get https://api.picussecurity.com/v1/simulations//run//threats//peers//integrations//raw-logs
Retrieves raw log file download links for a specific threat, peer, and integration combination. Returns an array of URLs pointing to raw log files that can be downloaded.
About
Retrieves raw log file download links for a specific threat/action and returns an array of URLs pointing to raw log files that can be downloaded.
Takes the following parameters:
- simulationId (required) – Simulation ID
- runId (required) – Simulation run ID
- threatId (required) – Threat ID
- peerId (required) – Integration Agent ID of the connected integration
- Integration Agent ID can be retrieved through the Integration Agents endpoint, or through the Integrations endpoint if the Agent ID of a specific integration is needed.
- integrationId (required) – Integration configuration ID
- actionId (optional) – Action ID. Used to filter logs related to a specific action
Important NoteTo use this endpoint, the Extract Raw Logs option must be enabled in the Integration Configuration.
Example
curl --request GET \
--url https://api.picussecurity.com/v1/simulations/1/run/3/threats/4168/peers/11/integrations/22/rawLogs \
--header 'Accept: application/json' \
--header 'Authorization: Bearer access_token'{
"Status": 200,
"Response": {
"raw_log_file_links": [
"https://picus-ng-stockholm.s3.eu-north-1.amazonaws.com/rawLogs/260/3813/2237/18123/19006/Alert-chunk-0.json?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Checksum-Mode=ENABLED&X-Amz-Credential=ASIAZQNPQR3YILAWCIJS%2F20250904%2Feu-north-1%2Fs3%2Faws4_request&X-Amz-Date=20250904T120129Z&X-Amz-Expires=1800&X-Amz-Security-Token=IQoJb3JpZ2luX2VjEPT%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCmV1LW5vcnRoLTEiRzBFAiEA8fbyxuw0PC0TmXt6PDwv7jKfIW05ZQoaKVgRgEV%2BU4gCICsuj%2BFaC6a8I2KVXSHFDS8eKgtlcv6XJzu8xQPQwlY4KuYDCF0QAhoMNjUzNzM5OTg2NjcyIgzmJSda1IbmgKg77pgqwwMJupGc1VhuuXdlpBnfYEFQd6VbNKz%2BKY9VWxDMDiRBcF57bY%2B5LSHcj%2BzsYsPohGJsunrSUYoFuk0%2FJoW6wLPlzvCobNoRsSfDUXN7x5JuatJexOAaVlYVVXvz1TlHPSW7dWbwJMGTmdj3eWDRrNoycSJn11l2CUqEgDm03YRrcm5weuR2qmWWFvqLxlsv34Ppd5flSuuDRdocQbz2LkXoe%2FFfMFk%2BaEug7T6YwXNEB7WFIx3gqu%2BGFyW%2FSpVzQHiNlrqp31zM8JgnJwEeoyBTeFDsRRKUpxgMavDFIobRKU8icfdaWC8iQJKeKZssH1Twu3iQH5DG2m9Z90P9fO%2BCZEPAkCaN10xG34AnlIBbqFTcTU6s3rIqTFRD0nP4O%2BJh%2FMLLnP%2B6eM5uHKTa3DTYX3YAJgZ0kTKh015XJSIhtRowdLbW10hAK70bwziH2rrc1iEE2VudPl6wC8VnfqI5VXe96qbveMPOHuymyoRChf34Y61G1O1yaUJP1M3XJ%2Fs9aUW3N2gbFTY%2F0UBSZSLPXBSLVPOBxh8IGFePjsDKytViI5mkYHtSTXFAeuDes3cbw0MttG4RwzY96CkjuCKkFuznMKX%2B5cUGOqUBYr2asHeXTFdJXtkxhC8SOJtvhQ6bcFQgedi2JVLdsKe1VOJ737Iw7aaaopSBU6dH8SMmz9Me5VvHPcEvu6a0ZtAUHxbx6QVzpuif2gLrVn5c5tmaRdBNY1GkjzYFW%2F0GSPy3tg1IiPU6DFMDRvhOnhO1W%2FXgZ1DGHy3YgUXND0C0pfafPBK1W4IzRuqgnHdRb9%2FaGHU2abxqLqDglT98hf18ty7F&X-Amz-SignedHeaders=host&x-id=GetObject&X-Amz-Signature=933ae59895f0f618f3a82a3bf0e33480bcf94e71eb37632cfad44654e95d3a4b"
]
},
"Headers": null
}