Parameters

ParameterDescription
Application NameWill check if it is contained in the alert’s log_filter.application_name array.
Severity-
Start TimeQuery all alerts that have been created from a specific timestamp until now.
Subsystem NameWill check if it is contained in the alert log_filter.subsystem_name array.

Example Output

{    "total": 2,    "alerts": [        {            "id": "f4c94a3e-a117-4942-9cf6-03c66f816eb5",            "unique_identifier": "2fd83e1b-e381-482f-b72b-a2d3f5ca34f4",            "name": "rtxhjycukgviboj;npm[,.;/'",            "severity": "info",            "created_at": "2022-12-11T09:28:55.000Z",            "expiration": null,            "is_active": true,            "log_filter": {                "text": "",                "category": null,                "filter_type": "text",                "severity": [],                "application_name": [],                "subsystem_name": [],                "computer_name": null,                "class_name": null,                "ip_address": null,                "method_name": null            },            "condition": {                "condition_type": "more_than",                "threshold": 1,                "timeframe": "10MIN"            },            "notifications": null,            "notify_every": 60,            "description": "",            "active_when": {                "timeframes": []            },            "lastTriggered": "Never triggered",            "notif_payload_filter": [],            "notify_on_resolved": false,            "notify_group_by_only_alerts": true,            "notify_per_group_by_value": false,            "meta_labels": [],            "cleanup_deadman_duration": null,            "should_trigger_deadman": true        },        {            "id": "9c73fc79-be0e-4239-8efd-3f562090c098",            "unique_identifier": "309a5e95-26d7-4f1c-bf43-7b735697e6bb",            "name": "efghstkyluto;yioi",            "severity": "error",            "created_at": "2022-12-11T09:28:50.000Z",            "expiration": null,            "is_active": true,            "log_filter": {                "text": "",                "category": null,                "filter_type": "text",                "severity": [],                "application_name": [],                "subsystem_name": [],                "computer_name": null,                "class_name": null,                "ip_address": null,                "method_name": null            },            "condition": {                "condition_type": "more_than",                "threshold": 1,                "timeframe": "10MIN"            },            "notifications": null,            "notify_every": 60,            "description": "",            "active_when": {                "timeframes": []            },            "lastTriggered": "Never triggered",            "notif_payload_filter": [],            "notify_on_resolved": false,            "notify_group_by_only_alerts": true,            "notify_per_group_by_value": false,            "meta_labels": [],            "cleanup_deadman_duration": null,            "should_trigger_deadman": true        }    ]}

Workflow Library Example

List Alerts with Coralogix and Send Results Via Email

Preview this Workflow on desktop