Retrieves a list of configurable log sources for custom rules.
Try it now
Test
RAM authorization
|
Action |
Access level |
Resource type |
Condition key |
Dependent action |
|
yundun-sas:DescribeLogSource |
get |
*All Resource
|
None | None |
Request parameters
|
Parameter |
Type |
Required |
Description |
Example |
| LogType |
string |
No |
The log type of the rule. |
HTTP_ACTIVITY |
| RoleType |
integer |
No |
The view type.
|
1 |
| RoleFor |
integer |
No |
The user ID of the member. An administrator can use this parameter to switch to the perspective of a member. |
113091674488**** |
| RegionId |
string |
No |
The region where the Data Management center of Threat Analysis is deployed. You must select the region where your assets are located. Valid values:
|
cn-hangzhou |
Response elements
|
Element |
Type |
Description |
Example |
|
object |
PlainResponse<List |
||
| Data |
array<object> |
The data returned. |
123456 |
|
object |
|||
| LogSource |
string |
The log source of the rule. |
cloud_siem_aegis_sas_alert |
| LogSourceName |
string |
The Medusa code of the log source for the rule. |
sas.cloudsiem.prod.cloud_siem_aegis_sas_alert |
| Success |
boolean |
Indicates whether the request was successful. Valid values:
|
true |
| Code |
integer |
The request status code. |
200 |
| Message |
string |
The message returned. |
success |
| RequestId |
string |
The request ID. |
9AAA9ED9-78F4-5021-86DC-D51C7511**** |
Examples
Success response
JSON format
{
"Data": [
{
"LogSource": "cloud_siem_aegis_sas_alert",
"LogSourceName": "sas.cloudsiem.prod.cloud_siem_aegis_sas_alert"
}
],
"Success": true,
"Code": 200,
"Message": "success",
"RequestId": "9AAA9ED9-78F4-5021-86DC-D51C7511****"
}
Error codes
|
HTTP status code |
Error code |
Error message |
Description |
|---|---|---|---|
| 500 | InternalError | The request processing has failed due to some unknown error. |
See Error Codes for a complete list.
Release notes
See Release Notes for a complete list.