Functions/BloxOne/BloxOneCloud/Get-B1SecurityLog.ps1
function Get-B1SecurityLog { <# .SYNOPSIS Queries the BloxOneDDI Security Log .DESCRIPTION This function is used to query the BloxOneDDI Security Log. This log contains web server information relating to the Cloud Services Portal Web UI. .PARAMETER Username The username of which you would like to filter the audit log with .PARAMETER ClientIP Used to filter the Audit Log by IP Address .PARAMETER Type Used to filter by Security Event Type, such as "nginx.access" .PARAMETER App Use this parameter to filter by App, such as "nginx" .PARAMETER Domain Use this parameter to filter by the domain of the authenticated user, such as "mycorpdomain.com" .PARAMETER Start A date parameter used as the starting date/time of the log search. By default, the search will start from 24hrs ago and returns the latest results first. You may need to increase the -Limit parameter or reduce the -End date/time to view earlier events. .PARAMETER End A date parameter used as the end date/time of the log search. .PARAMETER Limit Use this parameter to limit the quantity of results. The default number of results is 100. .PARAMETER Offset Use this parameter to offset the results by the value entered for the purpose of pagination .PARAMETER Strict Use strict filter matching. By default, filters are searched using wildcards where possible. Using strict matching will only return results matching exactly what is entered in the applicable parameters. .PARAMETER CustomFilters Accepts either an Object, ArrayList or String containing one or more custom filters. See here for usage: https://ibps.readthedocs.io/en/latest/#-customfilters .PARAMETER Raw Return results as raw without additional parsing .EXAMPLE PS> Get-B1SecurityLog -Limit "25" -Offset "0" -Username "my.email@domain.com" -App "nginx" -Type "nginx.access" -Domain "domain.com" .FUNCTIONALITY BloxOneDDI .FUNCTIONALITY Logs #> param( [string]$Username, [string]$ClientIP, [string]$Type, [string]$App, [string]$Domain, [datetime]$Start = (Get-Date).AddDays(-1), [datetime]$End = (Get-Date), [Int]$Limit = 100, [Int]$Offset, [switch]$Strict, $CustomFilters, [switch]$Raw ) $Start = $Start.ToUniversalTime() $End = $End.ToUniversalTime() $MatchType = Match-Type $Strict [System.Collections.ArrayList]$Filters = @() [System.Collections.ArrayList]$QueryFilters = @() if ($CustomFilters) { $Filters.Add($CustomFilters) | Out-Null } if ($Username) { $Filters.Add("userEmail$MatchType`"$Username`"") | Out-Null } if ($Type) { $Filters.Add("security_event_type$MatchType`"$Type`"") | Out-Null } if ($App) { $Filters.Add("app$MatchType`"$App`"") | Out-Null } if ($ClientIP) { $Filters.Add("remote_addr==`"$ClientIP`"") | Out-Null } if ($Domain) { $Filters.Add("domain==$Domain") | Out-Null } if ($Start) { $StartTime = $Start.ToString("yyyy-MM-ddTHH:mm:ssZ") $Filters.Add("start_time==`"$StartTime`"") | Out-Null } if ($End) { $EndTime = $End.ToString("yyyy-MM-ddTHH:mm:ssZ") $Filters.Add("end_time==`"$EndTime`"") | Out-Null } if ($Filters) { $Filter = Combine-Filters $Filters $QueryFilters.Add("_filter=$Filter") | Out-Null } $QueryFilters.Add("_limit=$Limit") | Out-Null $QueryFilters.Add("_offset=$Offset") | Out-Null if ($QueryFilters) { $QueryString = ConvertTo-QueryString $QueryFilters } Write-DebugMsg -Filters $QueryFilters if ($QueryString) { $Results = Invoke-CSP -Uri "$(Get-B1CSPUrl)/security-events/v1/security_events$($QueryString)" -Method GET | Select-Object -ExpandProperty results -ErrorAction SilentlyContinue } else { $Results = Invoke-CSP -Uri "$(Get-B1CSPUrl)/security-events/v1/security_events" -Method GET | Select-Object -ExpandProperty results -ErrorAction SilentlyContinue } if ($Results) { if ($Raw) { return $Results } else { $Results.log | ConvertFrom-Json | ConvertFrom-Json } } else { Write-Host "Error. Unable to find any security logs." -ForegroundColor Red break } } |