Prisma Cloud Compute
This section describes how to configure a tag for vulnerability management. A vulnerability can be found in a source or a binary package.
/api/vVERSION/tags/{id}/vuln
Sets a tag to a vulnerability based on Common Vulnerability and Exposures (CVE) ID, package, and resource.
POST
https://<Prisma_Cloud_Compute_URL>/api/vVERSION/tags/{id}/vuln
Path Parameters
Name | Type | Description |
---|---|---|
id* | String | Specifies the ID of the tag. |
Headers
Name | Type | Description |
---|---|---|
Content-Type | String | Specifies the header type.
|
Request Body
Name | Type | Description |
---|---|---|
id* | String | Specifies a Common Vulnerability and Exposures (CVE) ID. |
packageName* | String | Specifies a source or binary package name. Use a wildcard Tip: Specify the source package name for tagging when a vulnerability is in the source package. |
checkBaseLayer | Boolean | ( Available values:
|
resourceType | String | Specifies a resource type such as Use a wildcard |
resources | Array (String) | ( Either specify the resource names separated by a comma or use a wildcard |
comment | String | Describes the usability of a tag. |
Example and Scenarios
Use this section to understand various applicable scenarios to use the endpoint.
Consider the following cURL requests and scenarios:
A CVE CVE-2020-16156
is found in packages such as perl
, perl-open
, perl-macros
, and perl-libs
.
Refer to the following example cURL request to apply a tag Critical
to all packages and resources:
Refer to the following example cURL request to apply a tag Critical
to a resource type image
and to all packages and resources:
Refer to the following example cURL request to apply a tag Critical
to a resource type host
and a resource servo
and also to all packages:
Error Codes
Refer to the following error codes that you may encounter while using the cURL request:
Bad request: Invalid syntax. Modify your syntax and try again.
Last updated