Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

GET http://IP address:port/prefix/audit/{HOSTNAME}/{ENDTIME}/{BEGINTIME}

...

where:

{HOSTNAME}

...

—name of the Server, from which the information should be obtained.

Attention!
Infonote
titleNoteAttention!
title
Note
  • If ENDTIME < BEGINTIME in the request, then the events in the response will be sorted by time in ascending order.
  • If ENDTIME > BEGINTIME, then the events will be sorted in descending order.


ParametrParameterRequiredDescription

filter

No

List of events that can be represented both as a range separated with <-> and <:> and a simple code.

The list of event types:

1not shown in the event log
2violation of BOT of audit events (e.g., it is edged manually)
Expand

3violation of EOT of audit events (e.g., it is edged manually)
4 − some audit events are absent (e.g., they are deleted manually)
5table entry is changed 
6inactive log (no events or log update mark)
/// External events
7user is added 
8user is deleted 
9user parameters are changed 
10role is added
11role is deleted
12role parameters are changed 
13user login 
14user logout 
15device is added 
16device is deleted 
17device parameters are changed
18detection is added 
19detection is deleted 
20detection parameters are changed
21archive is added
22archive is deleted 
23archive parameters are changed
24detection rule (macro) is created
25detection rule (macro) is deleted 
26detection rule (macro) parameters are changed 
27alarm is initiated
28—area is armed
29—area is disarmed
30export from archive is performed
31notification sender (sound-, email-) is added
32notification sender is deleted
33notification sender parameters are changed
34general parameter is changed
35recording to the archive parameters are changed
36agent of export is added
37agent of export is deleted
38agent of export parameters are changed
39macro is created
40macro is deleted
41macro parameters are changed
42alarm is processed by user
43dangerous alarm
44suspicious alarm
45false alarm
46skipped alarm

47Server is included into Axxon-domain
48Server is excluded from Axxon-domain
49view archive
50view camera
51view layout
52—Forensic Search in the archive
53area search by faces in the archive
54area search by license plates in the archive

55system log export
56LDAP folder is added
57LDAP folder is deleted
58LDAP folder parameters are changed
59layout created
60layout removed
61layout changed
62user login failed
63PTZ control
64archive comment added
65archive comment changed
66license expired
67logout due to user inaction
68—Client blocked due to user inaction
69—Client unlocked by user
70Client blocked by user 
71unexpected Client shut-down

74counter added 
75counter removed 
76counter started 
77notification postponed
78version reset/restored 
79backup applied
80archive replication started
81template linked
82template unlinked 
83camera included in group
84camera excluded from group
85archive interval removed


Sample request:

GET http://127.0.0.1:80/audit/SERVER1/past/future?filter=17-20,6,1:4

...