Query Registry (v1)
The standard API surface for questioning the network graph.
The v1 registry contains 25 queries across 7 categories. Queries marked Pro+ require a Pro or Enterprise license.
License Requirements for Query Execution
- Pro or Enterprise plan required for all
POST /queries/{name}/executecalls. Community and Starter plans receive403 Forbidden. - Firewall category queries (
firewall_rules_by_device,firewall_rules_by_zone_pair,path_analysis,all_firewall_devices,deny_rules_summary) additionally require thefirewall_queriesplan flag. update_device_metadata(NetBox pull) additionally requires thenetbox_syncplan flag.- The
403response body includes the query name for easier debugging.
Check your plan and expiry at any time: GET /health/license (no auth required) or meshq license.
Topology
device_neighbors
topologyDevices directly connected to a given device (via CDP/LLDP).
Input: device_name (string)
interface_neighbors
topologyInterfaces connecting two specific devices.
Input: device_a (string), device_b (string)
topology_neighborhood
topologyN-hop BFS subgraph rooted at a given device. Returns all devices and links within the specified hop depth. Pro+
Input: device (string), depth (integer, default 2)
Endpoints
locate_endpoint_by_ip
endpointsTrace the physical switch port location of an endpoint by IP address. Results include the vrf field.
Input: ip (string), vrf (string, optional)
locate_endpoint_by_mac
endpointsTrace the physical switch port location of an endpoint by MAC address.
Input: mac (string)
endpoints_on_interface
endpointsList all endpoints (MAC/IP) connected to a specific interface.
Input: device (string), interface (string)
Blast Radius
blast_radius_interface
blast_radiusIdentify all endpoints that would be impacted if an interface goes down.
Input: device (string), interface (string)
blast_radius_device
blast_radiusIdentify all endpoints that would be impacted if a device goes down.
Input: device (string)
blast_radius_vlan
blast_radiusList all endpoints operating within a specific VLAN.
Input: vlan (integer)
blast_radius_subnet
blast_radiusList all endpoints dependent on a specific IP subnet.
Input: cidr (string)
Addressing
ips_in_subnet
addressingList all IP addresses currently allocated within a subnet. Results include the vrf field; pass vrf to filter to a specific routing instance.
Input: cidr (string), vrf (string, optional)
subnets_on_device
addressingList Layer-3 subnets present on a specific device.
Input: device (string)
orphaned_ips
addressingIdentify IPs configured on interfaces that do not belong to any known subnet. Results include the vrf field.
Input: vrf (string, optional)
Hygiene
devices_without_neighbors
hygieneIdentify isolated devices that have no detected neighbors (potential config issue).
Input: None
interfaces_without_ips
hygieneList Layer-3 interfaces that are up but have no IP address assigned.
Input: None
endpoints_without_location
hygieneList endpoints that could not be traced to a physical switch port.
Input: None
Firewall Pro+
Firewall policy queries require a Pro or Enterprise license.
firewall_rules_by_device
firewallRetrieve all firewall rules for a specific device, ordered by rule sequence number.
Input: hostname (string)
firewall_rules_by_zone_pair
firewallReturn rules across all firewalls that match a given source and destination zone pair.
Input: src_zone (string), dst_zone (string)
path_analysis
firewallFind the first-matching firewall rule per device for traffic between two IP addresses. Protocol and destination port are optional filters.
Input: src_ip (string), dst_ip (string)
all_firewall_devices
firewallReturn all devices that have at least one collected firewall rule, with rule counts.
Input: None
deny_rules_summary
firewallReturn all deny/drop/reject rules across every firewall, with device and rule metadata.
Input: None