단순 룰

단순/YAML 룰에 대한 REST API 작업

개요

이러한 API 작업을 사용하여 상호작용합니다 다음으로 생성됨 CLI 워크플로우의 Simple Detections 또는 Panther 콘솔의 Simple Detection Builder.

circle-info

Simple 룰 API 엔터티는 다음인 룰에만 적용됩니다 간단한 디텍션. 에서 생성된 룰과 상호작용하려면 Python, 참조하세요 .

API를 호출하려면, 다음을 참조하세요 Panther REST API 사용 방법 지침—포함하여 이 문서 페이지에서 직접 호출하는 방법에 대한 지침.

필수 권한

  • 에 대해 GET 작업의 경우, API 토큰에는 룰 보기 권한이 있어야 합니다.

  • 에 대해 POST, PUT그리고 DELETE 작업의 경우, API 토큰에는 룰 관리 권한이 있어야 합니다.

작업

circle-info

아래 API 엔드포인트는 Simple Detections 전용입니다. 다른 디텍션 유형과 상호작용하려면 해당 페이지를 참조하세요: 파이썬 기반 룰arrow-up-right, 스케줄된 룰arrow-up-right그리고 클라우드 정책arrow-up-right.

create simple rule

post
Authorizations
X-API-KeystringRequired
Query parameters
run-tests-firstbooleanOptional

set this field to false to exclude running tests prior to saving

Default: true
run-tests-onlybooleanOptional

set this field to true if you want to run tests without saving

Default: false
Body
alertContextstringOptional

The alert context represented in YAML

alertTitlestringOptional

The alert title represented in YAML

dedupPeriodMinutesinteger · int64 · min: 1Optional

The amount of time in minutes for grouping alerts

Default: 60
descriptionstringOptional

The description of the rule

detectionstringRequired

The yaml representation of the rule

displayNamestringOptional

The display name of the rule

dynamicSeveritiesstringOptional

The dynamic severity represented in YAML

enabledbooleanOptional

Determines whether or not the rule is active

groupBystringOptional

The key on an event to group by represented in YAML

idstringRequired

The id of the rule

inlineFiltersstringOptional

The filter for the rule represented in YAML

logTypesstring[]Optional

log types

managedbooleanOptional

Determines if the simple rule is managed by panther

outputIDsstring[]Optional

Destination IDs that override default alert routing based on severity

pythonBodystringOptional

The python body of the rule

runbookstringOptional

How to handle the generated alert

severitystring · enumRequiredPossible values:
summaryAttributesstring[]Optional

A list of fields in the event to create top 5 summaries for

tagsstring[]Optional

The tags for the simple rule

thresholdinteger · int64 · min: 1Optional

the number of events that must match before an alert is triggered

Default: 1
Responses
chevron-right
200

OK response.

application/json
post
/simple-rules

get a simple rule

get
Authorizations
X-API-KeystringRequired
Path parameters
idstringRequired

ID of the rule to fetch

Query parameters
include-pythonbooleanOptional

determines if associated python for the generated rule is returned

Default: false
Responses
chevron-right
200

OK response.

application/json
get
/simple-rules/{id}

put simple rule

put

put creates or updates a rule

Authorizations
X-API-KeystringRequired
Path parameters
idstringRequired

the id of the rule

Query parameters
run-tests-firstbooleanOptional

set this field to false to exclude running tests prior to saving

Default: true
run-tests-onlybooleanOptional

set this field to true if you want to run tests without saving

Default: false
Body
alertContextstringOptional

The alert context represented in YAML

alertTitlestringOptional

The alert title represented in YAML

dedupPeriodMinutesinteger · int64 · min: 1Optional

The amount of time in minutes for grouping alerts

Default: 60
descriptionstringOptional

The description of the rule

detectionstringRequired

The yaml representation of the rule

displayNamestringOptional

The display name of the rule

dynamicSeveritiesstringOptional

The dynamic severity represented in YAML

enabledbooleanOptional

Determines whether or not the rule is active

groupBystringOptional

The key on an event to group by represented in YAML

idstringRequired

The id of the rule

inlineFiltersstringOptional

The filter for the rule represented in YAML

logTypesstring[]Optional

log types

managedbooleanOptional

Determines if the simple rule is managed by panther

outputIDsstring[]Optional

Destination IDs that override default alert routing based on severity

pythonBodystringOptional

The python body of the rule

runbookstringOptional

How to handle the generated alert

severitystring · enumRequiredPossible values:
summaryAttributesstring[]Optional

A list of fields in the event to create top 5 summaries for

tagsstring[]Optional

The tags for the simple rule

thresholdinteger · int64 · min: 1Optional

the number of events that must match before an alert is triggered

Default: 1
Responses
chevron-right
200

200 returned if the item already existed

application/json
put
/simple-rules/{id}

delete simple rule

delete
Authorizations
X-API-KeystringRequired
Path parameters
idstringRequired

ID of the simple rule to delete

Responses
delete
/simple-rules/{id}

No content

list simple rules

get
Authorizations
X-API-KeystringRequired
Query parameters
cursorstringOptional

the pagination token

limitinteger · int64Optional

the maximum results to return

Default: 100
include-pythonbooleanOptional

determines if associated python for the generated rule is returned

Default: false
name-containsstringOptional

Substring search by name (case-insensitive)

statestring · enumOptional

Only include rules in the given state

Possible values:
log-typestring[]Optional

Only include rules which apply to one of the given log types

tagstring[]Optional

Only include rules with one of the given tags (case-insensitive)

created-bystringOptional

Only include rules whose creator matches this user ID or actor ID

last-modified-bystringOptional

Only include rules last modified by this user ID or actor ID

Responses
chevron-right
200

OK response.

application/json
get
/simple-rules
200

OK response.

마지막 업데이트

도움이 되었나요?