Exports the check results on the Host, Cloud Platform Configuration Assessment, Image Security, Attack Awareness, and AK leak detection pages to Excel files.
Operation description
You can call the operation to export the following check result lists:
- The list of servers on the Host page.
- The lists of image system vulnerabilities, image application vulnerabilities, image baseline check results, and malicious image samples on the Image Security page.
- The list of attack analysis data on the Attack Awareness page.
- The list of check results for AccessKey pair leaks on the AK leak detection page.
Debugging
Authorization information
The following table shows the authorization information corresponding to the API. The authorization information can be used in the Action
policy element to grant a RAM user or RAM role the permissions to call this API operation. Description:
- Operation: the value that you can use in the Action element to specify the operation on a resource.
- Access level: the access level of each operation. The levels are read, write, and list.
- Resource type: the type of the resource on which you can authorize the RAM user or the RAM role to perform the operation. Take note of the following items:
- The required resource types are displayed in bold characters.
- If the permissions cannot be granted at the resource level,
All Resources
is used in the Resource type column of the operation.
- Condition Key: the condition key that is defined by the cloud service.
- Associated operation: other operations that the RAM user or the RAM role must have permissions to perform to complete the operation. To complete the operation, the RAM user or the RAM role must have the permissions to perform the associated operations.
Operation | Access level | Resource type | Condition key | Associated operation |
---|---|---|---|---|
yundun-sas:ExportRecord | none |
|
| none |
Request parameters
Parameter | Type | Required | Description | Example |
---|---|---|---|---|
Lang | string | No | The language of the content within the request and response. Default value: zh. Valid values:
| zh |
Params | string | No | The conditions that are used to filter check results. Note
This operation is a common export operation for multiple features of Security Center. The available configuration fields of this parameter vary based on the features. We recommend that you do not specify this parameter when you call the operation. You can export an information list without specifying this parameter, and then filter data in the exported Excel file.
| {"extend":"1","currentPage":1,"pageSize":10} |
ExportType | string | Yes | The type of the check result list that you want to export. Valid values:
| database |
ExportFileType | string | No | The type of the file to export. Valid values:
| virusScanExport |
Response parameters
Examples
Sample success responses
JSON
format
{
"RequestId": "6673D49C-A9AB-40DD-B4A2-B92306701AE7",
"FileName": "cms_20171101.xlsx",
"Id": 131231
}
Error codes
HTTP status code | Error code | Error message | Description |
---|---|---|---|
400 | IllegalParam | Illegal param | - |
400 | FreeVersionNotPermit | Free version is not permitted. | The free version cannot be used. |
403 | NoPermission | caller has no permission | You are not authorized to do this operation. |
500 | ServerError | ServerError | - |
For a list of error codes, visit the Service error codes.
Change history
Change time | Summary of changes | Operation |
---|---|---|
2024-06-13 | The Error code has changed | View Change Details |
2024-01-23 | The Error code has changed. The request parameters of the API has changed | View Change Details |
2022-08-01 | The Error code has changed | View Change Details |
2022-08-01 | The Error code has changed | View Change Details |