sysdig.SecureCustomPolicy
Explore with Pulumi AI
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as sysdig from "@pulumi/sysdig";
const emailNotificationChannel = sysdig.getSecureNotificationChannel({
    name: "Test Email Channel",
});
const writeAptDatabase = new sysdig.SecureCustomPolicy("writeAptDatabase", {
    description: "an attempt to write to the dpkg database by any non-dpkg related program",
    severity: 4,
    enabled: true,
    runbook: "https://runbook.com",
    scope: "container.id != \"\"",
    rules: [{
        name: "Terminal shell in container",
        enabled: true,
    }],
    actions: [{
        container: "stop",
        captures: [{
            secondsBeforeEvent: 5,
            secondsAfterEvent: 10,
        }],
    }],
    notificationChannels: [emailNotificationChannel.then(emailNotificationChannel => emailNotificationChannel.id)],
});
import pulumi
import pulumi_sysdig as sysdig
email_notification_channel = sysdig.get_secure_notification_channel(name="Test Email Channel")
write_apt_database = sysdig.SecureCustomPolicy("writeAptDatabase",
    description="an attempt to write to the dpkg database by any non-dpkg related program",
    severity=4,
    enabled=True,
    runbook="https://runbook.com",
    scope="container.id != \"\"",
    rules=[{
        "name": "Terminal shell in container",
        "enabled": True,
    }],
    actions=[{
        "container": "stop",
        "captures": [{
            "seconds_before_event": 5,
            "seconds_after_event": 10,
        }],
    }],
    notification_channels=[email_notification_channel.id])
package main
import (
	"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/sysdig"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		emailNotificationChannel, err := sysdig.GetSecureNotificationChannel(ctx, &sysdig.GetSecureNotificationChannelArgs{
			Name: "Test Email Channel",
		}, nil)
		if err != nil {
			return err
		}
		_, err = sysdig.NewSecureCustomPolicy(ctx, "writeAptDatabase", &sysdig.SecureCustomPolicyArgs{
			Description: pulumi.String("an attempt to write to the dpkg database by any non-dpkg related program"),
			Severity:    pulumi.Float64(4),
			Enabled:     pulumi.Bool(true),
			Runbook:     pulumi.String("https://runbook.com"),
			Scope:       pulumi.String("container.id != \"\""),
			Rules: sysdig.SecureCustomPolicyRuleArray{
				&sysdig.SecureCustomPolicyRuleArgs{
					Name:    pulumi.String("Terminal shell in container"),
					Enabled: pulumi.Bool(true),
				},
			},
			Actions: sysdig.SecureCustomPolicyActionArray{
				&sysdig.SecureCustomPolicyActionArgs{
					Container: pulumi.String("stop"),
					Captures: sysdig.SecureCustomPolicyActionCaptureArray{
						&sysdig.SecureCustomPolicyActionCaptureArgs{
							SecondsBeforeEvent: pulumi.Float64(5),
							SecondsAfterEvent:  pulumi.Float64(10),
						},
					},
				},
			},
			NotificationChannels: pulumi.Float64Array{
				pulumi.String(emailNotificationChannel.Id),
			},
		})
		if err != nil {
			return err
		}
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Sysdig = Pulumi.Sysdig;
return await Deployment.RunAsync(() => 
{
    var emailNotificationChannel = Sysdig.GetSecureNotificationChannel.Invoke(new()
    {
        Name = "Test Email Channel",
    });
    var writeAptDatabase = new Sysdig.SecureCustomPolicy("writeAptDatabase", new()
    {
        Description = "an attempt to write to the dpkg database by any non-dpkg related program",
        Severity = 4,
        Enabled = true,
        Runbook = "https://runbook.com",
        Scope = "container.id != \"\"",
        Rules = new[]
        {
            new Sysdig.Inputs.SecureCustomPolicyRuleArgs
            {
                Name = "Terminal shell in container",
                Enabled = true,
            },
        },
        Actions = new[]
        {
            new Sysdig.Inputs.SecureCustomPolicyActionArgs
            {
                Container = "stop",
                Captures = new[]
                {
                    new Sysdig.Inputs.SecureCustomPolicyActionCaptureArgs
                    {
                        SecondsBeforeEvent = 5,
                        SecondsAfterEvent = 10,
                    },
                },
            },
        },
        NotificationChannels = new[]
        {
            emailNotificationChannel.Apply(getSecureNotificationChannelResult => getSecureNotificationChannelResult.Id),
        },
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.sysdig.SysdigFunctions;
import com.pulumi.sysdig.inputs.GetSecureNotificationChannelArgs;
import com.pulumi.sysdig.SecureCustomPolicy;
import com.pulumi.sysdig.SecureCustomPolicyArgs;
import com.pulumi.sysdig.inputs.SecureCustomPolicyRuleArgs;
import com.pulumi.sysdig.inputs.SecureCustomPolicyActionArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        final var emailNotificationChannel = SysdigFunctions.getSecureNotificationChannel(GetSecureNotificationChannelArgs.builder()
            .name("Test Email Channel")
            .build());
        var writeAptDatabase = new SecureCustomPolicy("writeAptDatabase", SecureCustomPolicyArgs.builder()
            .description("an attempt to write to the dpkg database by any non-dpkg related program")
            .severity(4)
            .enabled(true)
            .runbook("https://runbook.com")
            .scope("container.id != \"\"")
            .rules(SecureCustomPolicyRuleArgs.builder()
                .name("Terminal shell in container")
                .enabled(true)
                .build())
            .actions(SecureCustomPolicyActionArgs.builder()
                .container("stop")
                .captures(SecureCustomPolicyActionCaptureArgs.builder()
                    .secondsBeforeEvent(5)
                    .secondsAfterEvent(10)
                    .build())
                .build())
            .notificationChannels(emailNotificationChannel.applyValue(getSecureNotificationChannelResult -> getSecureNotificationChannelResult.id()))
            .build());
    }
}
resources:
  writeAptDatabase:
    type: sysdig:SecureCustomPolicy
    properties:
      description: an attempt to write to the dpkg database by any non-dpkg related program
      severity: 4
      enabled: true
      runbook: https://runbook.com
      # Scope selection
      scope: container.id != "" # Rule selection
      rules:
        - name: Terminal shell in container
          enabled: true
      actions:
        - container: stop
          captures:
            - secondsBeforeEvent: 5
              secondsAfterEvent: 10
      notificationChannels:
        - ${emailNotificationChannel.id}
variables:
  emailNotificationChannel:
    fn::invoke:
      function: sysdig:getSecureNotificationChannel
      arguments:
        name: Test Email Channel
Create SecureCustomPolicy Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new SecureCustomPolicy(name: string, args: SecureCustomPolicyArgs, opts?: CustomResourceOptions);@overload
def SecureCustomPolicy(resource_name: str,
                       args: SecureCustomPolicyArgs,
                       opts: Optional[ResourceOptions] = None)
@overload
def SecureCustomPolicy(resource_name: str,
                       opts: Optional[ResourceOptions] = None,
                       description: Optional[str] = None,
                       actions: Optional[Sequence[SecureCustomPolicyActionArgs]] = None,
                       enabled: Optional[bool] = None,
                       name: Optional[str] = None,
                       notification_channels: Optional[Sequence[float]] = None,
                       rules: Optional[Sequence[SecureCustomPolicyRuleArgs]] = None,
                       runbook: Optional[str] = None,
                       scope: Optional[str] = None,
                       secure_custom_policy_id: Optional[str] = None,
                       severity: Optional[float] = None,
                       timeouts: Optional[SecureCustomPolicyTimeoutsArgs] = None,
                       type: Optional[str] = None)func NewSecureCustomPolicy(ctx *Context, name string, args SecureCustomPolicyArgs, opts ...ResourceOption) (*SecureCustomPolicy, error)public SecureCustomPolicy(string name, SecureCustomPolicyArgs args, CustomResourceOptions? opts = null)
public SecureCustomPolicy(String name, SecureCustomPolicyArgs args)
public SecureCustomPolicy(String name, SecureCustomPolicyArgs args, CustomResourceOptions options)
type: sysdig:SecureCustomPolicy
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args SecureCustomPolicyArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args SecureCustomPolicyArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args SecureCustomPolicyArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args SecureCustomPolicyArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args SecureCustomPolicyArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var secureCustomPolicyResource = new Sysdig.SecureCustomPolicy("secureCustomPolicyResource", new()
{
    Description = "string",
    Actions = new[]
    {
        new Sysdig.Inputs.SecureCustomPolicyActionArgs
        {
            Captures = new[]
            {
                new Sysdig.Inputs.SecureCustomPolicyActionCaptureArgs
                {
                    Name = "string",
                    SecondsAfterEvent = 0,
                    SecondsBeforeEvent = 0,
                    BucketName = "string",
                    Filter = "string",
                    Folder = "string",
                },
            },
            Container = "string",
            KillProcess = false,
        },
    },
    Enabled = false,
    Name = "string",
    NotificationChannels = new[]
    {
        0,
    },
    Rules = new[]
    {
        new Sysdig.Inputs.SecureCustomPolicyRuleArgs
        {
            Name = "string",
            Enabled = false,
        },
    },
    Runbook = "string",
    Scope = "string",
    SecureCustomPolicyId = "string",
    Severity = 0,
    Timeouts = new Sysdig.Inputs.SecureCustomPolicyTimeoutsArgs
    {
        Create = "string",
        Delete = "string",
        Read = "string",
        Update = "string",
    },
    Type = "string",
});
example, err := sysdig.NewSecureCustomPolicy(ctx, "secureCustomPolicyResource", &sysdig.SecureCustomPolicyArgs{
	Description: pulumi.String("string"),
	Actions: sysdig.SecureCustomPolicyActionArray{
		&sysdig.SecureCustomPolicyActionArgs{
			Captures: sysdig.SecureCustomPolicyActionCaptureArray{
				&sysdig.SecureCustomPolicyActionCaptureArgs{
					Name:               pulumi.String("string"),
					SecondsAfterEvent:  pulumi.Float64(0),
					SecondsBeforeEvent: pulumi.Float64(0),
					BucketName:         pulumi.String("string"),
					Filter:             pulumi.String("string"),
					Folder:             pulumi.String("string"),
				},
			},
			Container:   pulumi.String("string"),
			KillProcess: pulumi.Bool(false),
		},
	},
	Enabled: pulumi.Bool(false),
	Name:    pulumi.String("string"),
	NotificationChannels: pulumi.Float64Array{
		pulumi.Float64(0),
	},
	Rules: sysdig.SecureCustomPolicyRuleArray{
		&sysdig.SecureCustomPolicyRuleArgs{
			Name:    pulumi.String("string"),
			Enabled: pulumi.Bool(false),
		},
	},
	Runbook:              pulumi.String("string"),
	Scope:                pulumi.String("string"),
	SecureCustomPolicyId: pulumi.String("string"),
	Severity:             pulumi.Float64(0),
	Timeouts: &sysdig.SecureCustomPolicyTimeoutsArgs{
		Create: pulumi.String("string"),
		Delete: pulumi.String("string"),
		Read:   pulumi.String("string"),
		Update: pulumi.String("string"),
	},
	Type: pulumi.String("string"),
})
var secureCustomPolicyResource = new SecureCustomPolicy("secureCustomPolicyResource", SecureCustomPolicyArgs.builder()
    .description("string")
    .actions(SecureCustomPolicyActionArgs.builder()
        .captures(SecureCustomPolicyActionCaptureArgs.builder()
            .name("string")
            .secondsAfterEvent(0.0)
            .secondsBeforeEvent(0.0)
            .bucketName("string")
            .filter("string")
            .folder("string")
            .build())
        .container("string")
        .killProcess(false)
        .build())
    .enabled(false)
    .name("string")
    .notificationChannels(0.0)
    .rules(SecureCustomPolicyRuleArgs.builder()
        .name("string")
        .enabled(false)
        .build())
    .runbook("string")
    .scope("string")
    .secureCustomPolicyId("string")
    .severity(0.0)
    .timeouts(SecureCustomPolicyTimeoutsArgs.builder()
        .create("string")
        .delete("string")
        .read("string")
        .update("string")
        .build())
    .type("string")
    .build());
secure_custom_policy_resource = sysdig.SecureCustomPolicy("secureCustomPolicyResource",
    description="string",
    actions=[{
        "captures": [{
            "name": "string",
            "seconds_after_event": 0,
            "seconds_before_event": 0,
            "bucket_name": "string",
            "filter": "string",
            "folder": "string",
        }],
        "container": "string",
        "kill_process": False,
    }],
    enabled=False,
    name="string",
    notification_channels=[0],
    rules=[{
        "name": "string",
        "enabled": False,
    }],
    runbook="string",
    scope="string",
    secure_custom_policy_id="string",
    severity=0,
    timeouts={
        "create": "string",
        "delete": "string",
        "read": "string",
        "update": "string",
    },
    type="string")
const secureCustomPolicyResource = new sysdig.SecureCustomPolicy("secureCustomPolicyResource", {
    description: "string",
    actions: [{
        captures: [{
            name: "string",
            secondsAfterEvent: 0,
            secondsBeforeEvent: 0,
            bucketName: "string",
            filter: "string",
            folder: "string",
        }],
        container: "string",
        killProcess: false,
    }],
    enabled: false,
    name: "string",
    notificationChannels: [0],
    rules: [{
        name: "string",
        enabled: false,
    }],
    runbook: "string",
    scope: "string",
    secureCustomPolicyId: "string",
    severity: 0,
    timeouts: {
        create: "string",
        "delete": "string",
        read: "string",
        update: "string",
    },
    type: "string",
});
type: sysdig:SecureCustomPolicy
properties:
    actions:
        - captures:
            - bucketName: string
              filter: string
              folder: string
              name: string
              secondsAfterEvent: 0
              secondsBeforeEvent: 0
          container: string
          killProcess: false
    description: string
    enabled: false
    name: string
    notificationChannels:
        - 0
    rules:
        - enabled: false
          name: string
    runbook: string
    scope: string
    secureCustomPolicyId: string
    severity: 0
    timeouts:
        create: string
        delete: string
        read: string
        update: string
    type: string
SecureCustomPolicy Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The SecureCustomPolicy resource accepts the following input properties:
- Description string
- The description of Secure policy.
- Actions
List<SecureCustom Policy Action> 
- Enabled bool
- Will secure process with this rule?. By default this is true.
- Name string
- The name of the Secure policy. It must be unique.
- NotificationChannels List<double>
- Rules
List<SecureCustom Policy Rule> 
- Runbook string
- Customer provided url that provides a runbook for a given policy.
- Scope string
- SecureCustom stringPolicy Id 
- Severity double
- The severity of Secure policy. The accepted values are: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). The default value is 4 (Medium).
- Timeouts
SecureCustom Policy Timeouts 
- Type string
- Specifies the type of the runtime policy. Must be one of: falco,list_matching,k8s_audit,aws_cloudtrail,gcp_auditlog,azure_platformlogs,awscloudtrail,okta,github,guardduty. By default it isfalco.
- Description string
- The description of Secure policy.
- Actions
[]SecureCustom Policy Action Args 
- Enabled bool
- Will secure process with this rule?. By default this is true.
- Name string
- The name of the Secure policy. It must be unique.
- NotificationChannels []float64
- Rules
[]SecureCustom Policy Rule Args 
- Runbook string
- Customer provided url that provides a runbook for a given policy.
- Scope string
- SecureCustom stringPolicy Id 
- Severity float64
- The severity of Secure policy. The accepted values are: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). The default value is 4 (Medium).
- Timeouts
SecureCustom Policy Timeouts Args 
- Type string
- Specifies the type of the runtime policy. Must be one of: falco,list_matching,k8s_audit,aws_cloudtrail,gcp_auditlog,azure_platformlogs,awscloudtrail,okta,github,guardduty. By default it isfalco.
- description String
- The description of Secure policy.
- actions
List<SecureCustom Policy Action> 
- enabled Boolean
- Will secure process with this rule?. By default this is true.
- name String
- The name of the Secure policy. It must be unique.
- notificationChannels List<Double>
- rules
List<SecureCustom Policy Rule> 
- runbook String
- Customer provided url that provides a runbook for a given policy.
- scope String
- secureCustom StringPolicy Id 
- severity Double
- The severity of Secure policy. The accepted values are: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). The default value is 4 (Medium).
- timeouts
SecureCustom Policy Timeouts 
- type String
- Specifies the type of the runtime policy. Must be one of: falco,list_matching,k8s_audit,aws_cloudtrail,gcp_auditlog,azure_platformlogs,awscloudtrail,okta,github,guardduty. By default it isfalco.
- description string
- The description of Secure policy.
- actions
SecureCustom Policy Action[] 
- enabled boolean
- Will secure process with this rule?. By default this is true.
- name string
- The name of the Secure policy. It must be unique.
- notificationChannels number[]
- rules
SecureCustom Policy Rule[] 
- runbook string
- Customer provided url that provides a runbook for a given policy.
- scope string
- secureCustom stringPolicy Id 
- severity number
- The severity of Secure policy. The accepted values are: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). The default value is 4 (Medium).
- timeouts
SecureCustom Policy Timeouts 
- type string
- Specifies the type of the runtime policy. Must be one of: falco,list_matching,k8s_audit,aws_cloudtrail,gcp_auditlog,azure_platformlogs,awscloudtrail,okta,github,guardduty. By default it isfalco.
- description str
- The description of Secure policy.
- actions
Sequence[SecureCustom Policy Action Args] 
- enabled bool
- Will secure process with this rule?. By default this is true.
- name str
- The name of the Secure policy. It must be unique.
- notification_channels Sequence[float]
- rules
Sequence[SecureCustom Policy Rule Args] 
- runbook str
- Customer provided url that provides a runbook for a given policy.
- scope str
- secure_custom_ strpolicy_ id 
- severity float
- The severity of Secure policy. The accepted values are: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). The default value is 4 (Medium).
- timeouts
SecureCustom Policy Timeouts Args 
- type str
- Specifies the type of the runtime policy. Must be one of: falco,list_matching,k8s_audit,aws_cloudtrail,gcp_auditlog,azure_platformlogs,awscloudtrail,okta,github,guardduty. By default it isfalco.
- description String
- The description of Secure policy.
- actions List<Property Map>
- enabled Boolean
- Will secure process with this rule?. By default this is true.
- name String
- The name of the Secure policy. It must be unique.
- notificationChannels List<Number>
- rules List<Property Map>
- runbook String
- Customer provided url that provides a runbook for a given policy.
- scope String
- secureCustom StringPolicy Id 
- severity Number
- The severity of Secure policy. The accepted values are: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). The default value is 4 (Medium).
- timeouts Property Map
- type String
- Specifies the type of the runtime policy. Must be one of: falco,list_matching,k8s_audit,aws_cloudtrail,gcp_auditlog,azure_platformlogs,awscloudtrail,okta,github,guardduty. By default it isfalco.
Outputs
All input properties are implicitly available as output properties. Additionally, the SecureCustomPolicy resource produces the following output properties:
Look up Existing SecureCustomPolicy Resource
Get an existing SecureCustomPolicy resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: SecureCustomPolicyState, opts?: CustomResourceOptions): SecureCustomPolicy@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        actions: Optional[Sequence[SecureCustomPolicyActionArgs]] = None,
        description: Optional[str] = None,
        enabled: Optional[bool] = None,
        name: Optional[str] = None,
        notification_channels: Optional[Sequence[float]] = None,
        rules: Optional[Sequence[SecureCustomPolicyRuleArgs]] = None,
        runbook: Optional[str] = None,
        scope: Optional[str] = None,
        secure_custom_policy_id: Optional[str] = None,
        severity: Optional[float] = None,
        timeouts: Optional[SecureCustomPolicyTimeoutsArgs] = None,
        type: Optional[str] = None,
        version: Optional[float] = None) -> SecureCustomPolicyfunc GetSecureCustomPolicy(ctx *Context, name string, id IDInput, state *SecureCustomPolicyState, opts ...ResourceOption) (*SecureCustomPolicy, error)public static SecureCustomPolicy Get(string name, Input<string> id, SecureCustomPolicyState? state, CustomResourceOptions? opts = null)public static SecureCustomPolicy get(String name, Output<String> id, SecureCustomPolicyState state, CustomResourceOptions options)resources:  _:    type: sysdig:SecureCustomPolicy    get:      id: ${id}- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Actions
List<SecureCustom Policy Action> 
- Description string
- The description of Secure policy.
- Enabled bool
- Will secure process with this rule?. By default this is true.
- Name string
- The name of the Secure policy. It must be unique.
- NotificationChannels List<double>
- Rules
List<SecureCustom Policy Rule> 
- Runbook string
- Customer provided url that provides a runbook for a given policy.
- Scope string
- SecureCustom stringPolicy Id 
- Severity double
- The severity of Secure policy. The accepted values are: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). The default value is 4 (Medium).
- Timeouts
SecureCustom Policy Timeouts 
- Type string
- Specifies the type of the runtime policy. Must be one of: falco,list_matching,k8s_audit,aws_cloudtrail,gcp_auditlog,azure_platformlogs,awscloudtrail,okta,github,guardduty. By default it isfalco.
- Version double
- Actions
[]SecureCustom Policy Action Args 
- Description string
- The description of Secure policy.
- Enabled bool
- Will secure process with this rule?. By default this is true.
- Name string
- The name of the Secure policy. It must be unique.
- NotificationChannels []float64
- Rules
[]SecureCustom Policy Rule Args 
- Runbook string
- Customer provided url that provides a runbook for a given policy.
- Scope string
- SecureCustom stringPolicy Id 
- Severity float64
- The severity of Secure policy. The accepted values are: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). The default value is 4 (Medium).
- Timeouts
SecureCustom Policy Timeouts Args 
- Type string
- Specifies the type of the runtime policy. Must be one of: falco,list_matching,k8s_audit,aws_cloudtrail,gcp_auditlog,azure_platformlogs,awscloudtrail,okta,github,guardduty. By default it isfalco.
- Version float64
- actions
List<SecureCustom Policy Action> 
- description String
- The description of Secure policy.
- enabled Boolean
- Will secure process with this rule?. By default this is true.
- name String
- The name of the Secure policy. It must be unique.
- notificationChannels List<Double>
- rules
List<SecureCustom Policy Rule> 
- runbook String
- Customer provided url that provides a runbook for a given policy.
- scope String
- secureCustom StringPolicy Id 
- severity Double
- The severity of Secure policy. The accepted values are: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). The default value is 4 (Medium).
- timeouts
SecureCustom Policy Timeouts 
- type String
- Specifies the type of the runtime policy. Must be one of: falco,list_matching,k8s_audit,aws_cloudtrail,gcp_auditlog,azure_platformlogs,awscloudtrail,okta,github,guardduty. By default it isfalco.
- version Double
- actions
SecureCustom Policy Action[] 
- description string
- The description of Secure policy.
- enabled boolean
- Will secure process with this rule?. By default this is true.
- name string
- The name of the Secure policy. It must be unique.
- notificationChannels number[]
- rules
SecureCustom Policy Rule[] 
- runbook string
- Customer provided url that provides a runbook for a given policy.
- scope string
- secureCustom stringPolicy Id 
- severity number
- The severity of Secure policy. The accepted values are: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). The default value is 4 (Medium).
- timeouts
SecureCustom Policy Timeouts 
- type string
- Specifies the type of the runtime policy. Must be one of: falco,list_matching,k8s_audit,aws_cloudtrail,gcp_auditlog,azure_platformlogs,awscloudtrail,okta,github,guardduty. By default it isfalco.
- version number
- actions
Sequence[SecureCustom Policy Action Args] 
- description str
- The description of Secure policy.
- enabled bool
- Will secure process with this rule?. By default this is true.
- name str
- The name of the Secure policy. It must be unique.
- notification_channels Sequence[float]
- rules
Sequence[SecureCustom Policy Rule Args] 
- runbook str
- Customer provided url that provides a runbook for a given policy.
- scope str
- secure_custom_ strpolicy_ id 
- severity float
- The severity of Secure policy. The accepted values are: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). The default value is 4 (Medium).
- timeouts
SecureCustom Policy Timeouts Args 
- type str
- Specifies the type of the runtime policy. Must be one of: falco,list_matching,k8s_audit,aws_cloudtrail,gcp_auditlog,azure_platformlogs,awscloudtrail,okta,github,guardduty. By default it isfalco.
- version float
- actions List<Property Map>
- description String
- The description of Secure policy.
- enabled Boolean
- Will secure process with this rule?. By default this is true.
- name String
- The name of the Secure policy. It must be unique.
- notificationChannels List<Number>
- rules List<Property Map>
- runbook String
- Customer provided url that provides a runbook for a given policy.
- scope String
- secureCustom StringPolicy Id 
- severity Number
- The severity of Secure policy. The accepted values are: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). The default value is 4 (Medium).
- timeouts Property Map
- type String
- Specifies the type of the runtime policy. Must be one of: falco,list_matching,k8s_audit,aws_cloudtrail,gcp_auditlog,azure_platformlogs,awscloudtrail,okta,github,guardduty. By default it isfalco.
- version Number
Supporting Types
SecureCustomPolicyAction, SecureCustomPolicyActionArgs        
- Captures
List<SecureCustom Policy Action Capture> 
- Captures with Sysdig the stream of system calls:
- Container string
- The action applied to container when this Policy is triggered. Can be stop, pause or kill. If this is not specified, no action will be applied at the container level.
- KillProcess bool
- Whether to kill the process that triggered the rule. If this is not specified, no action will be applied at the process level.
- Captures
[]SecureCustom Policy Action Capture 
- Captures with Sysdig the stream of system calls:
- Container string
- The action applied to container when this Policy is triggered. Can be stop, pause or kill. If this is not specified, no action will be applied at the container level.
- KillProcess bool
- Whether to kill the process that triggered the rule. If this is not specified, no action will be applied at the process level.
- captures
List<SecureCustom Policy Action Capture> 
- Captures with Sysdig the stream of system calls:
- container String
- The action applied to container when this Policy is triggered. Can be stop, pause or kill. If this is not specified, no action will be applied at the container level.
- killProcess Boolean
- Whether to kill the process that triggered the rule. If this is not specified, no action will be applied at the process level.
- captures
SecureCustom Policy Action Capture[] 
- Captures with Sysdig the stream of system calls:
- container string
- The action applied to container when this Policy is triggered. Can be stop, pause or kill. If this is not specified, no action will be applied at the container level.
- killProcess boolean
- Whether to kill the process that triggered the rule. If this is not specified, no action will be applied at the process level.
- captures
Sequence[SecureCustom Policy Action Capture] 
- Captures with Sysdig the stream of system calls:
- container str
- The action applied to container when this Policy is triggered. Can be stop, pause or kill. If this is not specified, no action will be applied at the container level.
- kill_process bool
- Whether to kill the process that triggered the rule. If this is not specified, no action will be applied at the process level.
- captures List<Property Map>
- Captures with Sysdig the stream of system calls:
- container String
- The action applied to container when this Policy is triggered. Can be stop, pause or kill. If this is not specified, no action will be applied at the container level.
- killProcess Boolean
- Whether to kill the process that triggered the rule. If this is not specified, no action will be applied at the process level.
SecureCustomPolicyActionCapture, SecureCustomPolicyActionCaptureArgs          
- Name string
- The name of the Secure policy. It must be unique.
- SecondsAfter doubleEvent 
- Captures the system calls for the amount of seconds after the policy was triggered.
- SecondsBefore doubleEvent 
- Captures the system calls during the amount of seconds before the policy was triggered.
- BucketName string
- Custom bucket to store capture in, bucket should be onboarded in Integrations > S3 Capture Storage. Default is to use Sysdig Secure Storage
- Filter string
- Additional filter to apply to the capture. For example: proc.name=cat
- Folder string
- Name of folder to store capture inside the bucket.
By default we will store the capture file at the root of the bucket
- Name string
- The name of the Secure policy. It must be unique.
- SecondsAfter float64Event 
- Captures the system calls for the amount of seconds after the policy was triggered.
- SecondsBefore float64Event 
- Captures the system calls during the amount of seconds before the policy was triggered.
- BucketName string
- Custom bucket to store capture in, bucket should be onboarded in Integrations > S3 Capture Storage. Default is to use Sysdig Secure Storage
- Filter string
- Additional filter to apply to the capture. For example: proc.name=cat
- Folder string
- Name of folder to store capture inside the bucket.
By default we will store the capture file at the root of the bucket
- name String
- The name of the Secure policy. It must be unique.
- secondsAfter DoubleEvent 
- Captures the system calls for the amount of seconds after the policy was triggered.
- secondsBefore DoubleEvent 
- Captures the system calls during the amount of seconds before the policy was triggered.
- bucketName String
- Custom bucket to store capture in, bucket should be onboarded in Integrations > S3 Capture Storage. Default is to use Sysdig Secure Storage
- filter String
- Additional filter to apply to the capture. For example: proc.name=cat
- folder String
- Name of folder to store capture inside the bucket.
By default we will store the capture file at the root of the bucket
- name string
- The name of the Secure policy. It must be unique.
- secondsAfter numberEvent 
- Captures the system calls for the amount of seconds after the policy was triggered.
- secondsBefore numberEvent 
- Captures the system calls during the amount of seconds before the policy was triggered.
- bucketName string
- Custom bucket to store capture in, bucket should be onboarded in Integrations > S3 Capture Storage. Default is to use Sysdig Secure Storage
- filter string
- Additional filter to apply to the capture. For example: proc.name=cat
- folder string
- Name of folder to store capture inside the bucket.
By default we will store the capture file at the root of the bucket
- name str
- The name of the Secure policy. It must be unique.
- seconds_after_ floatevent 
- Captures the system calls for the amount of seconds after the policy was triggered.
- seconds_before_ floatevent 
- Captures the system calls during the amount of seconds before the policy was triggered.
- bucket_name str
- Custom bucket to store capture in, bucket should be onboarded in Integrations > S3 Capture Storage. Default is to use Sysdig Secure Storage
- filter str
- Additional filter to apply to the capture. For example: proc.name=cat
- folder str
- Name of folder to store capture inside the bucket.
By default we will store the capture file at the root of the bucket
- name String
- The name of the Secure policy. It must be unique.
- secondsAfter NumberEvent 
- Captures the system calls for the amount of seconds after the policy was triggered.
- secondsBefore NumberEvent 
- Captures the system calls during the amount of seconds before the policy was triggered.
- bucketName String
- Custom bucket to store capture in, bucket should be onboarded in Integrations > S3 Capture Storage. Default is to use Sysdig Secure Storage
- filter String
- Additional filter to apply to the capture. For example: proc.name=cat
- folder String
- Name of folder to store capture inside the bucket.
By default we will store the capture file at the root of the bucket
SecureCustomPolicyRule, SecureCustomPolicyRuleArgs        
SecureCustomPolicyTimeouts, SecureCustomPolicyTimeoutsArgs        
Import
Secure custom policies can be imported using the ID, e.g.
$ pulumi import sysdig:index/secureCustomPolicy:SecureCustomPolicy example 12345
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- sysdig sysdiglabs/terraform-provider-sysdig
- License
- Notes
- This Pulumi package is based on the sysdigTerraform Provider.