Skip to main content

Cyware Orchestrate

Akamai Prolexic Analytics

App Vendor: Akamai Prolexic Analytics

Connector Category: Analytics & SIEM

Connector Version: 1.0.2

API Version: 1.0.0

About App

The Prolexic Analytics API exposes analytics data from Prolexic DDoS protection and monitoring services such as alerts and network bandwidth time-series data. In Orchestrate, this app helps pull attack reports and alert information into local SIEM instances to streamline emergency response and post-event triage using events data.

The Prolexic Analytics API app is configured with the Orchestrate application to perform the following actions:

Action Name

Description

Get attack report

This action retrieves an attack report by the customer and attack id.

List attack reports

This action retrieves a list of attack reports within the specified time range.

List critical events

This action retrieves a list of critical events.

List events

This action retrieves a list of events.

Configuration Parameters

The following configuration parameters are required for the Prolexic Analytics API app to communicate with the Prolexic Analytics API enterprise application. The parameters can be configured by creating instances in the app.

Parameter

Description

Field Type

Required/Optional

Comments

Hostname

Enter the Hostname.

Example:

abc.xyz.com

Text

Required

Client token

Enter the Client token.

Example:

https://akzz-XXXX-XXXXX.luna.akamaiapis.net

Password

Required

Client secret

Enter the Client secret ID.

Example:

JuteZVSHG657BT

Password

Required

Access token

Enter the Access token.

Example:

05df8200263dec5125d65e8aa

Password

Required

Protocol

Enter the Protocol.

Text

Optional

Default protocol:

  • https

Valid protocols:

  • total

  • icmp

  • igmp

  • udp

  • tcp

Action: Get attack report

This action retrieves an attack report by the customer and attack id.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Contract name

Enter the current contract name.

Example:

coral

Text

Required

Attack id

Enter the attack id.

Example:

1996

Text

Required

Example Request

{
   "currentContract":"coral",
   "attackId":1966
}
Action: List attack reports

This action retrieves a list of attack reports within the specified time range.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Contract name

Enter the current contract name.

Example:

coral

Text

Required

Start time

Enter the start time in epoch format.

Example:

1398049512

Text

Required

End time

Enter the end time in epoch format.

Example:

1397049511

Text

Required

Example Request

{
   "currentContract":"coral",
   "endTime":1381349456,
   "startTime":1392922838
}
Action: List critical events

This action retrieves a list of critical events.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Contract name

Enter the current contract name.

Example:

coral

Text

Required

Example Request

{
    "currentContract": "coral"
}
Action: List events

This action retrieves a list of events.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Contract name

Enter the current contract name.

Example:

coral

Text

Required

Example Request

{
    "currentContract": "coral"
}