Reviewed-by: Hasko, Vladimir <vladimir.hasko@t-systems.com> Co-authored-by: Li, Qiao <qiaoli@huawei.com> Co-committed-by: Li, Qiao <qiaoli@huawei.com>
16 KiB
Querying Event Type in Alarm Notifications
Function Description
This API is used to query event type in an alarm notification.
URI
- URI format
- Parameter description
Table 1 Path parameters Parameter
Mandatory
Type
Description
project_id
Yes
String
Specifies the project ID.
lang
No
String
Specifies the language configuration. The options are zh-cn and en-us. The default value is en-us.
Request
Request parameters
None
Response
Parameter |
Type |
Description |
---|---|---|
threats |
List |
Specifies the list of event types. |
locale |
Specifies event names. |
Parameter |
Type |
Description |
---|---|---|
xss |
String |
Specifies XSS attack. |
sqli |
String |
Specifies SQL injection. |
cmdi |
String |
Specifies command injection. |
cc |
String |
Specifies CC attack. |
custom |
String |
Specifies Precise Protection. |
illegal |
String |
Specifies invalid requests. |
lfi |
String |
Specifies local file inclusion. |
robot |
String |
Specifies malicious crawlers. |
antitamper |
String |
Specifies Web Tamper Protection. |
rfi |
String |
Specifies remote file inclusion. |
vuln |
String |
Specifies other types of attacks. |
whiteblackip |
String |
Specifies Blacklist and Whitelist. |
webshell |
String |
Specifies webshells. |
Example
{ "threats": ["xss", "sqli", "cmdi"], "locale": { "xss": "Cross Site Scripting", "sqli": "SQL Injection", "cmdi": "Command Injection" } }
Status Code
For details about error status codes, see Status Codes.