Fortinet white logo
Fortinet white logo

Rest API

7.2.0

Get /settings/integration/syslog/{id}

Get /settings/integration/syslog/{id}

Description

Returns a list of syslog parser records matching the supplied filter.

Request Parameter

Id, the syslog parser record.

Request Headers

Key

Value

Type

Description

Authorization Bearer <Authorization Token> String Authorization credential generated by FortiNAC
Content-Type (option 1) application/json String

Content-Type (option 2)

application/xml

Sample Request

Request URL

GET https://10.106.94.152:8443/api/v2/policy/settings/integration/syslog/1

Request Header

Authorization: Bearer <Authorization_Token>

Content-Type: application/json

Sample Response

{

"status": "success",

"errorMessage": null,

"results": [

{

"dbid": 1,

"isRTR": false,

"isEnabled": true,

"name": "StoneGate IPS",

"vendor": "StoneGate",

"format": 1,

"delimiter": ",",

"tagDelimiter": "=",

"sourceIPColumn": "5",

"sourceIPMatcher": ".*",

"sourceIPValue": "$0",

"destinationIPColumn": "",

"destinationIPMatcher": ".*",

"destinationIPValue": "$0",

"typeColumn": "2",

"typeMatcher": ".*",

"typeValue": "Permit,Denied,Terminate,Default alert",

"subtypeColumn": "",

"subtypeMatcher": ".*",

"subtypeValue": "$0",

"threatIDColumn": "",

"threatIDMatcher": ".*",

"threatIDValue": "$0",

"descriptionColumn": "6,3,7,2,8",

"descriptionMatcher": ".*",

"descriptionValue": "{0}, Severity {1}\nRuleID {2}, Action {3}\nProtocol {4}.",

"severityColumn": "3",

"severityMatcher": ".*",

"severityValue": "$0",

"severityMap": {

"10": 3,

"1": 1,

"2": 1,

"3": 1,

"4": 2,

"5": 2,

"6": 2,

"7": 3,

"8": 3,

"9": 3

},

"yamsEventTag": null,

"auditObj": null,

"auditObjectName": "StoneGate IPS",

"auditObjectType": {

"auditTableName": "RTRSecurityEventParserAudit",

"mysqlTableName": "RTRSecurityEventParser",

"idnameQuery": "select ID,name from RTRSecurityEventParser where ID in"

},

"lastModifiedBy": "SYSTEM",

"lastModifiedDate": "2023-08-25T17:40:28.000+0000"

}

],

"filtered": 1,

"total": 1

}

Get /settings/integration/syslog/{id}

Get /settings/integration/syslog/{id}

Description

Returns a list of syslog parser records matching the supplied filter.

Request Parameter

Id, the syslog parser record.

Request Headers

Key

Value

Type

Description

Authorization Bearer <Authorization Token> String Authorization credential generated by FortiNAC
Content-Type (option 1) application/json String

Content-Type (option 2)

application/xml

Sample Request

Request URL

GET https://10.106.94.152:8443/api/v2/policy/settings/integration/syslog/1

Request Header

Authorization: Bearer <Authorization_Token>

Content-Type: application/json

Sample Response

{

"status": "success",

"errorMessage": null,

"results": [

{

"dbid": 1,

"isRTR": false,

"isEnabled": true,

"name": "StoneGate IPS",

"vendor": "StoneGate",

"format": 1,

"delimiter": ",",

"tagDelimiter": "=",

"sourceIPColumn": "5",

"sourceIPMatcher": ".*",

"sourceIPValue": "$0",

"destinationIPColumn": "",

"destinationIPMatcher": ".*",

"destinationIPValue": "$0",

"typeColumn": "2",

"typeMatcher": ".*",

"typeValue": "Permit,Denied,Terminate,Default alert",

"subtypeColumn": "",

"subtypeMatcher": ".*",

"subtypeValue": "$0",

"threatIDColumn": "",

"threatIDMatcher": ".*",

"threatIDValue": "$0",

"descriptionColumn": "6,3,7,2,8",

"descriptionMatcher": ".*",

"descriptionValue": "{0}, Severity {1}\nRuleID {2}, Action {3}\nProtocol {4}.",

"severityColumn": "3",

"severityMatcher": ".*",

"severityValue": "$0",

"severityMap": {

"10": 3,

"1": 1,

"2": 1,

"3": 1,

"4": 2,

"5": 2,

"6": 2,

"7": 3,

"8": 3,

"9": 3

},

"yamsEventTag": null,

"auditObj": null,

"auditObjectName": "StoneGate IPS",

"auditObjectType": {

"auditTableName": "RTRSecurityEventParserAudit",

"mysqlTableName": "RTRSecurityEventParser",

"idnameQuery": "select ID,name from RTRSecurityEventParser where ID in"

},

"lastModifiedBy": "SYSTEM",

"lastModifiedDate": "2023-08-25T17:40:28.000+0000"

}

],

"filtered": 1,

"total": 1

}