.'
37
- 'ce_management:Configure and manage Customer Edge (CE) site infrastructure across distributed deployments. Define network interfaces with DHCP, IPv6, and dedicated management settings. Organize sites into fleets for coordinated management. Handle site registration workflows including token-based registration, image downloads, and suggested configuration values. Monitor and execute site upgrades with pre-upgrade checks and status tracking. Supports both dedicated and Ethernet interface types with...'
38
- 'certificates:Comprehensive certificate lifecycle management for securing application communications. Configure SSL/TLS certificates and certificate chains for endpoints, manage trusted Certificate Authority (CA) lists for client verification, and maintain Certificate Revocation Lists (CRLs) to invalidate compromised certificates. Supports certificate manifests for organized deployment across namespaces, enabling mTLS authentication, HTTPS termination, and secure service-to-service communication patterns.'
39
- 'cloud_infrastructure:Establish and manage connectivity to major cloud providers including AWS, Azure, and GCP. Configure cloud credentials and authentication for secure provider access. Create and manage VPC attachments, transit gateways, and route tables for cross-cloud networking. Support elastic provisioning with automatic resource discovery and reapplication workflows. Monitor cloud connection metrics and segment performance. Integrate with Customer Edge sites for hybrid cloud deployments across multiple...'
40
- 'cloudstatus:Monitor F5 Distributed Cloud service status and incidents'
41
- 'completion:Generate shell completion scripts for bash, zsh, and fish'
42
- 'container_services:Container Services (XCCS) enables deployment and management of containerized applications across distributed edge sites without requiring full Kubernetes complexity. Create virtual Kubernetes clusters for isolated multi-tenant environments, define workload flavors for resource allocation, and deploy container workloads with simplified orchestration. Monitor workload usage and PVC metrics, manage namespace isolation, and integrate with site infrastructure for edge-native container...'
43
- 'data_and_privacy_security:Manage comprehensive data privacy and security controls including sensitive data detection policies, custom data type definitions, and log management analytics (LMA) region configurations. Define patterns for identifying PII, financial data, and other sensitive information with configurable actions for masking, alerting, or blocking. Configure LMA regions with Elasticsearch, Kafka, or ClickHouse backends for centralized security logging and compliance auditing. Integrate geo-configurations...'
44
- 'data_intelligence:F5 Distributed Cloud Data Intelligence API specifications'
45
- 'ddos:Comprehensive DDoS protection and infrastructure security management. Configure deny list rules to block malicious traffic sources, create firewall rule groups for granular traffic filtering, and manage protection tunnels for secure infrastructure connectivity. The infraprotect APIs enable proactive threat mitigation through customizable security policies, real-time tunnel status monitoring, and namespace-scoped rule management. Integrates with network security and virtual load balancing for...'
46
- 'dns:Comprehensive DNS management for zones, domains, and resource records. Configure DNS load balancing with health checks for high availability. Import and export zone files via BIND format or AXFR transfers. Manage resource record sets including A, AAAA, CNAME, CAA, CERT, AFSDB, and DLV records. Monitor DNS performance through metrics and request logs. Clone zones from existing domains and enforce DNS compliance policies across namespaces.'
47
- 'generative_ai:Generative AI services providing intelligent automation and analysis capabilities. Configure AI assistant policies and submit queries with feedback tracking for continuous improvement. Enable flow anomaly detection powered by machine learning. Manage AI data collection through the BFDP subsystem including feature enablement, token management, and subscription controls. Supports IP allocation for GIA services. Integrates dashboard visualization with customizable displays, filters, and link...'
48
- 'login:Authentication, identity, and session management'
49
- 'managed_kubernetes:Configure and manage Managed Kubernetes (XCKS) security and access controls. Define cluster roles with fine-grained permissions for API resources and non-resource URLs. Create role bindings to associate users and groups with cluster-wide permissions. Enforce pod security standards through admission controllers with configurable enforcement levels. Manage private container registries for secure image distribution. Integrates with external Kubernetes clusters including EKS, AKS, and GKE for...'
50
- 'marketplace:Access and manage the marketplace ecosystem including third-party integrations, add-on services, and external connectors. Configure connection types for direct, GRE tunnel, and IPSec connectivity with customizable IKE parameters and DPD keepalive settings. Manage navigation tiles for custom UI extensions, activate and monitor add-on service status across namespaces, and integrate with external platforms like Terraform. Supports TPM policy management and configuration management instances for...'
51
- 'network:Comprehensive network infrastructure management including BGP routing with ASN configuration and peering policies, IPsec tunnel establishment with full IKE phase 1 and phase 2 parameter control, and network connector configuration for hybrid cloud connectivity. Supports SRv6 segment routing, subnet management, DC cluster groups for data center integration, static and dynamic route definitions, and IP prefix set policies. Enables secure site-to-site VPN connections, multi-cloud network...'
52
- 'network_security:Network security controls for protecting traffic at the network layer. Configure network firewalls with stateful inspection and ACL rules. Define NAT policies for address translation, port forwarding, and dynamic pool management. Create network policy sets for segmentation and micro-segmentation between workloads. Implement policy-based routing to direct traffic based on source, destination, or application criteria. Manage segment connections for multi-site network isolation. Configure...'
53
- 'nginx_one:Integrate and manage NGINX One platform capabilities including subscription lifecycle management, NGINX Plus instance provisioning, and server configuration. Configure dataplane servers, manage nginx instances with WAF and API discovery specifications, and enable service discovery integrations. Supports NGINX Configuration Sync Gateway (CSG) configurations for centralized management workflows. Typical operations include subscribing to NGINX One services, retrieving server status and...'
54
- 'object_storage:Manage versioned object storage for mobile application components and platform integrations. Upload and retrieve mobile app shield configurations, SDK integrations, and custom artifacts organized by namespace and object type. Support for multiple versions of each object enables rollback and version-specific deployments. Presigned URLs provide secure, time-limited access for direct object downloads. Object types include mobile-app-shield for application protection, mobile-integrator for...'
55
- 'observability:Comprehensive synthetic monitoring and observability capabilities for proactive infrastructure health assessment. Configure DNS monitors to validate resolution across AWS regions, set up HTTP monitors for endpoint availability testing, and track SSL/TLS certificate expiration status. Access real-time health summaries at global and namespace levels, review historical monitoring data, and generate detailed reports for DNS and HTTP monitors. Integrate with dashboards to visualize monitoring...'
56
- 'rate_limiting:Manage rate limiting policies to protect applications from traffic surges and abuse. Configure rate limiters with customizable thresholds, time periods, and enforcement actions including blocking or throttling. Implement policers using leaky bucket algorithms for smooth traffic shaping. Define protocol-specific policers for granular control over different traffic types. Integrate with virtual hosts and load balancers to enforce rate limits at the edge, preventing resource exhaustion and...'
57
- 'secops_and_incident_response:Security operations and incident response capabilities for detecting and mitigating malicious user activity. Create mitigation policies that define automated responses based on user threat levels, including blocking, challenging, or rate limiting suspicious users. Configure rules that match specific malicious user types and threat severity levels to appropriate mitigation actions. Supports namespace-scoped configurations for managing security policies across different application...'
58
- 'service_mesh:Manage service mesh infrastructure including endpoint discovery and intelligent routing between distributed services. Define application types with learned API schemas, security risk classifications, and authentication configurations. Configure NFV (Network Function Virtualization) services with lifecycle management including force-delete operations. Leverage machine learning capabilities for automatic API endpoint detection, schema learning, and traffic pattern analysis. Integrate with...'
59
- 'shape:Shape Security integration for advanced bot defense and threat prevention capabilities. Configure bot infrastructure deployments with policy management, deployment history tracking, and status monitoring. Manage mobile SDK attributes for application shielding and integrator configurations. Subscribe to bot defense add-ons and client-side defense services. Includes SafeAP policy configuration, threat recognition rules, and automated bot mitigation across namespaces with comprehensive...'
60
- 'sites:Comprehensive site infrastructure management for deploying F5 XC across multiple cloud providers and edge locations. Configure AWS Transit Gateway sites with VPN tunnels, VPC IP prefixes, and security settings. Manage virtual sites for logical grouping and policy application. Deploy Secure Mesh sites for networking-focused edge deployments, integrate external Kubernetes clusters as Customer Edge nodes, and configure cloud-specific resources including AWS VPC, Azure VNet, and GCP VPC sites....'
61
- 'statistics:Comprehensive operational analytics and monitoring capabilities for distributed cloud infrastructure. Configure alert policies with custom matchers and grouping rules to detect anomalies across namespaces. Manage alert receivers with confirmation, testing, and verification workflows for reliable notification delivery. Access flow statistics, view historical alerts, generate reports and graphs for capacity planning, track service topology and discovery patterns, and monitor real-time status...'
29
+ 'admin_console_and_ui:Static UI component and console asset management'
30
+ 'api:API discovery, security testing, and credential management'
31
+ 'authentication:Authentication API'
32
+ 'bigip:BigIP appliance management, iRules, and data groups'
33
+ 'billing_and_usage:Subscription billing, payment methods, and usage tracking'
34
+ 'blindfold:Secret encryption and policy-based data protection'
35
+ 'bot_and_threat_defense:Bot detection, threat categorization, and defense management'
36
+ 'cdn:CDN load balancing, caching rules, and content delivery'
37
+ 'ce_management:Customer Edge site lifecycle and network configuration'
38
+ 'certificates:SSL/TLS certificate and trusted CA management'
39
+ 'cloud_infrastructure:Multi-cloud provider connectivity and credential management'
40
+ 'cloudstatus:F5 XC service status and incidents'
41
+ 'completion:Shell completion script generation'
42
+ 'container_services:Edge container workloads and virtual Kubernetes management'
43
+ 'data_and_privacy_security:Sensitive data detection, classification, and privacy...'
44
+ 'data_intelligence:Data Intelligence API'
45
+ 'ddos:DDoS protection and infrastructure security policies'
46
+ 'dns:DNS zone management, load balancing, and record...'
47
+ 'generative_ai:AI-powered features, assistants, and data collection'
48
+ 'login:Authentication and session management'
49
+ 'managed_kubernetes:Kubernetes RBAC, pod security, and container registries'
50
+ 'marketplace:Third-party integrations, add-ons, and extensions'
51
+ 'network:BGP routing, IPsec tunnels, and network connectivity'
52
+ 'network_security:Network firewall, NAT, ACL, and policy-based routing'
53
+ 'nginx_one:NGINX One platform integration and instance management'
54
+ 'object_storage:Object storage for mobile SDK artifacts and integrations'
55
+ 'observability:Synthetic monitoring, health checks, and observability...'
56
+ 'rate_limiting:Traffic rate limiting, policers, and throttling controls'
57
+ 'secops_and_incident_response:Malicious user detection and automated threat mitigation'
58
+ 'service_mesh:Service mesh connectivity, discovery, and NFV management'
59
+ 'shape:Bot defense and threat prevention with Shape Security'
60
+ 'sites:Multi-cloud site deployment and edge infrastructure'
61
+ 'statistics:Flow statistics, alerts, logs, and operational analytics'
62
62
  'subscription:xcsh-specific subscription management commands (overview, quota analysis, validation)'
63
- 'support:Manage the complete customer support ticket lifecycle including creation, commenting, priority adjustment, escalation, and closure. Submit specialized requests such as tax exemption verification. Access site-level diagnostic capabilities including TCP dump capture, listing, and management for network troubleshooting. Integrates with operational workflows to enable support teams to gather diagnostic data directly from distributed sites while maintaining ticket-based tracking of all customer...'
64
- 'telemetry_and_insights:F5 Distributed Cloud Telemetry And Insights API specifications'
65
- 'tenant_and_identity:Comprehensive user and tenant identity management for F5 Distributed Cloud. Configure user settings including profile images, notification preferences (admin and combined), and view preferences. Manage user sessions with listing and control capabilities. Handle OTP (one-time password) administration including admin resets. Support identity management (IDM) enable/disable operations. Process initial access requests for new users. Manage customer support ticket attachments and interactions for...'
66
- 'threat_campaign:F5 Distributed Cloud Threat Campaign API specifications'
67
- 'users:Comprehensive user and identity management for the F5 XC platform. Create and manage registration tokens for site and node onboarding, including cloud-init configuration retrieval. Define known label keys and values to establish consistent resource tagging taxonomies across namespaces. Configure implicit labels for automatic resource classification. Supports full lifecycle management of user-related configuration objects with metadata tracking, state management, and condition monitoring for...'
68
- 'virtual:Comprehensive application delivery and traffic management capabilities including HTTP/HTTPS/TCP/UDP load balancers, origin pool configuration, virtual host management, and advanced routing rules. Supports rate limiting policies, service policy enforcement, geo-location-based routing, and proxy forwarding configurations. Integrates with security features including malware protection, threat campaign detection, and WAF policy attachment. Provides health check configuration, endpoint...'
69
- 'vpm_and_node_management:F5 Distributed Cloud Vpm And Node Management API specifications'
70
- 'waf:Web Application Firewall (WAF) configuration and management for protecting applications against common attacks and vulnerabilities. Define application firewall policies with attack type detection, bot protection settings, and custom blocking pages. Manage WAF exclusion policies for legitimate traffic patterns, configure signature staging and release workflows, and monitor security events with detailed rule hit metrics. Supports AI-powered risk-based blocking, anonymization settings for...'
63
+ 'support:Customer support ticket lifecycle and site diagnostics'
64
+ 'telemetry_and_insights:Telemetry And Insights API'
65
+ 'tenant_and_identity:User settings, notifications, sessions, and identity...'
66
+ 'threat_campaign:Threat Campaign API'
67
+ 'users:User accounts, tokens, and label management'
68
+ 'virtual:HTTP/HTTPS load balancing and traffic management'
69
+ 'vpm_and_node_management:Vpm And Node Management API'
70
+ 'waf:Web application firewall rules and security policies'
71
71
  'apisec:Alias for api'
72
72
  'api-discovery:Alias for api'
73
73
  'authn:Alias for authentication'
@@ -22,48 +22,48 @@ complete -c xcsh -n "__fish_use_subcommand" -a "context" -d 'Show current naviga
22
22
  complete -c xcsh -n "__fish_use_subcommand" -a "ctx" -d 'Show current navigation context'
23
23
 
24
24
  # Domain completions
25
- complete -c xcsh -n "__fish_use_subcommand" -a "admin_console_and_ui" -d 'Provides management capabilities for static components used in the F5 XC admin console and user interface. Enables operations to deploy, retrieve, update, and list static UI assets within namespace boundaries. Supports configuration of console interface elements, component metadata management, and asset lifecycle operations. Use this domain to manage custom UI components, static resources, and interface configurations that extend or customize the admin console experience.'
26
- complete -c xcsh -n "__fish_use_subcommand" -a "api" -d 'Comprehensive API lifecycle management including automatic discovery and cataloging of APIs across your infrastructure, security testing to identify vulnerabilities and validate behavior, credential management for secure API access, and policy-driven API grouping. Define testing policies to continuously validate API security posture, organize APIs into logical groups for governance, and integrate with WAF and network security controls. Supports marking endpoints as non-API traffic and...'
27
- complete -c xcsh -n "__fish_use_subcommand" -a "authentication" -d 'F5 Distributed Cloud Authentication API specifications'
28
- complete -c xcsh -n "__fish_use_subcommand" -a "bigip" -d 'Configure and manage BigIP F5 appliance integration with Distributed Cloud infrastructure. Create and deploy iRule scripts for advanced traffic manipulation, manage data groups for dynamic configuration, configure Access Policy Manager (APM) settings for authentication and access control, and define BigIP virtual servers. Provides metrics collection for APM performance monitoring and enables seamless hybrid deployments combining traditional BigIP infrastructure with cloud-native services...'
29
- complete -c xcsh -n "__fish_use_subcommand" -a "billing_and_usage" -d 'Comprehensive billing and usage management for F5 XC tenants. Handle subscription plan transitions between tiers, configure primary and secondary payment methods, and download invoice PDFs. Monitor resource quota limits and current usage across namespaces. Supports custom invoice listing, quota configuration per namespace, and contact management for billing communications. Essential for financial operations, capacity planning, and subscription lifecycle management.'
30
- complete -c xcsh -n "__fish_use_subcommand" -a "blindfold" -d 'Configure and manage cryptographic secret protection with policy-based access controls. Create secret policies and policy rules that govern how sensitive data is encrypted, shared, and accessed across namespaces. Retrieve public keys for encryption operations, process policy information for secret sharing workflows, and decrypt secrets with proper authorization. Monitor secret access through comprehensive audit logs with aggregation and scrolling capabilities. Enforce data protection...'
31
- complete -c xcsh -n "__fish_use_subcommand" -a "bot_and_threat_defense" -d 'Manage comprehensive bot and threat defense capabilities including Shape bot defense instance configuration, threat protection manager (TPM) categories for threat classification, and API key provisioning for automated defense systems. Create and manage TPM categories to organize threats by type, configure bot defense instances per namespace, and handle TPM manager lifecycle operations. Supports preauthorization and provisioning workflows for integrating threat intelligence services with...'
32
- complete -c xcsh -n "__fish_use_subcommand" -a "cdn" -d 'Content Delivery Network services for global content distribution and edge caching. Configure CDN load balancers with custom caching rules based on paths, headers, cookies, and query parameters. Define cache TTL policies, eligibility options, and cache-control behaviors. Monitor CDN performance through access logs and metrics aggregation. Perform cache purge operations for content invalidation. Manage addon subscriptions and track service operation status for CDN deployments.'
33
- complete -c xcsh -n "__fish_use_subcommand" -a "ce_management" -d 'Configure and manage Customer Edge (CE) site infrastructure across distributed deployments. Define network interfaces with DHCP, IPv6, and dedicated management settings. Organize sites into fleets for coordinated management. Handle site registration workflows including token-based registration, image downloads, and suggested configuration values. Monitor and execute site upgrades with pre-upgrade checks and status tracking. Supports both dedicated and Ethernet interface types with...'
34
- complete -c xcsh -n "__fish_use_subcommand" -a "certificates" -d 'Comprehensive certificate lifecycle management for securing application communications. Configure SSL/TLS certificates and certificate chains for endpoints, manage trusted Certificate Authority (CA) lists for client verification, and maintain Certificate Revocation Lists (CRLs) to invalidate compromised certificates. Supports certificate manifests for organized deployment across namespaces, enabling mTLS authentication, HTTPS termination, and secure service-to-service communication patterns.'
35
- complete -c xcsh -n "__fish_use_subcommand" -a "cloud_infrastructure" -d 'Establish and manage connectivity to major cloud providers including AWS, Azure, and GCP. Configure cloud credentials and authentication for secure provider access. Create and manage VPC attachments, transit gateways, and route tables for cross-cloud networking. Support elastic provisioning with automatic resource discovery and reapplication workflows. Monitor cloud connection metrics and segment performance. Integrate with Customer Edge sites for hybrid cloud deployments across multiple...'
36
- complete -c xcsh -n "__fish_use_subcommand" -a "cloudstatus" -d 'Monitor F5 Distributed Cloud service status and incidents'
37
- complete -c xcsh -n "__fish_use_subcommand" -a "completion" -d 'Generate shell completion scripts for bash, zsh, and fish'
38
- complete -c xcsh -n "__fish_use_subcommand" -a "container_services" -d 'Container Services (XCCS) enables deployment and management of containerized applications across distributed edge sites without requiring full Kubernetes complexity. Create virtual Kubernetes clusters for isolated multi-tenant environments, define workload flavors for resource allocation, and deploy container workloads with simplified orchestration. Monitor workload usage and PVC metrics, manage namespace isolation, and integrate with site infrastructure for edge-native container...'
39
- complete -c xcsh -n "__fish_use_subcommand" -a "data_and_privacy_security" -d 'Manage comprehensive data privacy and security controls including sensitive data detection policies, custom data type definitions, and log management analytics (LMA) region configurations. Define patterns for identifying PII, financial data, and other sensitive information with configurable actions for masking, alerting, or blocking. Configure LMA regions with Elasticsearch, Kafka, or ClickHouse backends for centralized security logging and compliance auditing. Integrate geo-configurations...'
40
- complete -c xcsh -n "__fish_use_subcommand" -a "data_intelligence" -d 'F5 Distributed Cloud Data Intelligence API specifications'
41
- complete -c xcsh -n "__fish_use_subcommand" -a "ddos" -d 'Comprehensive DDoS protection and infrastructure security management. Configure deny list rules to block malicious traffic sources, create firewall rule groups for granular traffic filtering, and manage protection tunnels for secure infrastructure connectivity. The infraprotect APIs enable proactive threat mitigation through customizable security policies, real-time tunnel status monitoring, and namespace-scoped rule management. Integrates with network security and virtual load balancing for...'
42
- complete -c xcsh -n "__fish_use_subcommand" -a "dns" -d 'Comprehensive DNS management for zones, domains, and resource records. Configure DNS load balancing with health checks for high availability. Import and export zone files via BIND format or AXFR transfers. Manage resource record sets including A, AAAA, CNAME, CAA, CERT, AFSDB, and DLV records. Monitor DNS performance through metrics and request logs. Clone zones from existing domains and enforce DNS compliance policies across namespaces.'
43
- complete -c xcsh -n "__fish_use_subcommand" -a "generative_ai" -d 'Generative AI services providing intelligent automation and analysis capabilities. Configure AI assistant policies and submit queries with feedback tracking for continuous improvement. Enable flow anomaly detection powered by machine learning. Manage AI data collection through the BFDP subsystem including feature enablement, token management, and subscription controls. Supports IP allocation for GIA services. Integrates dashboard visualization with customizable displays, filters, and link...'
44
- complete -c xcsh -n "__fish_use_subcommand" -a "login" -d 'Authentication, identity, and session management'
45
- complete -c xcsh -n "__fish_use_subcommand" -a "managed_kubernetes" -d 'Configure and manage Managed Kubernetes (XCKS) security and access controls. Define cluster roles with fine-grained permissions for API resources and non-resource URLs. Create role bindings to associate users and groups with cluster-wide permissions. Enforce pod security standards through admission controllers with configurable enforcement levels. Manage private container registries for secure image distribution. Integrates with external Kubernetes clusters including EKS, AKS, and GKE for...'
46
- complete -c xcsh -n "__fish_use_subcommand" -a "marketplace" -d 'Access and manage the marketplace ecosystem including third-party integrations, add-on services, and external connectors. Configure connection types for direct, GRE tunnel, and IPSec connectivity with customizable IKE parameters and DPD keepalive settings. Manage navigation tiles for custom UI extensions, activate and monitor add-on service status across namespaces, and integrate with external platforms like Terraform. Supports TPM policy management and configuration management instances for...'
47
- complete -c xcsh -n "__fish_use_subcommand" -a "network" -d 'Comprehensive network infrastructure management including BGP routing with ASN configuration and peering policies, IPsec tunnel establishment with full IKE phase 1 and phase 2 parameter control, and network connector configuration for hybrid cloud connectivity. Supports SRv6 segment routing, subnet management, DC cluster groups for data center integration, static and dynamic route definitions, and IP prefix set policies. Enables secure site-to-site VPN connections, multi-cloud network...'
48
- complete -c xcsh -n "__fish_use_subcommand" -a "network_security" -d 'Network security controls for protecting traffic at the network layer. Configure network firewalls with stateful inspection and ACL rules. Define NAT policies for address translation, port forwarding, and dynamic pool management. Create network policy sets for segmentation and micro-segmentation between workloads. Implement policy-based routing to direct traffic based on source, destination, or application criteria. Manage segment connections for multi-site network isolation. Configure...'
49
- complete -c xcsh -n "__fish_use_subcommand" -a "nginx_one" -d 'Integrate and manage NGINX One platform capabilities including subscription lifecycle management, NGINX Plus instance provisioning, and server configuration. Configure dataplane servers, manage nginx instances with WAF and API discovery specifications, and enable service discovery integrations. Supports NGINX Configuration Sync Gateway (CSG) configurations for centralized management workflows. Typical operations include subscribing to NGINX One services, retrieving server status and...'
50
- complete -c xcsh -n "__fish_use_subcommand" -a "object_storage" -d 'Manage versioned object storage for mobile application components and platform integrations. Upload and retrieve mobile app shield configurations, SDK integrations, and custom artifacts organized by namespace and object type. Support for multiple versions of each object enables rollback and version-specific deployments. Presigned URLs provide secure, time-limited access for direct object downloads. Object types include mobile-app-shield for application protection, mobile-integrator for...'
51
- complete -c xcsh -n "__fish_use_subcommand" -a "observability" -d 'Comprehensive synthetic monitoring and observability capabilities for proactive infrastructure health assessment. Configure DNS monitors to validate resolution across AWS regions, set up HTTP monitors for endpoint availability testing, and track SSL/TLS certificate expiration status. Access real-time health summaries at global and namespace levels, review historical monitoring data, and generate detailed reports for DNS and HTTP monitors. Integrate with dashboards to visualize monitoring...'
52
- complete -c xcsh -n "__fish_use_subcommand" -a "rate_limiting" -d 'Manage rate limiting policies to protect applications from traffic surges and abuse. Configure rate limiters with customizable thresholds, time periods, and enforcement actions including blocking or throttling. Implement policers using leaky bucket algorithms for smooth traffic shaping. Define protocol-specific policers for granular control over different traffic types. Integrate with virtual hosts and load balancers to enforce rate limits at the edge, preventing resource exhaustion and...'
53
- complete -c xcsh -n "__fish_use_subcommand" -a "secops_and_incident_response" -d 'Security operations and incident response capabilities for detecting and mitigating malicious user activity. Create mitigation policies that define automated responses based on user threat levels, including blocking, challenging, or rate limiting suspicious users. Configure rules that match specific malicious user types and threat severity levels to appropriate mitigation actions. Supports namespace-scoped configurations for managing security policies across different application...'
54
- complete -c xcsh -n "__fish_use_subcommand" -a "service_mesh" -d 'Manage service mesh infrastructure including endpoint discovery and intelligent routing between distributed services. Define application types with learned API schemas, security risk classifications, and authentication configurations. Configure NFV (Network Function Virtualization) services with lifecycle management including force-delete operations. Leverage machine learning capabilities for automatic API endpoint detection, schema learning, and traffic pattern analysis. Integrate with...'
55
- complete -c xcsh -n "__fish_use_subcommand" -a "shape" -d 'Shape Security integration for advanced bot defense and threat prevention capabilities. Configure bot infrastructure deployments with policy management, deployment history tracking, and status monitoring. Manage mobile SDK attributes for application shielding and integrator configurations. Subscribe to bot defense add-ons and client-side defense services. Includes SafeAP policy configuration, threat recognition rules, and automated bot mitigation across namespaces with comprehensive...'
56
- complete -c xcsh -n "__fish_use_subcommand" -a "sites" -d 'Comprehensive site infrastructure management for deploying F5 XC across multiple cloud providers and edge locations. Configure AWS Transit Gateway sites with VPN tunnels, VPC IP prefixes, and security settings. Manage virtual sites for logical grouping and policy application. Deploy Secure Mesh sites for networking-focused edge deployments, integrate external Kubernetes clusters as Customer Edge nodes, and configure cloud-specific resources including AWS VPC, Azure VNet, and GCP VPC sites....'
57
- complete -c xcsh -n "__fish_use_subcommand" -a "statistics" -d 'Comprehensive operational analytics and monitoring capabilities for distributed cloud infrastructure. Configure alert policies with custom matchers and grouping rules to detect anomalies across namespaces. Manage alert receivers with confirmation, testing, and verification workflows for reliable notification delivery. Access flow statistics, view historical alerts, generate reports and graphs for capacity planning, track service topology and discovery patterns, and monitor real-time status...'
25
+ complete -c xcsh -n "__fish_use_subcommand" -a "admin_console_and_ui" -d 'Static UI component and console asset management'
26
+ complete -c xcsh -n "__fish_use_subcommand" -a "api" -d 'API discovery, security testing, and credential management'
27
+ complete -c xcsh -n "__fish_use_subcommand" -a "authentication" -d 'Authentication API'
28
+ complete -c xcsh -n "__fish_use_subcommand" -a "bigip" -d 'BigIP appliance management, iRules, and data groups'
29
+ complete -c xcsh -n "__fish_use_subcommand" -a "billing_and_usage" -d 'Subscription billing, payment methods, and usage tracking'
30
+ complete -c xcsh -n "__fish_use_subcommand" -a "blindfold" -d 'Secret encryption and policy-based data protection'
31
+ complete -c xcsh -n "__fish_use_subcommand" -a "bot_and_threat_defense" -d 'Bot detection, threat categorization, and defense management'
32
+ complete -c xcsh -n "__fish_use_subcommand" -a "cdn" -d 'CDN load balancing, caching rules, and content delivery'
33
+ complete -c xcsh -n "__fish_use_subcommand" -a "ce_management" -d 'Customer Edge site lifecycle and network configuration'
34
+ complete -c xcsh -n "__fish_use_subcommand" -a "certificates" -d 'SSL/TLS certificate and trusted CA management'
35
+ complete -c xcsh -n "__fish_use_subcommand" -a "cloud_infrastructure" -d 'Multi-cloud provider connectivity and credential management'
36
+ complete -c xcsh -n "__fish_use_subcommand" -a "cloudstatus" -d 'F5 XC service status and incidents'
37
+ complete -c xcsh -n "__fish_use_subcommand" -a "completion" -d 'Shell completion script generation'
38
+ complete -c xcsh -n "__fish_use_subcommand" -a "container_services" -d 'Edge container workloads and virtual Kubernetes management'
39
+ complete -c xcsh -n "__fish_use_subcommand" -a "data_and_privacy_security" -d 'Sensitive data detection, classification, and privacy...'
40
+ complete -c xcsh -n "__fish_use_subcommand" -a "data_intelligence" -d 'Data Intelligence API'
41
+ complete -c xcsh -n "__fish_use_subcommand" -a "ddos" -d 'DDoS protection and infrastructure security policies'
42
+ complete -c xcsh -n "__fish_use_subcommand" -a "dns" -d 'DNS zone management, load balancing, and record...'
43
+ complete -c xcsh -n "__fish_use_subcommand" -a "generative_ai" -d 'AI-powered features, assistants, and data collection'
44
+ complete -c xcsh -n "__fish_use_subcommand" -a "login" -d 'Authentication and session management'
45
+ complete -c xcsh -n "__fish_use_subcommand" -a "managed_kubernetes" -d 'Kubernetes RBAC, pod security, and container registries'
46
+ complete -c xcsh -n "__fish_use_subcommand" -a "marketplace" -d 'Third-party integrations, add-ons, and extensions'
47
+ complete -c xcsh -n "__fish_use_subcommand" -a "network" -d 'BGP routing, IPsec tunnels, and network connectivity'
48
+ complete -c xcsh -n "__fish_use_subcommand" -a "network_security" -d 'Network firewall, NAT, ACL, and policy-based routing'
49
+ complete -c xcsh -n "__fish_use_subcommand" -a "nginx_one" -d 'NGINX One platform integration and instance management'
50
+ complete -c xcsh -n "__fish_use_subcommand" -a "object_storage" -d 'Object storage for mobile SDK artifacts and integrations'
51
+ complete -c xcsh -n "__fish_use_subcommand" -a "observability" -d 'Synthetic monitoring, health checks, and observability...'
52
+ complete -c xcsh -n "__fish_use_subcommand" -a "rate_limiting" -d 'Traffic rate limiting, policers, and throttling controls'
53
+ complete -c xcsh -n "__fish_use_subcommand" -a "secops_and_incident_response" -d 'Malicious user detection and automated threat mitigation'
54
+ complete -c xcsh -n "__fish_use_subcommand" -a "service_mesh" -d 'Service mesh connectivity, discovery, and NFV management'
55
+ complete -c xcsh -n "__fish_use_subcommand" -a "shape" -d 'Bot defense and threat prevention with Shape Security'
56
+ complete -c xcsh -n "__fish_use_subcommand" -a "sites" -d 'Multi-cloud site deployment and edge infrastructure'
57
+ complete -c xcsh -n "__fish_use_subcommand" -a "statistics" -d 'Flow statistics, alerts, logs, and operational analytics'
58
58
  complete -c xcsh -n "__fish_use_subcommand" -a "subscription" -d 'xcsh-specific subscription management commands (overview, quota analysis, validation)'
59
- complete -c xcsh -n "__fish_use_subcommand" -a "support" -d 'Manage the complete customer support ticket lifecycle including creation, commenting, priority adjustment, escalation, and closure. Submit specialized requests such as tax exemption verification. Access site-level diagnostic capabilities including TCP dump capture, listing, and management for network troubleshooting. Integrates with operational workflows to enable support teams to gather diagnostic data directly from distributed sites while maintaining ticket-based tracking of all customer...'
60
- complete -c xcsh -n "__fish_use_subcommand" -a "telemetry_and_insights" -d 'F5 Distributed Cloud Telemetry And Insights API specifications'
61
- complete -c xcsh -n "__fish_use_subcommand" -a "tenant_and_identity" -d 'Comprehensive user and tenant identity management for F5 Distributed Cloud. Configure user settings including profile images, notification preferences (admin and combined), and view preferences. Manage user sessions with listing and control capabilities. Handle OTP (one-time password) administration including admin resets. Support identity management (IDM) enable/disable operations. Process initial access requests for new users. Manage customer support ticket attachments and interactions for...'
62
- complete -c xcsh -n "__fish_use_subcommand" -a "threat_campaign" -d 'F5 Distributed Cloud Threat Campaign API specifications'
63
- complete -c xcsh -n "__fish_use_subcommand" -a "users" -d 'Comprehensive user and identity management for the F5 XC platform. Create and manage registration tokens for site and node onboarding, including cloud-init configuration retrieval. Define known label keys and values to establish consistent resource tagging taxonomies across namespaces. Configure implicit labels for automatic resource classification. Supports full lifecycle management of user-related configuration objects with metadata tracking, state management, and condition monitoring for...'
64
- complete -c xcsh -n "__fish_use_subcommand" -a "virtual" -d 'Comprehensive application delivery and traffic management capabilities including HTTP/HTTPS/TCP/UDP load balancers, origin pool configuration, virtual host management, and advanced routing rules. Supports rate limiting policies, service policy enforcement, geo-location-based routing, and proxy forwarding configurations. Integrates with security features including malware protection, threat campaign detection, and WAF policy attachment. Provides health check configuration, endpoint...'
65
- complete -c xcsh -n "__fish_use_subcommand" -a "vpm_and_node_management" -d 'F5 Distributed Cloud Vpm And Node Management API specifications'
66
- complete -c xcsh -n "__fish_use_subcommand" -a "waf" -d 'Web Application Firewall (WAF) configuration and management for protecting applications against common attacks and vulnerabilities. Define application firewall policies with attack type detection, bot protection settings, and custom blocking pages. Manage WAF exclusion policies for legitimate traffic patterns, configure signature staging and release workflows, and monitor security events with detailed rule hit metrics. Supports AI-powered risk-based blocking, anonymization settings for...'
59
+ complete -c xcsh -n "__fish_use_subcommand" -a "support" -d 'Customer support ticket lifecycle and site diagnostics'
60
+ complete -c xcsh -n "__fish_use_subcommand" -a "telemetry_and_insights" -d 'Telemetry And Insights API'
61
+ complete -c xcsh -n "__fish_use_subcommand" -a "tenant_and_identity" -d 'User settings, notifications, sessions, and identity...'
62
+ complete -c xcsh -n "__fish_use_subcommand" -a "threat_campaign" -d 'Threat Campaign API'
63
+ complete -c xcsh -n "__fish_use_subcommand" -a "users" -d 'User accounts, tokens, and label management'
64
+ complete -c xcsh -n "__fish_use_subcommand" -a "virtual" -d 'HTTP/HTTPS load balancing and traffic management'
65
+ complete -c xcsh -n "__fish_use_subcommand" -a "vpm_and_node_management" -d 'Vpm And Node Management API'
66
+ complete -c xcsh -n "__fish_use_subcommand" -a "waf" -d 'Web application firewall rules and security policies'
67
67
 
68
68
  # Alias completions
69
69
  complete -c xcsh -n "__fish_use_subcommand" -a "apisec" -d 'Alias for api'