For creating and updating resources, we recommend using the Checkly CLI or another Monitoring as Code option. Managing resources using the Checkly API is possible, but Monitoring as Code generally provides a better experience for this.
Authentication
The Checkly Public API uses API keys to authenticate requests. You can get a API Key in your user settings. Your API key is like a password: keep it secure! Authentication to the API is performed using the Bearer auth method in the Authorization header and using the Account ID. For example, set theAuthorization and X-Checkly-Account headers when using cURL:
Bash