Get /settings/integration/syslog/{id}
Description
Returns a list of syslog parser records matching the supplied filter.
Request Parameter
Id, the syslog parser record.
Request Headers
Key |
Value |
Type |
Description |
---|---|---|---|
Authorization | Bearer <Authorization Token> | String | Authorization credential generated by FortiNAC |
Content-Type (option 1) | application/json | String | |
Content-Type (option 2) |
application/xml |
|
|
Sample Request
Request URL |
GET https://10.106.94.152:8443/api/v2/policy/settings/integration/syslog/1 |
Request Header |
Authorization: Bearer <Authorization_Token> Content-Type: application/json
|
Sample Response
{
"status": "success",
"errorMessage": null,
"results": [
{
"dbid": 1,
"isRTR": false,
"isEnabled": true,
"name": "StoneGate IPS",
"vendor": "StoneGate",
"format": 1,
"delimiter": ",",
"tagDelimiter": "=",
"sourceIPColumn": "5",
"sourceIPMatcher": ".*",
"sourceIPValue": "$0",
"destinationIPColumn": "",
"destinationIPMatcher": ".*",
"destinationIPValue": "$0",
"typeColumn": "2",
"typeMatcher": ".*",
"typeValue": "Permit,Denied,Terminate,Default alert",
"subtypeColumn": "",
"subtypeMatcher": ".*",
"subtypeValue": "$0",
"threatIDColumn": "",
"threatIDMatcher": ".*",
"threatIDValue": "$0",
"descriptionColumn": "6,3,7,2,8",
"descriptionMatcher": ".*",
"descriptionValue": "{0}, Severity {1}\nRuleID {2}, Action {3}\nProtocol {4}.",
"severityColumn": "3",
"severityMatcher": ".*",
"severityValue": "$0",
"severityMap": {
"10": 3,
"1": 1,
"2": 1,
"3": 1,
"4": 2,
"5": 2,
"6": 2,
"7": 3,
"8": 3,
"9": 3
},
"yamsEventTag": null,
"auditObj": null,
"auditObjectName": "StoneGate IPS",
"auditObjectType": {
"auditTableName": "RTRSecurityEventParserAudit",
"mysqlTableName": "RTRSecurityEventParser",
"idnameQuery": "select ID,name from RTRSecurityEventParser where ID in"
},
"lastModifiedBy": "SYSTEM",
"lastModifiedDate": "2023-08-25T17:40:28.000+0000"
}
],
"filtered": 1,
"total": 1
}