Get Alert Rule by ID
GET/alert/rule/:id
Returns information about the alert rule with the specified ID.
Request
Path Parameters
Alert rule ID (also known as the "policyScanConfigId")
Responses
- 200
- 400
- 403
- 404
successful operation
- application/json; charset=UTF-8
- Schema
- Example (from schema)
Schema
- Array [
- Array [
- ]
- For email notifications: List of unique email addresses to notify
- For integrations without notification templates: List of integration ids
- For integrations with notification templates: List of notification template ids
- ]
- Array [
- ]
alertRuleNotificationConfig object[]
List of data for notifications to third-party tools
Day of month
daysOfWeek object[]
Days of week
Possible values: [SU
, MO
, TU
, WE
, TH
, FR
, SA
]
Provide csv detailed report
Scan enabled
Possible values: [as_it_happens
, daily
, weekly
, monthly
]
Frequency from RRule
Hour of day
Alert rule notification config ID
Include remediation in detailed report
Last Updated
Time of last notification in milliseconds
Template ID
Java time zone ID (e.g. America/Los_Angeles)
Possible values: [email
, slack
, splunk
, amazon_sqs
, jira
, microsoft_teams
, webhook
, aws_security_hub
, google_cscc
, service_now
, pager_duty
, azure_service_bus_queue
, demisto
, aws_s3
, snowflake
]
Integration type
Compress detailed report
Allow Auto-Remediation
Delay notifications by the specified milliseconds
Rule/Scan description
Rule/Scan is enabled
Last modified by
Last modified on this date/time in milliseconds
Rule/Scan name
List of notification channels
include dismissed alerts in notification
include open alerts in notification
include resolved alerts in notification
include snoozed alerts in notification
Open alerts count (Deprecated - will be removed soon)
Customer
List of specific policies to scan
Policy labels
Policy Scan Config ID
Model is read-only
Scan all policies
target objectrequired
Model for Target Filter
List of Account group(s)
alertRulePolicyFilter object
Model for Alert Rule Policy Filter
List of available Alert Rule Policy Filters
Possible values: [ALL
, AWS
, AZURE
, GCP
, ALIBABA_CLOUD
, OCI
, IBM
]
Cloud Type Filter
Compliance Standard Filter
Policy Label Filter
Policy Severity Filter
List of excluded accounts
includedResourceLists object
Model for holding the lists resource list ids by resource list type
List of regions for which alerts will be triggered for account groups. Alerts not associated with specific regions will be triggered regardless of listed regions. If no regions are specified, then the alerts will be triggered for all regions.
tags object[]
List of TargetTag models (resource tags) for which alerts should be triggered
Resource tag target
List of value(s) for resource tag key
{
"alertRuleNotificationConfig": [
{
"dayOfMonth": 0,
"daysOfWeek": [
{
"day": "SU",
"offset": 0
}
],
"detailedReport": true,
"enabled": true,
"frequency": "as_it_happens",
"frequencyFromRRule": "string",
"hourOfDay": 0,
"id": "string",
"includeRemediation": true,
"lastUpdated": 0,
"last_sent_ts": 0,
"recipients": [
"string"
],
"rruleSchedule": "string",
"templateId": "string",
"timezone": "string",
"type": "email",
"withCompression": true
}
],
"allowAutoRemediate": true,
"delayNotificationMs": 0,
"description": "string",
"enabled": true,
"lastModifiedBy": "string",
"lastModifiedOn": 0,
"name": "string",
"notificationChannels": [
"string"
],
"notifyOnDismissed": true,
"notifyOnOpen": true,
"notifyOnResolved": true,
"notifyOnSnoozed": true,
"openAlertsCount": 0,
"owner": "string",
"policies": [
"string"
],
"policyLabels": [
"string"
],
"policyScanConfigId": "string",
"readOnly": true,
"scanAll": true,
"target": {
"accountGroups": [
"string"
],
"alertRulePolicyFilter": {
"availablePolicyFilters": [
"string"
],
"cloud.type": [
"ALL"
],
"policy.complianceStandard": [
"string"
],
"policy.label": [
"string"
],
"policy.severity": [
"string"
]
},
"excludedAccounts": [
"string"
],
"includedResourceLists": {
"computeAccessGroupIds": [
"string"
]
},
"regions": [
"string"
],
"tags": [
{
"key": "string",
"values": [
"string"
]
}
]
}
}
invalid_policy_id
not_owner_or_same_role
no_results