Simulating an Alert Rule
Function
Simulate alert rule
Calling Method
For details, see Calling APIs.
URI
POST /v1/{project_id}/workspaces/{workspace_id}/siem/alert-rules/simulation
| Parameter | Mandatory | Type | Description |
|---|---|---|---|
| project_id | Yes | String | Project ID. Project ID. |
| workspace_id | Yes | String | Workspace ID. Workspace ID. |
Request Parameters
| Parameter | Mandatory | Type | Description |
|---|---|---|---|
| X-Auth-Token | Yes | String | User token. You can obtain the token by calling the IAM API used to obtain a user token. Token of an IAM user. To obtain it, call the corresponding IAM API. |
| Parameter | Mandatory | Type | Description |
|---|---|---|---|
| pipe_id | Yes | String | Pipeline ID.Pipe ID. |
| query | Yes | String | Query. |
| query_type | No | String | SQL query syntax. Query type. SQL. |
| from | Yes | Long | Start time.Start time. |
| to | Yes | Long | End time.End time. |
| event_grouping | No | Boolean | Alert group. Incident group. |
| triggers | Yes | Array of AlertRuleTrigger objects | Alert triggering rules. Alert triggers. |
| Parameter | Mandatory | Type | Description |
|---|---|---|---|
| mode | No | String | Number of modes. Mode. COUNT. |
| operator | No | String | Operator, which can be equal to, not equal to, greater than, or less than. operator. EQ equal, NE not equal, GT greater than, LT less than. |
| expression | Yes | String | expression |
| severity | No | String | Severity. The options are as follows - Tips - Low - Medium - High - FATAL. |
| accumulated_times | No | Integer | accumulated_times |
Response Parameters
Status code: 200
| Parameter | Type | Description |
|---|---|---|
| X-request-id | String | This field is the request ID number for task tracking. Format is request_uuid-timestamp-hostname. |
| Parameter | Type | Description |
|---|---|---|
| alert_count | Integer | Number of alarms. Alert count. |
| severity | String | Severity. The options are as follows - Tips - Low - Medium - High - Critical Severity. |
Status code: 400
| Parameter | Type | Description |
|---|---|---|
| X-request-id | String | This field is the request ID number for task tracking. Format is request_uuid-timestamp-hostname. |
Example Requests
Simulate an alarm rule. The ID of the pipe to which the alarm rule belongs is ead2769b-afb0-45dd-b9fa-a2953e6ac82f, the query type is SQL, and the severity is Warning.
{
"pipe_id" : "ead2769b-afb0-45dd-b9fa-a2953e6ac82f",
"query" : "* | select status, count(*) as count group by status",
"query_type" : "SQL",
"event_grouping" : true,
"from" : 1665221214000,
"to" : 1665546370000,
"triggers" : [ {
"mode" : "COUNT",
"operator" : "GT",
"expression" : 10,
"severity" : "TIPS"
} ]
} Example Responses
Status code: 200
Success
{
"alert_count" : 100,
"severity" : "TIPS"
} Status Codes
| Status Code | Description |
|---|---|
| 200 | Success |
| 400 | Bad Request |
Error Codes
See Error Codes.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.