Skip to content

Commit

Permalink
Upgrade terraform-provider-sumologic to v2.28.1 (#257)
Browse files Browse the repository at this point in the history
This PR was generated via `$ upgrade-provider pulumi/pulumi-sumologic
--kind=all --target-bridge-version=latest`.

---

- Upgrading terraform-provider-sumologic from 2.28.0  to 2.28.1.
	Fixes #256
  • Loading branch information
pulumi-bot committed Jan 22, 2024
1 parent 7c45be1 commit d8f48f4
Show file tree
Hide file tree
Showing 21 changed files with 1,053 additions and 229 deletions.
8 changes: 8 additions & 0 deletions provider/cmd/pulumi-resource-sumologic/bridge-metadata.json
Original file line number Diff line number Diff line change
Expand Up @@ -387,6 +387,9 @@
"sumologic_cse_custom_insight": {
"current": "sumologic:index/cseCustomInsight:CseCustomInsight",
"fields": {
"dynamic_severity": {
"maxItemsOne": false
},
"rule_ids": {
"maxItemsOne": false
},
Expand Down Expand Up @@ -5276,6 +5279,10 @@
"sumologic:index/CseChainRuleEntitySelector:CseChainRuleEntitySelector": {
"entityType": "entity_type"
},
"sumologic:index/CseCustomInsightDynamicSeverity:CseCustomInsightDynamicSeverity": {
"insightSeverity": "insight_severity",
"minimumSignalSeverity": "minimum_signal_severity"
},
"sumologic:index/CseEntityNormalizationConfigurationDomainMapping:CseEntityNormalizationConfigurationDomainMapping": {
"normalizedDomain": "normalized_domain",
"rawDomain": "raw_domain"
Expand Down Expand Up @@ -7369,6 +7376,7 @@
"recordFields": "record_fields"
},
"sumologic:index/cseCustomInsight:CseCustomInsight": {
"dynamicSeverities": "dynamic_severity",
"ruleIds": "rule_ids",
"signalNames": "signal_names"
},
Expand Down
46 changes: 42 additions & 4 deletions provider/cmd/pulumi-resource-sumologic/schema.json
Original file line number Diff line number Diff line change
Expand Up @@ -1311,6 +1311,23 @@
"limit"
]
},
"sumologic:index/CseCustomInsightDynamicSeverity:CseCustomInsightDynamicSeverity": {
"properties": {
"insightSeverity": {
"type": "string",
"description": "The severity of the generated Insight (CRITICAL, HIGH, MEDIUM, or LOW)\n"
},
"minimumSignalSeverity": {
"type": "integer",
"description": "minimum Signal severity as the threshold for an Insight severity level\n"
}
},
"type": "object",
"required": [
"insightSeverity",
"minimumSignalSeverity"
]
},
"sumologic:index/CseEntityNormalizationConfigurationDomainMapping:CseEntityNormalizationConfigurationDomainMapping": {
"properties": {
"normalizedDomain": {
Expand Down Expand Up @@ -16296,12 +16313,19 @@
}
},
"sumologic:index/cseCustomInsight:CseCustomInsight": {
"description": "Provides a Sumo Logic CSE Custom Insight.\n\n{{% examples %}}\n## Example Usage\n{{% example %}}\n\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sumologic from \"@pulumi/sumologic\";\n\nconst customInsight = new sumologic.CseCustomInsight(\"customInsight\", {\n description: \"Insight description\",\n enabled: true,\n ordered: true,\n ruleIds: [\n \"MATCH-S00001\",\n \"THRESHOLD-U00005\",\n ],\n severity: \"HIGH\",\n signalNames: [\n \"Some Signal Name\",\n \"Wildcard Signal Name *\",\n ],\n tags: [\"_mitreAttackTactic:TA0009\"],\n});\n```\n```python\nimport pulumi\nimport pulumi_sumologic as sumologic\n\ncustom_insight = sumologic.CseCustomInsight(\"customInsight\",\n description=\"Insight description\",\n enabled=True,\n ordered=True,\n rule_ids=[\n \"MATCH-S00001\",\n \"THRESHOLD-U00005\",\n ],\n severity=\"HIGH\",\n signal_names=[\n \"Some Signal Name\",\n \"Wildcard Signal Name *\",\n ],\n tags=[\"_mitreAttackTactic:TA0009\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing SumoLogic = Pulumi.SumoLogic;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var customInsight = new SumoLogic.CseCustomInsight(\"customInsight\", new()\n {\n Description = \"Insight description\",\n Enabled = true,\n Ordered = true,\n RuleIds = new[]\n {\n \"MATCH-S00001\",\n \"THRESHOLD-U00005\",\n },\n Severity = \"HIGH\",\n SignalNames = new[]\n {\n \"Some Signal Name\",\n \"Wildcard Signal Name *\",\n },\n Tags = new[]\n {\n \"_mitreAttackTactic:TA0009\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-sumologic/sdk/go/sumologic\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sumologic.NewCseCustomInsight(ctx, \"customInsight\", \u0026sumologic.CseCustomInsightArgs{\n\t\t\tDescription: pulumi.String(\"Insight description\"),\n\t\t\tEnabled: pulumi.Bool(true),\n\t\t\tOrdered: pulumi.Bool(true),\n\t\t\tRuleIds: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"MATCH-S00001\"),\n\t\t\t\tpulumi.String(\"THRESHOLD-U00005\"),\n\t\t\t},\n\t\t\tSeverity: pulumi.String(\"HIGH\"),\n\t\t\tSignalNames: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Some Signal Name\"),\n\t\t\t\tpulumi.String(\"Wildcard Signal Name *\"),\n\t\t\t},\n\t\t\tTags: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"_mitreAttackTactic:TA0009\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sumologic.CseCustomInsight;\nimport com.pulumi.sumologic.CseCustomInsightArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var customInsight = new CseCustomInsight(\"customInsight\", CseCustomInsightArgs.builder() \n .description(\"Insight description\")\n .enabled(true)\n .ordered(true)\n .ruleIds( \n \"MATCH-S00001\",\n \"THRESHOLD-U00005\")\n .severity(\"HIGH\")\n .signalNames( \n \"Some Signal Name\",\n \"Wildcard Signal Name *\")\n .tags(\"_mitreAttackTactic:TA0009\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n customInsight:\n type: sumologic:CseCustomInsight\n properties:\n description: Insight description\n enabled: true\n ordered: true\n ruleIds:\n - MATCH-S00001\n - THRESHOLD-U00005\n severity: HIGH\n signalNames:\n - Some Signal Name\n - Wildcard Signal Name *\n tags:\n - _mitreAttackTactic:TA0009\n```\n{{% /example %}}\n{{% /examples %}}\n\n## Import\n\nCustom Insights can be imported using the field id, e.g.hcl\n\n```sh\n $ pulumi import sumologic:index/cseCustomInsight:CseCustomInsight custom_insight id\n```\n\n ",
"description": "Provides a Sumo Logic CSE Custom Insight.\n\n{{% examples %}}\n## Example Usage\n{{% example %}}\n\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sumologic from \"@pulumi/sumologic\";\n\nconst customInsight = new sumologic.CseCustomInsight(\"customInsight\", {\n description: \"Insight description\",\n dynamicSeverities: [{\n insightSeverity: \"CRITICAL\",\n minimumSignalSeverity: 8,\n }],\n enabled: true,\n ordered: true,\n ruleIds: [\n \"MATCH-S00001\",\n \"THRESHOLD-U00005\",\n ],\n severity: \"HIGH\",\n signalNames: [\n \"Some Signal Name\",\n \"Wildcard Signal Name *\",\n ],\n tags: [\"_mitreAttackTactic:TA0009\"],\n});\n```\n```python\nimport pulumi\nimport pulumi_sumologic as sumologic\n\ncustom_insight = sumologic.CseCustomInsight(\"customInsight\",\n description=\"Insight description\",\n dynamic_severities=[sumologic.CseCustomInsightDynamicSeverityArgs(\n insight_severity=\"CRITICAL\",\n minimum_signal_severity=8,\n )],\n enabled=True,\n ordered=True,\n rule_ids=[\n \"MATCH-S00001\",\n \"THRESHOLD-U00005\",\n ],\n severity=\"HIGH\",\n signal_names=[\n \"Some Signal Name\",\n \"Wildcard Signal Name *\",\n ],\n tags=[\"_mitreAttackTactic:TA0009\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing SumoLogic = Pulumi.SumoLogic;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var customInsight = new SumoLogic.CseCustomInsight(\"customInsight\", new()\n {\n Description = \"Insight description\",\n DynamicSeverities = new[]\n {\n new SumoLogic.Inputs.CseCustomInsightDynamicSeverityArgs\n {\n InsightSeverity = \"CRITICAL\",\n MinimumSignalSeverity = 8,\n },\n },\n Enabled = true,\n Ordered = true,\n RuleIds = new[]\n {\n \"MATCH-S00001\",\n \"THRESHOLD-U00005\",\n },\n Severity = \"HIGH\",\n SignalNames = new[]\n {\n \"Some Signal Name\",\n \"Wildcard Signal Name *\",\n },\n Tags = new[]\n {\n \"_mitreAttackTactic:TA0009\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-sumologic/sdk/go/sumologic\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sumologic.NewCseCustomInsight(ctx, \"customInsight\", \u0026sumologic.CseCustomInsightArgs{\n\t\t\tDescription: pulumi.String(\"Insight description\"),\n\t\t\tDynamicSeverities: sumologic.CseCustomInsightDynamicSeverityArray{\n\t\t\t\t\u0026sumologic.CseCustomInsightDynamicSeverityArgs{\n\t\t\t\t\tInsightSeverity: pulumi.String(\"CRITICAL\"),\n\t\t\t\t\tMinimumSignalSeverity: pulumi.Int(8),\n\t\t\t\t},\n\t\t\t},\n\t\t\tEnabled: pulumi.Bool(true),\n\t\t\tOrdered: pulumi.Bool(true),\n\t\t\tRuleIds: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"MATCH-S00001\"),\n\t\t\t\tpulumi.String(\"THRESHOLD-U00005\"),\n\t\t\t},\n\t\t\tSeverity: pulumi.String(\"HIGH\"),\n\t\t\tSignalNames: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Some Signal Name\"),\n\t\t\t\tpulumi.String(\"Wildcard Signal Name *\"),\n\t\t\t},\n\t\t\tTags: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"_mitreAttackTactic:TA0009\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sumologic.CseCustomInsight;\nimport com.pulumi.sumologic.CseCustomInsightArgs;\nimport com.pulumi.sumologic.inputs.CseCustomInsightDynamicSeverityArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var customInsight = new CseCustomInsight(\"customInsight\", CseCustomInsightArgs.builder() \n .description(\"Insight description\")\n .dynamicSeverities(CseCustomInsightDynamicSeverityArgs.builder()\n .insightSeverity(\"CRITICAL\")\n .minimumSignalSeverity(8)\n .build())\n .enabled(true)\n .ordered(true)\n .ruleIds( \n \"MATCH-S00001\",\n \"THRESHOLD-U00005\")\n .severity(\"HIGH\")\n .signalNames( \n \"Some Signal Name\",\n \"Wildcard Signal Name *\")\n .tags(\"_mitreAttackTactic:TA0009\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n customInsight:\n type: sumologic:CseCustomInsight\n properties:\n description: Insight description\n dynamicSeverities:\n - insightSeverity: CRITICAL\n minimumSignalSeverity: 8\n enabled: true\n ordered: true\n ruleIds:\n - MATCH-S00001\n - THRESHOLD-U00005\n severity: HIGH\n signalNames:\n - Some Signal Name\n - Wildcard Signal Name *\n tags:\n - _mitreAttackTactic:TA0009\n```\n{{% /example %}}\n{{% /examples %}}\n\n## Import\n\nCustom Insights can be imported using the field id, e.g.hcl\n\n```sh\n $ pulumi import sumologic:index/cseCustomInsight:CseCustomInsight custom_insight id\n```\n\n ",
"properties": {
"description": {
"type": "string",
"description": "The description of the generated Insights\n"
},
"dynamicSeverities": {
"type": "array",
"items": {
"$ref": "#/types/sumologic:index/CseCustomInsightDynamicSeverity:CseCustomInsightDynamicSeverity"
},
"description": "The severity of the generated Insight that is based on the severity of the Signals that trigger the Insight.\n"
},
"enabled": {
"type": "boolean",
"description": "Whether the Custom Insight should generate Insights\n"
Expand All @@ -16323,7 +16347,7 @@
},
"severity": {
"type": "string",
"description": "The severity of the generated Insights (HIGH, MEDIUM, or LOW)\n"
"description": "The severity of the generated Insights (CRITICAL, HIGH, MEDIUM, or LOW)\n"
},
"signalNames": {
"type": "array",
Expand Down Expand Up @@ -16353,6 +16377,13 @@
"type": "string",
"description": "The description of the generated Insights\n"
},
"dynamicSeverities": {
"type": "array",
"items": {
"$ref": "#/types/sumologic:index/CseCustomInsightDynamicSeverity:CseCustomInsightDynamicSeverity"
},
"description": "The severity of the generated Insight that is based on the severity of the Signals that trigger the Insight.\n"
},
"enabled": {
"type": "boolean",
"description": "Whether the Custom Insight should generate Insights\n"
Expand All @@ -16374,7 +16405,7 @@
},
"severity": {
"type": "string",
"description": "The severity of the generated Insights (HIGH, MEDIUM, or LOW)\n"
"description": "The severity of the generated Insights (CRITICAL, HIGH, MEDIUM, or LOW)\n"
},
"signalNames": {
"type": "array",
Expand Down Expand Up @@ -16405,6 +16436,13 @@
"type": "string",
"description": "The description of the generated Insights\n"
},
"dynamicSeverities": {
"type": "array",
"items": {
"$ref": "#/types/sumologic:index/CseCustomInsightDynamicSeverity:CseCustomInsightDynamicSeverity"
},
"description": "The severity of the generated Insight that is based on the severity of the Signals that trigger the Insight.\n"
},
"enabled": {
"type": "boolean",
"description": "Whether the Custom Insight should generate Insights\n"
Expand All @@ -16426,7 +16464,7 @@
},
"severity": {
"type": "string",
"description": "The severity of the generated Insights (HIGH, MEDIUM, or LOW)\n"
"description": "The severity of the generated Insights (CRITICAL, HIGH, MEDIUM, or LOW)\n"
},
"signalNames": {
"type": "array",
Expand Down
Loading

0 comments on commit d8f48f4

Please sign in to comment.