IBM Security Randori REST API protocol log source parameters for IBM Security Randori Recon

Add an IBM Security Randori Recon log source that uses the IBM Security Randori REST API protocol.

When you use the IBM Security Randori REST API protocol, there are specific parameters that you must configure.

The following table describes the parameters that require specific values to collect IBM Security Randori REST API events from Randori Recon:
Table 1. IBM Security Randori REST API source parameters for the IBM Security Randori Recon DSM
Parameter Value
Log Source type IBM Security Randori Recon
Protocol Configuration IBM Security Randori REST API
Log Source Identifier The Log Source identifier can be any valid value and does not need to reference a specific server. It can also be the same value as the Log Source Name. If you have more than one configured IBM Security Randori REST API data source, ensure that you give each one a unique name.
API Key The API key that is used to access the IBM Security Randori REST API. You must have Randori access to obtain the API key value.

For more information about obtaining this value, see How to Add an API token (https://www.ibm.com/docs/en/SSD5I5K/intapi_api_AddAPIToken.html).

For a complete list of IBM Security Randori REST API protocol parameters and their values, see IBM Security Randori REST API protocol configuration options.