Mock sample for your project: HyperDrive API

Integrate with "HyperDrive API" from azure.com in no time with Mockoon's ready to use mock sample

HyperDrive

azure.com

Version: 2019-09-30


Use this API in your project

Speed up your application development by using "HyperDrive API" ready-to-use mock sample. Mocking this API will allow you to start working in no time. No more accounts to create, API keys to provision, accesses to configure, unplanned downtime, just work.
It also improves your integration tests' quality and reliability by accounting for random failures, slow response time, etc.

Description

HyperDrive REST API

Other APIs by azure.com

ContainerServiceClient

azure.com
The Container Service Client.

TopLevelDomains API Client

azure.com

AppConfigurationManagementClient

azure.com

ApiManagementClient

azure.com
Use these REST APIs for performing operations on Quota entity associated with your Azure API Management deployment. To configure call rate limit and quota policies refer to how to configure call rate limit and quota.

ApiManagementClient

azure.com
Use these REST APIs for performing operations on who is going to receive notifications associated with your Azure API Management deployment.

ApiManagementClient

azure.com
Use these REST APIs to get the analytics reports associated with your Azure API Management deployment.

AutomationManagement

azure.com

ApplicationInsightsManagementClient

azure.com
Azure Application Insights client for saved items.

ApiManagementClient

azure.com
Use these REST APIs for performing operations on Certificate entity in your Azure API Management deployment. Certificates can be used to setup mutual authentication with your Backend in API Management. For more information refer to How to secure backend using Mutual Auth Certificate.

AutomationManagement

azure.com

ApplicationInsightsManagementClient

azure.com
Azure Application Insights client for web test locations.

FabricAdminClient

azure.com
Storage system operation endpoints and objects.

Other APIs in the same category

WebApplicationFirewallManagement

azure.com
APIs to manage web application firewall rules.

AutomationManagement

azure.com

NetworkAdminManagementClient

azure.com
Load balancer admin operation endpoints and objects.

Amazon Comprehend

Amazon Comprehend is an AWS service for gaining insight into the content of documents. Use these actions to determine the topics contained in your documents, the topics they discuss, the predominant sentiment expressed in them, the predominant language used, and more.

FabricAdminClient

azure.com
Logical subnet operation endpoints and objects.

FabricAdminClient

azure.com
Fabric location operation endpoints and objects.

StorageManagementClient

azure.com
The Admin Storage Management Client.

FabricAdminClient

azure.com
IP pool operation endpoints and objects.

FabricAdminClient

azure.com
Storage subsystem operation endpoints and objects.

AutomationManagement

azure.com

AWS Network Firewall

This is the API Reference for AWS Network Firewall. This guide is for developers who need detailed information about the Network Firewall API actions, data types, and errors. The REST API requires you to handle connection details, such as calculating signatures, handling request retries, and error handling. For general information about using the AWS REST APIs, see AWS APIs. To access Network Firewall using the REST API endpoint: https://network-firewall..amazonaws.com Alternatively, you can use one of the AWS SDKs to access an API that's tailored to the programming language or platform that you're using. For more information, see AWS SDKs. For descriptions of Network Firewall features, including and step-by-step instructions on how to use them through the Network Firewall console, see the Network Firewall Developer Guide. Network Firewall is a stateful, managed, network firewall and intrusion detection and prevention service for Amazon Virtual Private Cloud (Amazon VPC). With Network Firewall, you can filter traffic at the perimeter of your VPC. This includes filtering traffic going to and coming from an internet gateway, NAT gateway, or over VPN or AWS Direct Connect. Network Firewall uses rules that are compatible with Suricata, a free, open source intrusion detection system (IDS) engine. For information about Suricata, see the Suricata website. You can use Network Firewall to monitor and protect your VPC traffic in a number of ways. The following are just a few examples: Allow domains or IP addresses for known AWS service endpoints, such as Amazon S3, and block all other forms of traffic. Use custom lists of known bad domains to limit the types of domain names that your applications can access. Perform deep packet inspection on traffic entering or leaving your VPC. Use stateful protocol detection to filter protocols like HTTPS, regardless of the port used. To enable Network Firewall for your VPCs, you perform steps in both Amazon VPC and in Network Firewall. For information about using Amazon VPC, see Amazon VPC User Guide. To start using Network Firewall, do the following: (Optional) If you don't already have a VPC that you want to protect, create it in Amazon VPC. In Amazon VPC, in each Availability Zone where you want to have a firewall endpoint, create a subnet for the sole use of Network Firewall. In Network Firewall, create stateless and stateful rule groups, to define the components of the network traffic filtering behavior that you want your firewall to have. In Network Firewall, create a firewall policy that uses your rule groups and specifies additional default traffic filtering behavior. In Network Firewall, create a firewall and specify your new firewall policy and VPC subnets. Network Firewall creates a firewall endpoint in each subnet that you specify, with the behavior that's defined in the firewall policy. In Amazon VPC, use ingress routing enhancements to route traffic through the new firewall endpoints.

SubscriptionsManagementClient

azure.com
The Admin Subscriptions Management Client.