-
Notifications
You must be signed in to change notification settings - Fork 162
Event Streams
Joshua Hiller edited this page Mar 6, 2026
·
22 revisions
This service collection has code examples posted to the repository.
| Operation ID | Description | ||||
|---|---|---|---|---|---|
|
Refresh an active event stream. Use the URL shown in a listAvailableStreamsOAuth2 response. | ||||
|
Discover all event streams in your environment | ||||
WARNING
client_idandclient_secretare keyword arguments that contain your CrowdStrike API credentials. Please note that all examples below do not hard code these values. (These values are ingested as strings.)CrowdStrike does not recommend hard coding API credentials or customer identifiers within source code.
Refresh an active event stream. Use the URL shown in a listAvailableStreamsOAuth2 response.
refresh_active_stream
| Method | Route |
|---|---|
/sensors/entities/datafeed-actions/v1/{} |
- Consumes: application/json
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| action_name |
|
|
query | string | The name of the action to perform. The only allowed value is refresh_active_stream_session. Defaults to this value if not present when using the Service Class. |
| app_id |
|
|
query | string | Label that identifies your connection. Max: 32 alphanumeric characters (a-z, A-Z, 0-9). Will also accept the keyword appId to specify this value. |
| partition |
|
|
path | integer | Partition to request data for. If you are using the Service Class, this will default to 0 when not specified. |
| parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import EventStreams
# Do not hardcode API credentials!
falcon = EventStreams(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
PARTITION = 0 #Refresh the partition we are working with
response = falcon.refresh_active_stream(action_name="string",
app_id="string",
partition=PARTITION
)
print(response)from falconpy import EventStreams
# Do not hardcode API credentials!
falcon = EventStreams(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
PARTITION = 0 #Refresh the partition we are working with
response = falcon.refreshActiveStreamSession(action_name="string",
app_id="string",
partition=PARTITION
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
PARTITION = 0 #Refresh the partition we are working with
response = falcon.command("refreshActiveStreamSession",
app_id="string",
partition=PARTITION,
action_name="string"
)
print(response)Back to Table of Contents
Discover all event streams in your environment
list_available_streams
| Method | Route |
|---|---|
/sensors/entities/datafeed/v2 |
- Consumes: application/json
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| app_id |
|
|
query | string | Label that identifies your connection. Max: 32 alphanumeric characters (a-z, A-Z, 0-9). Will also accept the keyword appId to specify this value. |
| format |
|
|
query | string | Format for streaming events. Valid values: json, flatjson
|
| parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import EventStreams
# Do not hardcode API credentials!
falcon = EventStreams(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.list_available_streams(app_id="string", format="string")
print(response)from falconpy import EventStreams
# Do not hardcode API credentials!
falcon = EventStreams(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.listAvailableStreamsOAuth2(app_id="string", format="string")
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("listAvailableStreamsOAuth2", app_id="string", format="string")
print(response)Back to Table of Contents

- Home
- Discussions Board
- Glossary of Terms
- Installation, Upgrades and Removal
- Samples Collection
- Using FalconPy
- API Operations
-
Service Collections
- Admission Control Policies
- Alerts
- API Integrations
- ASPM
- CAO Hunting
- Case Management
- Certificate Based Exclusions
- Cloud AWS Registration
- Cloud Azure Registration
- Cloud GCP Registration
- Cloud OCI Registration
- Cloud Policies
- Cloud Connect AWS (deprecated)
- Cloud Security Assets
- Cloud Security
- Cloud Security Compliance
- Cloud Security Detections
- Cloud Snapshots
- Configuration Assessment
- Configuration Assessment Evaluation Logic
- Container Alerts
- Container Detections
- Container Image Compliance
- Container Images
- Container Packages
- Container Vulnerabilities
- Content Update Policies
- Correlation Rules
- Correlation Rules Admin
- CSPM Registration
- Custom IOAs
- Custom Storage
- D4C Registration (deprecated)
- Data Protection Configuration
- DataScanner (deprecated)
- Delivery Settings
- Deployments
- Detects (deprecated)
- Device Content
- Device Control Policies
- Discover
- Downloads
- Drift Indicators
- Event Streams
- Exposure Management
- FaaS Execution
- Falcon Complete Dashboard
- Falcon Container
- Falcon Intelligence Sandbox
- FDR
- FileVantage
- Firewall Management
- Firewall Policies
- Foundry LogScale
- Host Group
- Host Migration
- Hosts
- Identity Protection
- Image Assessment Policies
- Incidents
- Installation Tokens
- Intel
- Intelligence Feeds
- Intelligence Indicator Graph
- IOA Exclusions
- IOC
- IOCs (deprecated)
- IT Automation
- Kubernetes Container Compliance
- Kubernetes Protection
- MalQuery
- Message Center
- ML Exclusions
- Mobile Enrollment
- MSSP (Flight Control)
- NGSIEM
- OAuth2
- ODS (On Demand Scan)
- Prevention Policy
- Quarantine
- Quick Scan
- Quick Scan Pro
- Real Time Response
- Real Time Response Admin
- Real Time Response Audit
- Recon
- Report Executions
- Response Policies
- Sample Uploads
- SaaS Security
- Scheduled Reports
- Sensor Download
- Sensor Update Policy
- Sensor Usage
- Sensor Visibility Exclusions
- Serverless Exports
- Serverless Vulnerabilities
- Spotlight Evaluation Logic
- Spotlight Vulnerabilities
- Spotlight Vulnerability Metadata
- Tailored Intelligence
- ThreatGraph
- Unidentified Containers
- User Management
- Workflows
- Zero Trust Assessment
- Documentation Support
-
CrowdStrike SDKs
- Crimson Falcon - Ruby
- FalconPy - Python 3
- FalconJS - Javascript
- goFalcon - Go
- PSFalcon - Powershell
- Rusty Falcon - Rust
