# Raw Log File Links

Retrieves raw log file download links for a specific threat, peer, and integration combination. Returns an array of URLs pointing to raw log files that can be downloaded.

About

Retrieves raw log file download links for a specific threat/action and returns an array of URLs pointing to raw log files that can be downloaded.

Takes the following parameters:

  • simulationId (required) – Simulation ID
  • runId (required) – Simulation run ID
  • threatId (required) – Threat ID
  • peerId (required) – Integration Agent ID of the connected integration
    • Integration Agent ID can be retrieved through the Integration Agents endpoint, or through the Integrations endpoint if the Agent ID of a specific integration is needed.
  • integrationId (required) – Integration configuration ID
  • actionId (optional) – Action ID. Used to filter logs related to a specific action
⚠️

Important Note

To use this endpoint, the Extract Raw Logs option must be enabled in the Integration Configuration.

Example

curl --request GET \
     --url https://api.picussecurity.com/v1/simulations/1/run/3/threats/4168/peers/11/integrations/22/rawLogs \
     --header 'Accept: application/json' \
     --header 'Authorization: Bearer access_token'
{
    "Status": 200,
    "Response": {
        "raw_log_file_links": [
            "https://picus-ng-stockholm.s3.eu-north-1.amazonaws.com/rawLogs/260/3813/2237/18123/19006/Alert-chunk-0.json?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Checksum-Mode=ENABLED&X-Amz-Credential=ASIAZQNPQR3YILAWCIJS%2F20250904%2Feu-north-1%2Fs3%2Faws4_request&X-Amz-Date=20250904T120129Z&X-Amz-Expires=1800&X-Amz-Security-Token=IQoJb3JpZ2luX2VjEPT%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCmV1LW5vcnRoLTEiRzBFAiEA8fbyxuw0PC0TmXt6PDwv7jKfIW05ZQoaKVgRgEV%2BU4gCICsuj%2BFaC6a8I2KVXSHFDS8eKgtlcv6XJzu8xQPQwlY4KuYDCF0QAhoMNjUzNzM5OTg2NjcyIgzmJSda1IbmgKg77pgqwwMJupGc1VhuuXdlpBnfYEFQd6VbNKz%2BKY9VWxDMDiRBcF57bY%2B5LSHcj%2BzsYsPohGJsunrSUYoFuk0%2FJoW6wLPlzvCobNoRsSfDUXN7x5JuatJexOAaVlYVVXvz1TlHPSW7dWbwJMGTmdj3eWDRrNoycSJn11l2CUqEgDm03YRrcm5weuR2qmWWFvqLxlsv34Ppd5flSuuDRdocQbz2LkXoe%2FFfMFk%2BaEug7T6YwXNEB7WFIx3gqu%2BGFyW%2FSpVzQHiNlrqp31zM8JgnJwEeoyBTeFDsRRKUpxgMavDFIobRKU8icfdaWC8iQJKeKZssH1Twu3iQH5DG2m9Z90P9fO%2BCZEPAkCaN10xG34AnlIBbqFTcTU6s3rIqTFRD0nP4O%2BJh%2FMLLnP%2B6eM5uHKTa3DTYX3YAJgZ0kTKh015XJSIhtRowdLbW10hAK70bwziH2rrc1iEE2VudPl6wC8VnfqI5VXe96qbveMPOHuymyoRChf34Y61G1O1yaUJP1M3XJ%2Fs9aUW3N2gbFTY%2F0UBSZSLPXBSLVPOBxh8IGFePjsDKytViI5mkYHtSTXFAeuDes3cbw0MttG4RwzY96CkjuCKkFuznMKX%2B5cUGOqUBYr2asHeXTFdJXtkxhC8SOJtvhQ6bcFQgedi2JVLdsKe1VOJ737Iw7aaaopSBU6dH8SMmz9Me5VvHPcEvu6a0ZtAUHxbx6QVzpuif2gLrVn5c5tmaRdBNY1GkjzYFW%2F0GSPy3tg1IiPU6DFMDRvhOnhO1W%2FXgZ1DGHy3YgUXND0C0pfafPBK1W4IzRuqgnHdRb9%2FaGHU2abxqLqDglT98hf18ty7F&X-Amz-SignedHeaders=host&x-id=GetObject&X-Amz-Signature=933ae59895f0f618f3a82a3bf0e33480bcf94e71eb37632cfad44654e95d3a4b"
        ]
    },
    "Headers": null
}
Language
Credentials
Header
Click Try It! to start a request and see the response here!