Get Network Security Events (Meraki)
This object returns the list of network security events from the Meraki API.
Input Parameters
Meraki API Key |
String |
Yes |
The API key that will be used to pull information about the environment. The account used to obtain this key must have as a recommended minimum, full read-only access. |
Network ID |
String |
Yes |
The unique network ID for which we want to pull the events. |
Output Parameters
Events List |
Collection
|
The list of events found. It is populated if one or more events are found. It contains following information:
EventTimeStamp | String | 6/6/2020 4:28:00 | DeviceMacАddress | String | 00:00:00:00:00:00 | ClientMacАddress | String | 00:00:00:00:00:00 | SourceIP | String | 10.0.0.1:8008 | DestinationIP | String | 192.168.0.1:80 | Protocol | String | TCP/IP | Priotity | Int | 2 | Classification | Int | 4 | WasItBlocked | Boolean | True | Message | String | SERVER-Web console access attempt | Signature | String | 1:34523:5 | SignatureSource | String | Ids-vrt-bal | RuleID | String | Meraki:intrusion/snort |
|
Count of Events |
Number |
The total count of events returned. |
Result |
Number |
Returns a success value of zero or any value other than zero to indicate failure. |
Result String |
String |
Object execution error details. |
Example Input Parameters
Meraki API Key |
String |
Yes |
1a1a1a1a1a1a1a1a1a1a1a2a2a2a2a2a2a2a3a3a |
Network ID |
String |
Yes |
L_123415 |