Download Serverless Function Scan Results
GET/api/v30.00/serverless/download
x-prisma-cloud-target-env: {"permission":"monitorServerless","saas":true,"self-hosted":true}
x-public: true
Downloads all serverless scan reports in CSV format.
This endpoint maps to the CSV hyperlink in Monitor > Vulnerabilities > Functions > Scanned functions in the Console UI.
cURL Request
The following cURL command retrieves a list of all serverless resources monitored by Prisma Cloud Compute and saves the results in a CSV file called serverless.csv
:
$ curl -k \
-u <USER> \
-X GET \
'https://<CONSOLE>/api/v<VERSION>/serverless/download' \
> serverless.csv
A successful response displays the status of the download.
Request
Query Parameters
Offsets the result to a specific report count. Offset starts from 0.
Number of reports to retrieve in a page. For PCCE, the maximum limit is 250. For PCEE, the maximum limit is 50. The default value is 50.
Retrieves the result for a search term.
Sorts the result using a key. Refer to the columns in the relevant Prisma Cloud Compute user interface to use them as sort keys.
Sorts the result in reverse order.
Filters the result based on collection names that you have defined in Prisma Cloud Compute.
Scopes the query by cloud provider.
Filters the result based on cloud account IDs.
Scopes the query by resource ID.
Scopes the query by cloud region.
Retrieves the fields that you need in a report. Use the list of fields you want to retrieve. By default, the result shows all fields of data.
Retrieves a list of cloud function IDs.
Retrieves a list of cloud controller addresses that contains the cloud functions.
Filters the result based on cloud runtimes.
Filters the result based on cloud function's versions.
Filters the result based on AWS Lambda Layers.
Filters result based on cloud functions that are connected and protected by a Defender.
Filters result based on compliance IDs.
Filters result based on platforms (OS and architecture) such as Windows, Linux ARM x64, Linux x86, and so on.
Retrieves the result in the normalized form of low, medium, high, and critical based on vulnerability's severity level. Default is false.
Responses
- 200
- default
OK