Simulating an Alert Rule
Function
Simulate alert rule
Calling Method
For details, see Calling APIs.
URI
POST /v1/{project_id}/workspaces/{workspace_id}/siem/alert-rules/simulation
| Parameter | Mandatory | Type | Description | 
|---|---|---|---|
| project_id | Yes | String | Project ID. Project ID. | 
| workspace_id | Yes | String | Workspace ID. Workspace ID. | 
Request Parameters
| Parameter | Mandatory | Type | Description | 
|---|---|---|---|
| X-Auth-Token | Yes | String | User token. You can obtain the token by calling the IAM API used to obtain a user token. Token of an IAM user. To obtain it, call the corresponding IAM API. | 
| Parameter | Mandatory | Type | Description | 
|---|---|---|---|
| pipe_id | Yes | String | Pipeline ID.Pipe ID. | 
| query | Yes | String | Query. | 
| query_type | No | String | SQL query syntax. Query type. SQL. | 
| from | Yes | Long | Start time.Start time. | 
| to | Yes | Long | End time.End time. | 
| event_grouping | No | Boolean | Alert group. Incident group. | 
| triggers | Yes | Array of AlertRuleTrigger objects | Alert triggering rules. Alert triggers. | 
| Parameter | Mandatory | Type | Description | 
|---|---|---|---|
| mode | No | String | Number of modes. Mode. COUNT. | 
| operator | No | String | Operator, which can be equal to, not equal to, greater than, or less than. operator. EQ equal, NE not equal, GT greater than, LT less than. | 
| expression | Yes | String | expression | 
| severity | No | String | Severity. The options are as follows - Tips - Low - Medium - High - FATAL. | 
| accumulated_times | No | Integer | accumulated_times | 
Response Parameters
Status code: 200
| Parameter | Type | Description | 
|---|---|---|
| X-request-id | String | This field is the request ID number for task tracking. Format is request_uuid-timestamp-hostname. | 
| Parameter | Type | Description | 
|---|---|---|
| alert_count | Integer | Number of alarms. Alert count. | 
| severity | String | Severity. The options are as follows - Tips - Low - Medium - High - Critical Severity. | 
Status code: 400
| Parameter | Type | Description | 
|---|---|---|
| X-request-id | String | This field is the request ID number for task tracking. Format is request_uuid-timestamp-hostname. | 
Example Requests
Simulate an alarm rule. The ID of the pipe to which the alarm rule belongs is ead2769b-afb0-45dd-b9fa-a2953e6ac82f, the query type is SQL, and the severity is Warning.
{
  "pipe_id" : "ead2769b-afb0-45dd-b9fa-a2953e6ac82f",
  "query" : "* | select status, count(*) as count group by status",
  "query_type" : "SQL",
  "event_grouping" : true,
  "from" : 1665221214000,
  "to" : 1665546370000,
  "triggers" : [ {
    "mode" : "COUNT",
    "operator" : "GT",
    "expression" : 10,
    "severity" : "TIPS"
  } ]
}
  Example Responses
Status code: 200
Success
{
  "alert_count" : 100,
  "severity" : "TIPS"
}
  Status Codes
| Status Code | Description | 
|---|---|
| 200 | Success | 
| 400 | Bad Request | 
Error Codes
See Error Codes.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.
 
    