全部产品
Search
文档中心

云安全中心:DescribeAlarmEventDetail - 获取告警事件详细信息

更新时间:Feb 20, 2024

获取告警事件的详细信息。告警事件分为告警与异常两个维度,一个告警事件包含多个异常事件。

调试

您可以在OpenAPI Explorer中直接运行该接口,免去您计算签名的困扰。运行成功后,OpenAPI Explorer可以自动生成SDK代码示例。

授权信息

下表是API对应的授权信息,可以在RAM权限策略语句的Action元素中使用,用来给RAM用户或RAM角色授予调用此API的权限。具体说明如下:

  • 操作:是指具体的权限点。
  • 访问级别:是指每个操作的访问级别,取值为写入(Write)、读取(Read)或列出(List)。
  • 资源类型:是指操作中支持授权的资源类型。具体说明如下:
    • 对于必选的资源类型,用背景高亮的方式表示。
    • 对于不支持资源级授权的操作,用全部资源表示。
  • 条件关键字:是指云产品自身定义的条件关键字。
  • 关联操作:是指成功执行操作所需要的其他权限。操作者必须同时具备关联操作的权限,操作才能成功。
操作访问级别资源类型条件关键字关联操作
yundun-sas:DescribeAlarmEventDetailRead
  • acs:yundun-sas:{#regionId}:{#accountId}:*

请求参数

名称类型必填描述示例值
SourceIpstring

访问源 IP 地址。

192.168.XX.XX
Langstring

设置请求和接收消息的语言类型,默认为 zh。取值:

  • zh:中文
  • en:英文
zh
AlarmUniqueInfostring

告警事件的唯一标识。

说明 查询警事件的详细信息,需要提供告警事件的唯一标识信息,该标识信息可调用 DescribeSuspEvents 接口获取。
9f62555666f177aa84ee1eaf465a****
Fromstring

请求来源标识,固定为 sas

sas

返回参数

名称类型描述示例值
object
RequestIdstring

本次调用请求的 ID,是由阿里云为该请求生成的唯一标识符,可用于排查和定位问题。

7EA50837-2F0B-5BCC-AB61-4968D88D75AD
Dataobject

告警事件的详情。

Typestring

告警类型。取值:

  • Suspicious Process
  • Webshell
  • Unusual Logon
  • Malicious Software
  • Sensitive File Tampering
  • Unusual Network Connection
  • Other
  • Suspicious Account
  • Cloud threat detection
  • Precision defense
  • Application Whitelist
  • Persistence
  • Web Application Threat Detection
  • Malicious scripts
  • Malicious Network Activity
  • K8s Abnormal Behavior
  • Website backdoor (local engine)
  • Exploit
  • Image Scan
  • Trusted exception
Webshell
InternetIpstring

关联实例的公网 IP。

172.16.XX.XX
K8sClusterNamestring

k8s 集群名称。

TestK8sCluser
ContainerImageIdstring

容器镜像 ID。

cadb7a725641
AlarmEventDescstring

告警事件描述。

The detection model finds that self-mutation is running on your server. A self-mutation Trojan is a Trojan horse program with self-mutation function. It will change its hash or copy a large number of itself to different paths, and run in the background to avoid cleaning.
AlarmUniqueInfostring

告警事件的唯一标识。

说明 查询警事件的详细信息,需要提供告警事件的唯一标识信息,该标识信息可调用 DescribeSuspEvents 接口获取。
9f62555666f177aa84ee1eaf465a****
CanCancelFaultboolean

能否取消告警。取值:

  • true:可以取消标记为误报。

  • false:不能取消标记为误报。

false
AppNamestring

容器应用名称。

app:msdp-uat-service
CanBeDealOnLineboolean

能否在线处理。取值:

  • true:可以取消标记为误报。

  • false:不能取消标记为误报。

false
ContainerImageNamestring

容器镜像名称。

jenkins/jenkins:latest
K8sClusterIdstring

K8s 集群 ID。

c562cf0d68e9749ee9fe544a7ab2f****
ContainHwModeboolean

是否是重大活动安全保障模式。

true
InstanceNamestring

实例名称。

i-wz92q7m5hsbgfhdss***
K8sNodeIdstring

k8s 节点 ID。

i-bp14a1ay8e0aa9t0l***
Solutionstring

告警事件的处理方法。

An invalid logon source IP has been detected. If you recognize this logon attempt, we recommend that you add the current logon source IP to the valid logon source IP list to avoid future alerts. If you do not recognize this logon attempt, we recommend that you modify the password.
DataSourcestring

告警事件的数据来源。

aegis_***
IntranetIpstring

关联实例的私网 IP。

172.25.30.**
AlarmEventAliasNamestring

告警事件名称。

Login with unusual location
EndTimelong

告警事件结束的时间戳,单位为毫秒。

1542366542000
Uuidstring

资产实例的 UUID。

6690a46c-0edb-4663-a641-3629d1a9****
StartTimelong

告警事件的开始的时间戳,单位为毫秒。

1542378601000
ContainerIdstring

容器应用 ID。

container_1606995441910_394868_01_000***
K8sPodNamestring

k8sPod 名称。

myapp-pod
K8sNamespacestring

K8s 命名空间。

sit-saic-trip
K8sNodeNamestring

k8s 节点名称。

cn-hangzhou.10.188.139.**
Levelstring

告警事件的危险等级。取值:

  • serious:紧急。
  • suspicious:可疑。
  • remind:提醒。
serious
CauseDetailsobject []

告警事件发生的原因(溯源信息)。

Keystring

告警事件溯源的 key。

842e314e69b1a2c45d5c1a2f88a16***
Valueobject []

告警事件溯源的 value。

Typestring

溯源信息字段的展示类型。取值:

  • text:文本方式。
  • html:富文本方式。
html
Valuestring

溯源信息字段的值。

<p>under a certain small probability, yundun may mistakenly judge the repeated attempts caused by the administrator forgetting or entering the wrong password as successful blasting. Please check according to the account number and time shown in the alarm details. Once it is confirmed that it is not the initiative of the administrator, it is recommended to immediately block the IP, and you can open it at the same time<a href="https://yundun.console.aliyun.com/?p=pam">PAM</a>, hosting host login password, improving remote connection efficiency and security control ability, and according to<a href="https://click.aliyun.com/m/1000226086/">best practice of ECS account security protection</a>Modify login password and convergence asset.</p>↵
Namestring

溯源信息字段的名称。

sshd

示例

正常返回示例

JSON格式

{
  "RequestId": "7EA50837-2F0B-5BCC-AB61-4968D88D75AD",
  "Data": {
    "Type": "Webshell",
    "InternetIp": "172.16.XX.XX",
    "K8sClusterName": "TestK8sCluser",
    "ContainerImageId": "cadb7a725641",
    "AlarmEventDesc": "The detection model finds that self-mutation is running on your server. A self-mutation Trojan is a Trojan horse program with self-mutation function. It will change its hash or copy a large number of itself to different paths, and run in the background to avoid cleaning.",
    "AlarmUniqueInfo": "9f62555666f177aa84ee1eaf465a****",
    "CanCancelFault": false,
    "AppName": "app:msdp-uat-service",
    "CanBeDealOnLine": false,
    "ContainerImageName": "jenkins/jenkins:latest",
    "K8sClusterId": "c562cf0d68e9749ee9fe544a7ab2f****",
    "ContainHwMode": true,
    "InstanceName": "i-wz92q7m5hsbgfhdss***",
    "K8sNodeId": "i-bp14a1ay8e0aa9t0l***",
    "Solution": "An invalid logon source IP has been detected. If you recognize this logon attempt, we recommend that you add the current logon source IP to the valid logon source IP list to avoid future alerts. If you do not recognize this logon attempt, we recommend that you modify the password.",
    "DataSource": "aegis_***",
    "IntranetIp": "172.25.30.**",
    "AlarmEventAliasName": "Login with unusual location",
    "EndTime": 1542366542000,
    "Uuid": "6690a46c-0edb-4663-a641-3629d1a9****",
    "StartTime": 1542378601000,
    "ContainerId": "container_1606995441910_394868_01_000***",
    "K8sPodName": "myapp-pod",
    "K8sNamespace": "sit-saic-trip",
    "K8sNodeName": "cn-hangzhou.10.188.139.**",
    "Level": "serious",
    "CauseDetails": [
      {
        "Key": "842e314e69b1a2c45d5c1a2f88a16***",
        "Value": [
          {
            "Type": "html",
            "Value": "<p>under a certain small probability, yundun may mistakenly judge the repeated attempts caused by the administrator forgetting or entering the wrong password as successful blasting. Please check according to the account number and time shown in the alarm details. Once it is confirmed that it is not the initiative of the administrator, it is recommended to immediately block the IP, and you can open it at the same time<a href=\"https://yundun.console.aliyun.com/?p=pam\">PAM</a>, hosting host login password, improving remote connection efficiency and security control ability, and according to<a href=\"https://click.aliyun.com/m/1000226086/\">best practice of ECS account security protection</a>Modify login password and convergence asset.</p>↵",
            "Name": "sshd"
          }
        ]
      }
    ]
  }
}

错误码

HTTP status code错误码错误信息描述
403NoPermissioncaller has no permission当前操作未被授权,请联系主账号在RAM控制台进行授权后再执行操作。
500ServerErrorServerError服务故障,请稍后重试!

访问错误中心查看更多错误码。

变更历史

变更时间变更内容概要操作
暂无变更历史