Block SIEM events (legacy customers only)
The content on this page deals with a legacy feature of the Akamai Identity Cloud. If you are currently an Identity Cloud customer and are using SIEM event delivery, that feature is still supported. However, if youโre new to the Identity Cloud, SIEM event delivery is no longer available.
Not all events are created equal, which means that some events simply might not be of interest to you: for example, although you can receive event notifications any time an entity type is created, deleted, or updated, maybe you donโt really need to (or want to) receive notices for those events. If there are events that you would rather not see in your SIEM event deliveries, then you can use the SIEM Event Delivery APIs to block those events. Blocked events still take place: if you can create, update, or delete entity types, events for each of those activities will still be generated. Itโs just that those events wonโt show up in your SIEM event deliveries.
However, they could show up elsewhere; for example, you might have a webhooks subscription that notifies you when an entity type is created, updated, or deleted. Blocking**only affects SIEM Event Delivery. And, in this case at least, whatโs done isnโt irretrievably and irrevocably done: any event added to the block list can just as easily be removed from the list. If you take entity type purges off the block list then, the next time an entity type is purged, notification of that event will appear in your SIEM event feed.
To block an event, begin by identifying the official name of the event you want to block. In a SIEM event message, the event name will be the value assigned to the type key:ย
{
ย "id":
ย ย "message": {
ย ย ย ย "app_id": "htb8fuhxnf8e38jrzub3c7pfrr",
ย ย ย ย "client_id": "nmub5w3rru9k6rzupqaeb7bbwv6jn658",
ย ย ย ย "endpoint_uri": "http://documentation.akamai.com/widget/traditional_signin.jsonp",
ย ย ย ย "type": "legacy_traditional_signin",
ย ย ย ย "forward_headers": [
ย ย ย ย ย ย {
ย ย ย ย ย ย ย ย "name": "HTTP_X_FORWARDED_FOR",
ย ย ย ย ย ย ย ย "value": "192.168.1.1, 192.168.1.2, 192.168.1.3"
ย ย ย ย ย ย },
ย ย ย ย ย ย {
ย ย ย ย ย ย ย ย "name": "HTTP_X_FORWARDED_PROTO",
ย ย ย ย ย ย ย ย "value": "http"
ย ย ย ย ย ย },
ย ย ย ย ย ย {
ย ย ย ย ย ย ย ย "name": "HTTP_X_FORWARDED_PORT",
ย ย ย ย ย ย ย ย "value": "80"
ย ย ย ย ย ย }
ย ย ย ย ],
ย ย ย ย "ip_address": "192.168.1.1",
ย ย ย ย "origin": "https://login.documentation.akamai.com/",
ย ย ย ย "user_agent": "Mozilla/5.0 (Android 8.1.0; Mobile; rv:68.0) Gecko/68.0 Firefox/68.0",
ย ย ย ย "user_uuid": "437920f3-85dd-4cb7-ba8c-7025faea1d2c"
ย ย },
ย ย "msts": 1566206726081,
ย ย "type:" "siem#legacy_traditional_signin"
}
After you've determined the names of the events you want to block, you can then add those event types by using the /eventdelivery/addBlocklist API operation. For example, this call adds the events config_change and email_verification to the block list:
curl -X POST \
https://v1.api.us.janrain.com/config/applications/htb8fuhxnf8e38jrzub3c7pfrr/eventdelivery/addBlocklist \
-H 'Authorization: Basic M2dmYmdycmE3dzI4MmhndHJ5cGZxeDlwemhxaGpnZDU6Y2dkY3A3bWhjeWszYmZocnl2d2NmY2c3NTdqdzRhb3E=' \
-H 'Content-Type: application/json' \
-d '
[
"config_change",
"email_verification",
]'
If you want to remove an event type from the block list, use the same basic approach but call the /eventdelivery/deleteBlocklist operation. For example, this command removes config_change and email_verification from the list: ย
curl -X POST \
https://v1.api.us.janrain.com/config/applications/htb8fuhxnf8e38jrzub3c7pfrr/eventdelivery/deleteBlocklist \
-H 'Authorization: Basic M2dmYmdycmE3dzI4MmhndHJ5cGZxeDlwemhxaGpnZDU6Y2dkY3A3bWhjeWszYmZocnl2d2NmY2c3NTdqdzRhb3E=' \
-H 'Content-Type: application/json' \
-d '
[
"config_change",
"email_verification"
]'
Incidentally, you can use the /eventdelivery/readBlocklist operation to see which events are currently on your SIEM delivery block list. For example:
curl -X GET \
https://v1.api.us.janrain.com/config/applications/htb8fuhxnf8e38jrzub3c7pfrr/eventdelivery/readBlocklist \
-H 'Authorization: Basic M2dmYmdycmE3dzI4MmhndHJ5cGZxeDlwemhxaGpnZDU6Y2dkY3A3bWhjeWszYmZocnl2d2NmY2c3NTdqdzRhb3E=' \
-H 'Content-Type: application/json'
The preceding command returns data similar to this:
[
ย ย {
ย ย ย ย "eventType": "config_change",
ย ย ย ย "created": "2019-08-05T23:55:04.622346Z"
ย ย },
ย {
ย ย ย ย "eventType": "email_verification",
ย ย ย ย "created": "2019-08-05T23:55:04.622346Z"
ย }
]
Updated over 2 years ago