All Products
Search
Document Center

Security Center:DescribeCloudSiemEvents

Last Updated:Mar 29, 2024

Queries events in SIEM.

Debugging

OpenAPI Explorer automatically calculates the signature value. For your convenience, we recommend that you call this operation in OpenAPI Explorer.

Authorization information

The following table shows the authorization information corresponding to the API. The authorization information can be used in the Action policy element to grant a RAM user or RAM role the permissions to call this API operation. Description:

  • Operation: the value that you can use in the Action element to specify the operation on a resource.
  • Access level: the access level of each operation. The levels are read, write, and list.
  • Resource type: the type of the resource on which you can authorize the RAM user or the RAM role to perform the operation. Take note of the following items:
    • The required resource types are displayed in bold characters.
    • If the permissions cannot be granted at the resource level, All Resources is used in the Resource type column of the operation.
  • Condition Key: the condition key that is defined by the cloud service.
  • Associated operation: other operations that the RAM user or the RAM role must have permissions to perform to complete the operation. To complete the operation, the RAM user or the RAM role must have the permissions to perform the associated operations.
OperationAccess levelResource typeCondition keyAssociated operation
yundun-sas:DescribeCloudSiemEventsRead
  • acs:yundun-sas::{#accountId}:*
    none
none

Request parameters

ParameterTypeRequiredDescriptionExample
StartTimelongNo

The beginning of the time range to query. Unit: milliseconds.

1577808000000
EndTimelongNo

The end of the time range to query. Unit: milliseconds.

1577808000000
ThreadLevelarrayNo

The risk levels of the events. The value is a JSON array. Valid values:

  • serious: high
  • suspicious: medium
  • remind: low
stringNo

The risk level of the event. The value is a JSON string. Valid values:

  • serious: high
  • suspicious: medium
  • remind: low
["remind","serious"]
EventNamestringNo

The name of the event.

ECS unusual log in
IncidentUuidstringNo

The ID of the event.

85ea4241-798f-4684-a876-65d4f0c3****
AssetIdstringNo

The ID of the asset that is associated with the event.

6c740667-80b2-476d-8924-2e706feb****
StatusintegerNo

The status of the event. Valid values:

  • 0: unhandled
  • 1: handling
  • 5: handling failed
  • 10: handled
0
OrderFieldstringNo

The sort field. Valid values:

  • GmtModified: sorts the events by creation time. This is the default value.
  • ThreatScore: sorts the events by risk score.
ThreatScore
OrderstringNo

The sort order. Valid values:

  • desc: descending order
  • asc: ascending order
desc
CurrentPageintegerYes

The page number. Pages start from page 1.

1
PageSizeintegerYes

The number of entries per page. Maximum value: 100.

10
RegionIdstringNo

The region in which the data management center of the threat analysis feature resides. Specify this parameter based on the regions in which your assets reside. Valid values:

  • cn-hangzhou: Your assets reside in regions in China.
  • ap-southeast-1: Your assets reside in regions outside China.
cn-hangzhou

Response parameters

ParameterTypeDescriptionExample
object

PageResponse<List>

Successboolean

Indicates whether the request was successful. Valid values:

  • true
  • false
true
Codeinteger

The HTTP status code.

200
Messagestring

The returned message.

success
RequestIdstring

The request ID.

9AAA9ED9-78F4-5021-86DC-D51C7511****
Dataobject

The data returned.

PageInfoobject

The pagination information.

CurrentPageinteger

The current page number.

1
PageSizeinteger

The number of entries per page.

10
TotalCountlong

The total number of entries returned.

100
ResponseDataobject []

The detailed data.

GmtCreatestring

The time when the event occurred.

2021-01-06 16:37:29
GmtModifiedstring

The time when the event was last updated.

2021-01-06 16:37:29
Aliuidlong

The ID of the Alibaba Cloud account to which the event belongs.

127608589417****
AlertNuminteger

The number of alerts that are associated with the event.

4
AssetNuminteger

The number of assets that are associated with the event.

4
IncidentUuidstring

The UUID of the event.

85ea4241-798f-4684-a876-65d4f0c3****
IncidentNamestring

The name of the event.

Multiple type of alerts, including Miner Network, Command line download and run malicious files, Backdoor Process, etc
IncidentNameEnstring

The event name in English.

Multiple type of alerts, including Miner Network, Command line download and run malicious files, Backdoor Process, etc
Descriptionstring

The description of the event.

The threat event contains 13 Miner Network,1 Execute suspicious encoded commands on Linux, etc
DescriptionEnstring

The event description in English.

The threat event contains 13 Miner Network,1 Execute suspicious encoded commands on Linux, etc
DataSourcesarray

The sources of the alert.

string

The source.

[sas,waf]
ThreatLevelstring

The risk level. Valid values:

  • serious: high
  • suspicious: medium
  • remind: low
remind
ThreatScorefloat

The risk score of the event. Valid values: 0 to 100. A higher value indicates a higher risk level.

90.2
ExtContentstring

The extended event information in the JSON format.

{"event_transfer_type":"customize_rule"}
Statusinteger

The status of the event. Valid values:

  • 0: unhandled
  • 1: handling
  • 5: handling failed
  • 10: handled
0
AttCkLabelsarray

The tags of the ATT&CK attack.

string

The tag.

["T1595.002 Vulnerability Scanning"]
Remarkstring

The remarks of the event.

dealed

Examples

Sample success responses

JSONformat

{
  "Success": true,
  "Code": 200,
  "Message": "success",
  "RequestId": "9AAA9ED9-78F4-5021-86DC-D51C7511****",
  "Data": {
    "PageInfo": {
      "CurrentPage": 1,
      "PageSize": 10,
      "TotalCount": 100
    },
    "ResponseData": [
      {
        "GmtCreate": "2021-01-06 16:37:29",
        "GmtModified": "2021-01-06 16:37:29",
        "Aliuid": 0,
        "AlertNum": 4,
        "AssetNum": 4,
        "IncidentUuid": "85ea4241-798f-4684-a876-65d4f0c3****",
        "IncidentName": "Multiple type of alerts, including Miner Network, Command line download and run malicious files, Backdoor Process, etc",
        "IncidentNameEn": "Multiple type of alerts, including Miner Network, Command line download and run malicious files, Backdoor Process, etc",
        "Description": "The threat event contains 13 Miner Network,1 Execute suspicious encoded commands on Linux, etc",
        "DescriptionEn": "The threat event contains 13 Miner Network,1 Execute suspicious encoded commands on Linux, etc",
        "DataSources": [
          "[sas,waf]"
        ],
        "ThreatLevel": "remind",
        "ThreatScore": 90.2,
        "ExtContent": "{\"event_transfer_type\":\"customize_rule\"}",
        "Status": 0,
        "AttCkLabels": [
          "[\"T1595.002 Vulnerability Scanning\"]"
        ],
        "Remark": "dealed"
      }
    ]
  }
}

Error codes

HTTP status codeError codeError message
501CloudSiem_Internal_ExceptionCloudSiem_Internal_Exception

For a list of error codes, visit the Service error codes.