sysdig.SecureManagedPolicy
Explore with Pulumi AI
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as sysdig from "@pulumi/sysdig";
const emailNotificationChannel = sysdig.getSecureNotificationChannel({
    name: "Test Email Channel",
});
const sysdigRuntimeThreatDetection = new sysdig.SecureManagedPolicy("sysdigRuntimeThreatDetection", {
    type: "falco",
    enabled: true,
    runbook: "https://runbook.com",
    scope: "container.id != \"\"",
    disabledRules: ["Hexadecimal string detected"],
    actions: [{
        container: "stop",
        captures: [{
            secondsBeforeEvent: 5,
            secondsAfterEvent: 10,
        }],
    }],
    notificationChannels: [emailNotificationChannel.then(emailNotificationChannel => emailNotificationChannel.id)],
});
import pulumi
import pulumi_sysdig as sysdig
email_notification_channel = sysdig.get_secure_notification_channel(name="Test Email Channel")
sysdig_runtime_threat_detection = sysdig.SecureManagedPolicy("sysdigRuntimeThreatDetection",
    type="falco",
    enabled=True,
    runbook="https://runbook.com",
    scope="container.id != \"\"",
    disabled_rules=["Hexadecimal string detected"],
    actions=[{
        "container": "stop",
        "captures": [{
            "seconds_before_event": 5,
            "seconds_after_event": 10,
        }],
    }],
    notification_channels=[email_notification_channel.id])
package main
import (
	"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/sysdig"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		emailNotificationChannel, err := sysdig.GetSecureNotificationChannel(ctx, &sysdig.GetSecureNotificationChannelArgs{
			Name: "Test Email Channel",
		}, nil)
		if err != nil {
			return err
		}
		_, err = sysdig.NewSecureManagedPolicy(ctx, "sysdigRuntimeThreatDetection", &sysdig.SecureManagedPolicyArgs{
			Type:    pulumi.String("falco"),
			Enabled: pulumi.Bool(true),
			Runbook: pulumi.String("https://runbook.com"),
			Scope:   pulumi.String("container.id != \"\""),
			DisabledRules: pulumi.StringArray{
				pulumi.String("Hexadecimal string detected"),
			},
			Actions: sysdig.SecureManagedPolicyActionArray{
				&sysdig.SecureManagedPolicyActionArgs{
					Container: pulumi.String("stop"),
					Captures: sysdig.SecureManagedPolicyActionCaptureArray{
						&sysdig.SecureManagedPolicyActionCaptureArgs{
							SecondsBeforeEvent: pulumi.Float64(5),
							SecondsAfterEvent:  pulumi.Float64(10),
						},
					},
				},
			},
			NotificationChannels: pulumi.Float64Array{
				pulumi.String(emailNotificationChannel.Id),
			},
		})
		if err != nil {
			return err
		}
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Sysdig = Pulumi.Sysdig;
return await Deployment.RunAsync(() => 
{
    var emailNotificationChannel = Sysdig.GetSecureNotificationChannel.Invoke(new()
    {
        Name = "Test Email Channel",
    });
    var sysdigRuntimeThreatDetection = new Sysdig.SecureManagedPolicy("sysdigRuntimeThreatDetection", new()
    {
        Type = "falco",
        Enabled = true,
        Runbook = "https://runbook.com",
        Scope = "container.id != \"\"",
        DisabledRules = new[]
        {
            "Hexadecimal string detected",
        },
        Actions = new[]
        {
            new Sysdig.Inputs.SecureManagedPolicyActionArgs
            {
                Container = "stop",
                Captures = new[]
                {
                    new Sysdig.Inputs.SecureManagedPolicyActionCaptureArgs
                    {
                        SecondsBeforeEvent = 5,
                        SecondsAfterEvent = 10,
                    },
                },
            },
        },
        NotificationChannels = new[]
        {
            emailNotificationChannel.Apply(getSecureNotificationChannelResult => getSecureNotificationChannelResult.Id),
        },
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.sysdig.SysdigFunctions;
import com.pulumi.sysdig.inputs.GetSecureNotificationChannelArgs;
import com.pulumi.sysdig.SecureManagedPolicy;
import com.pulumi.sysdig.SecureManagedPolicyArgs;
import com.pulumi.sysdig.inputs.SecureManagedPolicyActionArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        final var emailNotificationChannel = SysdigFunctions.getSecureNotificationChannel(GetSecureNotificationChannelArgs.builder()
            .name("Test Email Channel")
            .build());
        var sysdigRuntimeThreatDetection = new SecureManagedPolicy("sysdigRuntimeThreatDetection", SecureManagedPolicyArgs.builder()
            .type("falco")
            .enabled(true)
            .runbook("https://runbook.com")
            .scope("container.id != \"\"")
            .disabledRules("Hexadecimal string detected")
            .actions(SecureManagedPolicyActionArgs.builder()
                .container("stop")
                .captures(SecureManagedPolicyActionCaptureArgs.builder()
                    .secondsBeforeEvent(5)
                    .secondsAfterEvent(10)
                    .build())
                .build())
            .notificationChannels(emailNotificationChannel.applyValue(getSecureNotificationChannelResult -> getSecureNotificationChannelResult.id()))
            .build());
    }
}
resources:
  sysdigRuntimeThreatDetection:
    type: sysdig:SecureManagedPolicy
    properties:
      type: falco
      enabled: true
      runbook: https://runbook.com
      # Scope selection
      scope: container.id != ""
      # Disabling rules
      disabledRules:
        - Hexadecimal string detected
      actions:
        - container: stop
          captures:
            - secondsBeforeEvent: 5
              secondsAfterEvent: 10
      notificationChannels:
        - ${emailNotificationChannel.id}
variables:
  emailNotificationChannel:
    fn::invoke:
      function: sysdig:getSecureNotificationChannel
      arguments:
        name: Test Email Channel
Create SecureManagedPolicy Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new SecureManagedPolicy(name: string, args?: SecureManagedPolicyArgs, opts?: CustomResourceOptions);@overload
def SecureManagedPolicy(resource_name: str,
                        args: Optional[SecureManagedPolicyArgs] = None,
                        opts: Optional[ResourceOptions] = None)
@overload
def SecureManagedPolicy(resource_name: str,
                        opts: Optional[ResourceOptions] = None,
                        actions: Optional[Sequence[SecureManagedPolicyActionArgs]] = None,
                        disabled_rules: Optional[Sequence[str]] = None,
                        enabled: Optional[bool] = None,
                        name: Optional[str] = None,
                        notification_channels: Optional[Sequence[float]] = None,
                        runbook: Optional[str] = None,
                        scope: Optional[str] = None,
                        secure_managed_policy_id: Optional[str] = None,
                        timeouts: Optional[SecureManagedPolicyTimeoutsArgs] = None,
                        type: Optional[str] = None)func NewSecureManagedPolicy(ctx *Context, name string, args *SecureManagedPolicyArgs, opts ...ResourceOption) (*SecureManagedPolicy, error)public SecureManagedPolicy(string name, SecureManagedPolicyArgs? args = null, CustomResourceOptions? opts = null)
public SecureManagedPolicy(String name, SecureManagedPolicyArgs args)
public SecureManagedPolicy(String name, SecureManagedPolicyArgs args, CustomResourceOptions options)
type: sysdig:SecureManagedPolicy
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
 - The unique name of the resource.
 - args SecureManagedPolicyArgs
 - The arguments to resource properties.
 - opts CustomResourceOptions
 - Bag of options to control resource's behavior.
 
- resource_name str
 - The unique name of the resource.
 - args SecureManagedPolicyArgs
 - The arguments to resource properties.
 - opts ResourceOptions
 - Bag of options to control resource's behavior.
 
- ctx Context
 - Context object for the current deployment.
 - name string
 - The unique name of the resource.
 - args SecureManagedPolicyArgs
 - The arguments to resource properties.
 - opts ResourceOption
 - Bag of options to control resource's behavior.
 
- name string
 - The unique name of the resource.
 - args SecureManagedPolicyArgs
 - The arguments to resource properties.
 - opts CustomResourceOptions
 - Bag of options to control resource's behavior.
 
- name String
 - The unique name of the resource.
 - args SecureManagedPolicyArgs
 - The arguments to resource properties.
 - options CustomResourceOptions
 - Bag of options to control resource's behavior.
 
Constructor example
The following reference example uses placeholder values for all input properties.
var secureManagedPolicyResource = new Sysdig.SecureManagedPolicy("secureManagedPolicyResource", new()
{
    Actions = new[]
    {
        new Sysdig.Inputs.SecureManagedPolicyActionArgs
        {
            Captures = new[]
            {
                new Sysdig.Inputs.SecureManagedPolicyActionCaptureArgs
                {
                    Name = "string",
                    SecondsAfterEvent = 0,
                    SecondsBeforeEvent = 0,
                    BucketName = "string",
                    Filter = "string",
                    Folder = "string",
                },
            },
            Container = "string",
            KillProcess = false,
        },
    },
    DisabledRules = new[]
    {
        "string",
    },
    Enabled = false,
    Name = "string",
    NotificationChannels = new[]
    {
        0,
    },
    Runbook = "string",
    Scope = "string",
    SecureManagedPolicyId = "string",
    Timeouts = new Sysdig.Inputs.SecureManagedPolicyTimeoutsArgs
    {
        Create = "string",
        Delete = "string",
        Read = "string",
        Update = "string",
    },
    Type = "string",
});
example, err := sysdig.NewSecureManagedPolicy(ctx, "secureManagedPolicyResource", &sysdig.SecureManagedPolicyArgs{
Actions: .SecureManagedPolicyActionArray{
&.SecureManagedPolicyActionArgs{
Captures: .SecureManagedPolicyActionCaptureArray{
&.SecureManagedPolicyActionCaptureArgs{
Name: pulumi.String("string"),
SecondsAfterEvent: pulumi.Float64(0),
SecondsBeforeEvent: pulumi.Float64(0),
BucketName: pulumi.String("string"),
Filter: pulumi.String("string"),
Folder: pulumi.String("string"),
},
},
Container: pulumi.String("string"),
KillProcess: pulumi.Bool(false),
},
},
DisabledRules: pulumi.StringArray{
pulumi.String("string"),
},
Enabled: pulumi.Bool(false),
Name: pulumi.String("string"),
NotificationChannels: pulumi.Float64Array{
pulumi.Float64(0),
},
Runbook: pulumi.String("string"),
Scope: pulumi.String("string"),
SecureManagedPolicyId: pulumi.String("string"),
Timeouts: &.SecureManagedPolicyTimeoutsArgs{
Create: pulumi.String("string"),
Delete: pulumi.String("string"),
Read: pulumi.String("string"),
Update: pulumi.String("string"),
},
Type: pulumi.String("string"),
})
var secureManagedPolicyResource = new SecureManagedPolicy("secureManagedPolicyResource", SecureManagedPolicyArgs.builder()
    .actions(SecureManagedPolicyActionArgs.builder()
        .captures(SecureManagedPolicyActionCaptureArgs.builder()
            .name("string")
            .secondsAfterEvent(0)
            .secondsBeforeEvent(0)
            .bucketName("string")
            .filter("string")
            .folder("string")
            .build())
        .container("string")
        .killProcess(false)
        .build())
    .disabledRules("string")
    .enabled(false)
    .name("string")
    .notificationChannels(0)
    .runbook("string")
    .scope("string")
    .secureManagedPolicyId("string")
    .timeouts(SecureManagedPolicyTimeoutsArgs.builder()
        .create("string")
        .delete("string")
        .read("string")
        .update("string")
        .build())
    .type("string")
    .build());
secure_managed_policy_resource = sysdig.SecureManagedPolicy("secureManagedPolicyResource",
    actions=[{
        "captures": [{
            "name": "string",
            "seconds_after_event": 0,
            "seconds_before_event": 0,
            "bucket_name": "string",
            "filter": "string",
            "folder": "string",
        }],
        "container": "string",
        "kill_process": False,
    }],
    disabled_rules=["string"],
    enabled=False,
    name="string",
    notification_channels=[0],
    runbook="string",
    scope="string",
    secure_managed_policy_id="string",
    timeouts={
        "create": "string",
        "delete": "string",
        "read": "string",
        "update": "string",
    },
    type="string")
const secureManagedPolicyResource = new sysdig.SecureManagedPolicy("secureManagedPolicyResource", {
    actions: [{
        captures: [{
            name: "string",
            secondsAfterEvent: 0,
            secondsBeforeEvent: 0,
            bucketName: "string",
            filter: "string",
            folder: "string",
        }],
        container: "string",
        killProcess: false,
    }],
    disabledRules: ["string"],
    enabled: false,
    name: "string",
    notificationChannels: [0],
    runbook: "string",
    scope: "string",
    secureManagedPolicyId: "string",
    timeouts: {
        create: "string",
        "delete": "string",
        read: "string",
        update: "string",
    },
    type: "string",
});
type: sysdig:SecureManagedPolicy
properties:
    actions:
        - captures:
            - bucketName: string
              filter: string
              folder: string
              name: string
              secondsAfterEvent: 0
              secondsBeforeEvent: 0
          container: string
          killProcess: false
    disabledRules:
        - string
    enabled: false
    name: string
    notificationChannels:
        - 0
    runbook: string
    scope: string
    secureManagedPolicyId: string
    timeouts:
        create: string
        delete: string
        read: string
        update: string
    type: string
SecureManagedPolicy Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The SecureManagedPolicy resource accepts the following input properties:
- Actions
List<Secure
Managed Policy Action>  - Disabled
Rules List<string> - Enabled bool
 - Will secure process with this policy?. By default this is true.
 - Name string
 - The name of the Secure managed policy. It must match the name of an existing managed policy.
 - Notification
Channels List<double> - Runbook string
 - Customer provided url that provides a runbook for a given policy.
 - Scope string
 - Secure
Managed stringPolicy Id  - Timeouts
Secure
Managed Policy Timeouts  - Type string
 - Specifies the type of the runtime policy. Must be one of: 
falco,list_matching,k8s_audit,aws_cloudtrail,gcp_auditlog,azure_platformlogs,awscloudtrail,okta,github,guardduty. By default it isfalco. 
- Actions
[]Secure
Managed Policy Action Args  - Disabled
Rules []string - Enabled bool
 - Will secure process with this policy?. By default this is true.
 - Name string
 - The name of the Secure managed policy. It must match the name of an existing managed policy.
 - Notification
Channels []float64 - Runbook string
 - Customer provided url that provides a runbook for a given policy.
 - Scope string
 - Secure
Managed stringPolicy Id  - Timeouts
Secure
Managed Policy Timeouts Args  - Type string
 - Specifies the type of the runtime policy. Must be one of: 
falco,list_matching,k8s_audit,aws_cloudtrail,gcp_auditlog,azure_platformlogs,awscloudtrail,okta,github,guardduty. By default it isfalco. 
- actions
List<Secure
Managed Policy Action>  - disabled
Rules List<String> - enabled Boolean
 - Will secure process with this policy?. By default this is true.
 - name String
 - The name of the Secure managed policy. It must match the name of an existing managed policy.
 - notification
Channels List<Double> - runbook String
 - Customer provided url that provides a runbook for a given policy.
 - scope String
 - secure
Managed StringPolicy Id  - timeouts
Secure
Managed Policy Timeouts  - type String
 - Specifies the type of the runtime policy. Must be one of: 
falco,list_matching,k8s_audit,aws_cloudtrail,gcp_auditlog,azure_platformlogs,awscloudtrail,okta,github,guardduty. By default it isfalco. 
- actions
Secure
Managed Policy Action[]  - disabled
Rules string[] - enabled boolean
 - Will secure process with this policy?. By default this is true.
 - name string
 - The name of the Secure managed policy. It must match the name of an existing managed policy.
 - notification
Channels number[] - runbook string
 - Customer provided url that provides a runbook for a given policy.
 - scope string
 - secure
Managed stringPolicy Id  - timeouts
Secure
Managed Policy Timeouts  - type string
 - Specifies the type of the runtime policy. Must be one of: 
falco,list_matching,k8s_audit,aws_cloudtrail,gcp_auditlog,azure_platformlogs,awscloudtrail,okta,github,guardduty. By default it isfalco. 
- actions
Sequence[Secure
Managed Policy Action Args]  - disabled_
rules Sequence[str] - enabled bool
 - Will secure process with this policy?. By default this is true.
 - name str
 - The name of the Secure managed policy. It must match the name of an existing managed policy.
 - notification_
channels Sequence[float] - runbook str
 - Customer provided url that provides a runbook for a given policy.
 - scope str
 - secure_
managed_ strpolicy_ id  - timeouts
Secure
Managed Policy Timeouts Args  - type str
 - Specifies the type of the runtime policy. Must be one of: 
falco,list_matching,k8s_audit,aws_cloudtrail,gcp_auditlog,azure_platformlogs,awscloudtrail,okta,github,guardduty. By default it isfalco. 
- actions List<Property Map>
 - disabled
Rules List<String> - enabled Boolean
 - Will secure process with this policy?. By default this is true.
 - name String
 - The name of the Secure managed policy. It must match the name of an existing managed policy.
 - notification
Channels List<Number> - runbook String
 - Customer provided url that provides a runbook for a given policy.
 - scope String
 - secure
Managed StringPolicy Id  - timeouts Property Map
 - type String
 - Specifies the type of the runtime policy. Must be one of: 
falco,list_matching,k8s_audit,aws_cloudtrail,gcp_auditlog,azure_platformlogs,awscloudtrail,okta,github,guardduty. By default it isfalco. 
Outputs
All input properties are implicitly available as output properties. Additionally, the SecureManagedPolicy resource produces the following output properties:
Look up Existing SecureManagedPolicy Resource
Get an existing SecureManagedPolicy resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: SecureManagedPolicyState, opts?: CustomResourceOptions): SecureManagedPolicy@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        actions: Optional[Sequence[SecureManagedPolicyActionArgs]] = None,
        disabled_rules: Optional[Sequence[str]] = None,
        enabled: Optional[bool] = None,
        name: Optional[str] = None,
        notification_channels: Optional[Sequence[float]] = None,
        runbook: Optional[str] = None,
        scope: Optional[str] = None,
        secure_managed_policy_id: Optional[str] = None,
        timeouts: Optional[SecureManagedPolicyTimeoutsArgs] = None,
        type: Optional[str] = None,
        version: Optional[float] = None) -> SecureManagedPolicyfunc GetSecureManagedPolicy(ctx *Context, name string, id IDInput, state *SecureManagedPolicyState, opts ...ResourceOption) (*SecureManagedPolicy, error)public static SecureManagedPolicy Get(string name, Input<string> id, SecureManagedPolicyState? state, CustomResourceOptions? opts = null)public static SecureManagedPolicy get(String name, Output<String> id, SecureManagedPolicyState state, CustomResourceOptions options)resources:  _:    type: sysdig:SecureManagedPolicy    get:      id: ${id}- name
 - The unique name of the resulting resource.
 - id
 - The unique provider ID of the resource to lookup.
 - state
 - Any extra arguments used during the lookup.
 - opts
 - A bag of options that control this resource's behavior.
 
- resource_name
 - The unique name of the resulting resource.
 - id
 - The unique provider ID of the resource to lookup.
 
- name
 - The unique name of the resulting resource.
 - id
 - The unique provider ID of the resource to lookup.
 - state
 - Any extra arguments used during the lookup.
 - opts
 - A bag of options that control this resource's behavior.
 
- name
 - The unique name of the resulting resource.
 - id
 - The unique provider ID of the resource to lookup.
 - state
 - Any extra arguments used during the lookup.
 - opts
 - A bag of options that control this resource's behavior.
 
- name
 - The unique name of the resulting resource.
 - id
 - The unique provider ID of the resource to lookup.
 - state
 - Any extra arguments used during the lookup.
 - opts
 - A bag of options that control this resource's behavior.
 
- Actions
List<Secure
Managed Policy Action>  - Disabled
Rules List<string> - Enabled bool
 - Will secure process with this policy?. By default this is true.
 - Name string
 - The name of the Secure managed policy. It must match the name of an existing managed policy.
 - Notification
Channels List<double> - Runbook string
 - Customer provided url that provides a runbook for a given policy.
 - Scope string
 - Secure
Managed stringPolicy Id  - Timeouts
Secure
Managed Policy Timeouts  - Type string
 - Specifies the type of the runtime policy. Must be one of: 
falco,list_matching,k8s_audit,aws_cloudtrail,gcp_auditlog,azure_platformlogs,awscloudtrail,okta,github,guardduty. By default it isfalco. - Version double
 
- Actions
[]Secure
Managed Policy Action Args  - Disabled
Rules []string - Enabled bool
 - Will secure process with this policy?. By default this is true.
 - Name string
 - The name of the Secure managed policy. It must match the name of an existing managed policy.
 - Notification
Channels []float64 - Runbook string
 - Customer provided url that provides a runbook for a given policy.
 - Scope string
 - Secure
Managed stringPolicy Id  - Timeouts
Secure
Managed Policy Timeouts Args  - Type string
 - Specifies the type of the runtime policy. Must be one of: 
falco,list_matching,k8s_audit,aws_cloudtrail,gcp_auditlog,azure_platformlogs,awscloudtrail,okta,github,guardduty. By default it isfalco. - Version float64
 
- actions
List<Secure
Managed Policy Action>  - disabled
Rules List<String> - enabled Boolean
 - Will secure process with this policy?. By default this is true.
 - name String
 - The name of the Secure managed policy. It must match the name of an existing managed policy.
 - notification
Channels List<Double> - runbook String
 - Customer provided url that provides a runbook for a given policy.
 - scope String
 - secure
Managed StringPolicy Id  - timeouts
Secure
Managed Policy Timeouts  - type String
 - Specifies the type of the runtime policy. Must be one of: 
falco,list_matching,k8s_audit,aws_cloudtrail,gcp_auditlog,azure_platformlogs,awscloudtrail,okta,github,guardduty. By default it isfalco. - version Double
 
- actions
Secure
Managed Policy Action[]  - disabled
Rules string[] - enabled boolean
 - Will secure process with this policy?. By default this is true.
 - name string
 - The name of the Secure managed policy. It must match the name of an existing managed policy.
 - notification
Channels number[] - runbook string
 - Customer provided url that provides a runbook for a given policy.
 - scope string
 - secure
Managed stringPolicy Id  - timeouts
Secure
Managed Policy Timeouts  - type string
 - Specifies the type of the runtime policy. Must be one of: 
falco,list_matching,k8s_audit,aws_cloudtrail,gcp_auditlog,azure_platformlogs,awscloudtrail,okta,github,guardduty. By default it isfalco. - version number
 
- actions
Sequence[Secure
Managed Policy Action Args]  - disabled_
rules Sequence[str] - enabled bool
 - Will secure process with this policy?. By default this is true.
 - name str
 - The name of the Secure managed policy. It must match the name of an existing managed policy.
 - notification_
channels Sequence[float] - runbook str
 - Customer provided url that provides a runbook for a given policy.
 - scope str
 - secure_
managed_ strpolicy_ id  - timeouts
Secure
Managed Policy Timeouts Args  - type str
 - Specifies the type of the runtime policy. Must be one of: 
falco,list_matching,k8s_audit,aws_cloudtrail,gcp_auditlog,azure_platformlogs,awscloudtrail,okta,github,guardduty. By default it isfalco. - version float
 
- actions List<Property Map>
 - disabled
Rules List<String> - enabled Boolean
 - Will secure process with this policy?. By default this is true.
 - name String
 - The name of the Secure managed policy. It must match the name of an existing managed policy.
 - notification
Channels List<Number> - runbook String
 - Customer provided url that provides a runbook for a given policy.
 - scope String
 - secure
Managed StringPolicy Id  - timeouts Property Map
 - type String
 - Specifies the type of the runtime policy. Must be one of: 
falco,list_matching,k8s_audit,aws_cloudtrail,gcp_auditlog,azure_platformlogs,awscloudtrail,okta,github,guardduty. By default it isfalco. - version Number
 
Supporting Types
SecureManagedPolicyAction, SecureManagedPolicyActionArgs        
- Captures
List<Secure
Managed Policy Action Capture>  - Captures with Sysdig the stream of system calls:
 - Container string
 - The action applied to container when this Policy is triggered. Can be stop, pause or kill. If this is not specified, no action will be applied at the container level.
 - Kill
Process bool 
- Captures
[]Secure
Managed Policy Action Capture  - Captures with Sysdig the stream of system calls:
 - Container string
 - The action applied to container when this Policy is triggered. Can be stop, pause or kill. If this is not specified, no action will be applied at the container level.
 - Kill
Process bool 
- captures
List<Secure
Managed Policy Action Capture>  - Captures with Sysdig the stream of system calls:
 - container String
 - The action applied to container when this Policy is triggered. Can be stop, pause or kill. If this is not specified, no action will be applied at the container level.
 - kill
Process Boolean 
- captures
Secure
Managed Policy Action Capture[]  - Captures with Sysdig the stream of system calls:
 - container string
 - The action applied to container when this Policy is triggered. Can be stop, pause or kill. If this is not specified, no action will be applied at the container level.
 - kill
Process boolean 
- captures
Sequence[Secure
Managed Policy Action Capture]  - Captures with Sysdig the stream of system calls:
 - container str
 - The action applied to container when this Policy is triggered. Can be stop, pause or kill. If this is not specified, no action will be applied at the container level.
 - kill_
process bool 
- captures List<Property Map>
 - Captures with Sysdig the stream of system calls:
 - container String
 - The action applied to container when this Policy is triggered. Can be stop, pause or kill. If this is not specified, no action will be applied at the container level.
 - kill
Process Boolean 
SecureManagedPolicyActionCapture, SecureManagedPolicyActionCaptureArgs          
- Name string
 - The name of the Secure managed policy. It must match the name of an existing managed policy.
 - Seconds
After doubleEvent  - Captures the system calls for the amount of seconds after the policy was triggered.
 - Seconds
Before doubleEvent  - Captures the system calls during the amount of seconds before the policy was triggered.
 - Bucket
Name string - Custom bucket to store capture in, bucket should be onboarded in Integrations > S3 Capture Storage. Default is to use Sysdig Secure Storage
 - Filter string
 - Additional filter to apply to the capture. For example: 
proc.name=cat - Folder string
 - Name of folder to store capture inside the bucket.
By default we will store the capture file at the root of the bucket
 
- Name string
 - The name of the Secure managed policy. It must match the name of an existing managed policy.
 - Seconds
After float64Event  - Captures the system calls for the amount of seconds after the policy was triggered.
 - Seconds
Before float64Event  - Captures the system calls during the amount of seconds before the policy was triggered.
 - Bucket
Name string - Custom bucket to store capture in, bucket should be onboarded in Integrations > S3 Capture Storage. Default is to use Sysdig Secure Storage
 - Filter string
 - Additional filter to apply to the capture. For example: 
proc.name=cat - Folder string
 - Name of folder to store capture inside the bucket.
By default we will store the capture file at the root of the bucket
 
- name String
 - The name of the Secure managed policy. It must match the name of an existing managed policy.
 - seconds
After DoubleEvent  - Captures the system calls for the amount of seconds after the policy was triggered.
 - seconds
Before DoubleEvent  - Captures the system calls during the amount of seconds before the policy was triggered.
 - bucket
Name String - Custom bucket to store capture in, bucket should be onboarded in Integrations > S3 Capture Storage. Default is to use Sysdig Secure Storage
 - filter String
 - Additional filter to apply to the capture. For example: 
proc.name=cat - folder String
 - Name of folder to store capture inside the bucket.
By default we will store the capture file at the root of the bucket
 
- name string
 - The name of the Secure managed policy. It must match the name of an existing managed policy.
 - seconds
After numberEvent  - Captures the system calls for the amount of seconds after the policy was triggered.
 - seconds
Before numberEvent  - Captures the system calls during the amount of seconds before the policy was triggered.
 - bucket
Name string - Custom bucket to store capture in, bucket should be onboarded in Integrations > S3 Capture Storage. Default is to use Sysdig Secure Storage
 - filter string
 - Additional filter to apply to the capture. For example: 
proc.name=cat - folder string
 - Name of folder to store capture inside the bucket.
By default we will store the capture file at the root of the bucket
 
- name str
 - The name of the Secure managed policy. It must match the name of an existing managed policy.
 - seconds_
after_ floatevent  - Captures the system calls for the amount of seconds after the policy was triggered.
 - seconds_
before_ floatevent  - Captures the system calls during the amount of seconds before the policy was triggered.
 - bucket_
name str - Custom bucket to store capture in, bucket should be onboarded in Integrations > S3 Capture Storage. Default is to use Sysdig Secure Storage
 - filter str
 - Additional filter to apply to the capture. For example: 
proc.name=cat - folder str
 - Name of folder to store capture inside the bucket.
By default we will store the capture file at the root of the bucket
 
- name String
 - The name of the Secure managed policy. It must match the name of an existing managed policy.
 - seconds
After NumberEvent  - Captures the system calls for the amount of seconds after the policy was triggered.
 - seconds
Before NumberEvent  - Captures the system calls during the amount of seconds before the policy was triggered.
 - bucket
Name String - Custom bucket to store capture in, bucket should be onboarded in Integrations > S3 Capture Storage. Default is to use Sysdig Secure Storage
 - filter String
 - Additional filter to apply to the capture. For example: 
proc.name=cat - folder String
 - Name of folder to store capture inside the bucket.
By default we will store the capture file at the root of the bucket
 
SecureManagedPolicyTimeouts, SecureManagedPolicyTimeoutsArgs        
Package Details
- Repository
 - sysdig sysdiglabs/terraform-provider-sysdig
 - License
 - Notes
 - This Pulumi package is based on the 
sysdigTerraform Provider.