Edge UOL

    Discover how we transform IT and strengthen the security of the top companies in the market.

    Who we are Careers News

    Cyber Defenseseta

    Integrated security to detect, prevent, and respond to threats.

      Security Operations Center (SOC) Brand Protection | CTI Incident Response Web Application Protection (WAF) Firewall as a Service (FWaaS) Network Access Security Vulnerability Management Patch Management Endpoint Protection Pentest

    Cyber Resilienceseta

    Continuity and recovery to keep your business always running.

      Disaster Recovery as a Service (DRaaS) Anti-ransomware Data Protection Secure Desktops Access Management Data Loss Prevention (DLP)

    Cyber Governanceseta

    Compliance and security culture to elevate your company’s cyber maturity.

      Governance, Risk and Compliance Consulting Security Awareness & Training CIS Controls Maturity Assessment

    ManageEngineseta

    Take control of your company’s IT with integrated and secure management tools.

      Identity and Management Access Service Management Unified Endpoint and Security Management IT Operations Management Security Event Management Analytics

    Hybrid Cloud & Infrastructureseta

    Hybrid and integrated infrastructure to support the evolution of your business.

      Hybrid Cloud | Private Cloud Hosting | Colocation Network Segmentation & Integration

    Edge VMware Cloudseta

    Use hybrid cloud with the security of having the support of one of the most important players in the market.

      Disaster Recovery as a Service (DRaaS) Secure Desktops Edge Computing Network Segmentation & Integration

    AI Operationsseta

    Minimize manual interactions in the IT environment, enhancing security and productivity.

      Managed Services Intelligent Monitoring and Observability MySQL Heatwave Patch Management DevOps Data & Analytics Artificial Intelligence Squads SAP Services Oracle Experts

    Private Networksseta

    Provide your company with Private Network solutions that only an end-to-end integrator can offer.

      Consulting Network Management Private Network Implementation (4G and 5G)

    Hosting and Colocationseta

    Outsource efficiently, maintaining control over everything your company needs.

      Colocation

    Payment Solutionsseta

    Handle payments, invoice issuance, and document transfer with credibility and data security.

      BPag - Payment gateway Notanet - Invoice issuing platform
Partners Cases

    Tech Insights

    Tech Insights seta

    Articles, events, and information to go beyond and dive deep into each technology. Be inspired to transform your company.

    Articles E-books Events Web series

    Tech Universe seta

    Learn about technological innovations and how they can benefit your company.

Contact Us EN
  • EN - Inglês
  • BR - Português (Brazil)
Article/

API: Integrating Tools with Python

December 29th, 2022
IT Services
By Gabriel Silva Fernandes da Costa
API: Integrating Tools with Python

In today’s technology market, there are tools for every type of need. Some are similar, yet possess different characteristics. Often, there is a great difficulty in integrating one tool with another when there is no native support. What should be done in this situation? Give up and look for another tool? That is certainly not the ideal decision.

In this article, we will talk about APIs and use the Python language as a practical example. With it, it is possible to solve most of the integration problems existing in the market today. But how?

API (Application Programming Interface)

Most tools have an Application Programming Interface (API), where it is possible to fetch, edit, create, or delete data within the tool using two methods known as POST and GET via HTTP and HTTPS protocols.

In most cases, to connect to an API, it is necessary to have a username and password, a token, or an access key—all generated or created by the tool itself.

How does Python fit in?

When creating an integration with Python, you can use the requests library to make a request to the tool’s API through GET (when fetching data) or POST (when sending information for the tool to take an action).

Take a look at this example:

# importing requests library
import requests

# retrieving articles from the PLOS platform with titles containing the string “DNA”
article_list = requests.get(‘http://api.plos.org/search?q=title:DNA’)

# displaying retrieved data in text format
print(article_list.text)

In this way, with a simple Python script, we can fetch data from one tool and send it to another using POST. Several integrations have already been created this way by us, Edgers. Here are a few cases:

  • Integration of VMware Carbon Black with SMAX and Power BI;
  • Integration of Nessus with Power BI;
  • Integration of Zabbix with HP Service Manager and SMAX;
  • Integration of Zabbix with Ansible Tower.

By integrating these tools, it is possible to generate security alert reports, execute actions automatically if a trigger is activated, and much more.

Tags:
AI OperationsAIOps & Integration AutomationTechnology

Related

Business

The importance of active listening in pre-sales

Adrielle Santana
Artificial Intelligence Cybersecurity IT Services

The contribution of Artificial Intelligence in Cybersecurity

Rodrigo Rangel Lobo
Infrastructure Services IT Services Managed Services

AI Operations: The Real Transformation of IT Services for Business

Leonardo Schumacher
Infrastructure Services Managed Services

Cloud Yes, but with Governance

Leonardo Schumacher

Get in touch

Our team of experts is ready to support your company with solutions that enhance performance and security.

Contact usseta
Logo Edge UOL

Edge UOL

Who we are Careers News

Partners

Case Studies

Solutions

Cyber Defense Cyber Resilience Cyber Governance Hybrid Cloud & Infrastructure AI Operations Payment Solutions

Tech Universe

Cybersecurity Cloud Computing Payment Gateway ITSM and IT Governance Autonomous Operations Digital Transformation

Tech Insights

Articles E-books Events Web series

Contact Us

Grupo UOL
Privacy Policy
Terms of use
Information security
Quality management policy
Accessibility
facebook Edge UOL linkedin Edge UOL youtube Edge UOL instagram Edge UOL
© Edge UOL - 2021 - 2026 - All rights reserved
Logo LVT