Skip to main content

DescribeAlarmEventDetail

Description

call DescribeAlarmEventDetail to get details of alarm events. Alarm events are divided into two dimensions: alarm and exception. An alarm event contains multiple exception events.

Request Method

POST

Request Path

/apsara/route/Sas/DescribeAlarmEventDetail

Request Parameters Common Parameters

NameLocationTypeRequiredSample valueDescription
SourceIpBODYstringNo1.2.3.4access the IP address of the source.
regionIdBODYstringYesNo sample value for this parameter.region id
AlarmUniqueInfoBODYstringYes8df914418f4211fbf756efe7a6f40cbcunique identifier of alarm event. description to query the detailed information of the alarm event, you need to provide the unique identification information of the alarm event, which can be obtained by DescribeAlarmEventList interface.
LangBODYstringNozhthe language type of the request and receive message. Valid values include: zh: Chinese en: English
FromBODYstringYessasrequest source identification, fixed as sas.
versionBODYstringNo2016-01-01version of api

Return data

NameTypeSample valueDescription
CanCancelFaultbooleanfalsecan it be unmarked as a false positive. Value: true: It can be unmarked as a false positive. false: cannot be unmarked as a false positive.
EndTimelong1542366542000alarm event end time.
RequestIdstring5A1DDB3C-798C-4A84-BF6E-3DC700000000the unique identifier generated by alibaba cloud for this request.
CauseDetailsarrayNo sample value for this parameter.the cause of the alarm event (traceability information).
StartTimelong1542378601000the start time of the alarm event.
DatastructNo sample value for this parameter.alarm event details.
IntranetIpstring1.2.3.5the private IP of the associated instance.
Namestringtroubleshooting schemeKey of traceability information field.
DataSourcestringaegis_***data source.
InstanceNamestringtest serverthe name of the associated instance.
CanBeDealOnLinebooleanfalsewhether to handle alarm events online, such as blocking isolation, adding whitelist, ignoring, etc. Value: true: online processing is supported. false: online processing is not supported.
Typestringabnormal network connectionalarm event type.
Uuidstring47900178-885d-4fa4-9d77-XXXXXXXXXXXXunique identifier ID of the associated instance.
InternetIpstring1.2.3.1the public network IP of the associated instance.
AlarmEventDescstringAfter hackers invade the server, in order to allow malicious backdoor programs to run persistently, hackers often write malicious SHELL scripts to planned tasks such as crontab and systemd.alarm event description.
AlarmUniqueInfostring8df914418f4211fbf756efe700000000unique identifier of alarm event.
Valuestringplease check whether the pages and parameters of your WEB service are vulnerable according to the above information and fix them in time.the value of the traceability information field.
AlarmEventAliasNamestringprocess exception behavior-Linux scheduled task execution exception instructionthe full name of the alarm event.
Levelstringseriousthe risk level of the alarm event. Value: serious: emergency suspicious: Suspicious mind: reminder
Keystringitemhow to display the text. Value: text: text method html: rich text method
Solutionstringplease check the malicious URL prompted in the alarm and the malicious files in the downloaded directory in time. And clean up the malicious processes that have been running in time. If the instruction is executed on your own initiative, you can click on the console to mark it as a false positive and feed it back to our security engineer through the work order.method for handling alarm events.

Example

Successful Response example

{
"CanCancelFault":"false",
"EndTime":"1542366542000",
"RequestId":"5A1DDB3C-798C-4A84-BF6E-3DC700000000",
"CauseDetails":"",
"StartTime":"1542378601000",
"Data":"",
"IntranetIp":"1.2.3.5",
"Name":"troubleshooting scheme",
"DataSource":"aegis_***",
"InstanceName":"test server",
"CanBeDealOnLine":"false",
"Type":"abnormal network connection",
"Uuid":"47900178-885d-4fa4-9d77-XXXXXXXXXXXX",
"InternetIp":"1.2.3.1",
"AlarmEventDesc":"After hackers invade the server,
in order to allow malicious backdoor programs to run persistently,
hackers often write malicious SHELL scripts to planned tasks such as crontab and systemd.",
"AlarmUniqueInfo":"8df914418f4211fbf756efe700000000",
"Value":"please check whether the pages and parameters of your WEB service are vulnerable according to the above information and fix them in time.",
"AlarmEventAliasName":"process exception behavior-Linux scheduled task execution exception instruction",
"Level":"serious",
"Key":"item",
"Solution":"please check the malicious URL prompted in the alarm and the malicious files in the downloaded directory in time. And clean up the malicious processes that have been running in time. If the instruction is executed on your own initiative,
you can click on the console to mark it as a false positive and feed it back to our security engineer through the work order."
}

Failed Response example

{
"errorSample":
{
"resultCode":-1,
"resultMsg":"system error",
"result":null
}

}