Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Upgrade terraform-provider-sumologic to v2.28.1 #257

Merged
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
8 changes: 8 additions & 0 deletions provider/cmd/pulumi-resource-sumologic/bridge-metadata.json
Original file line number Diff line number Diff line change
Expand Up @@ -387,6 +387,9 @@
"sumologic_cse_custom_insight": {
"current": "sumologic:index/cseCustomInsight:CseCustomInsight",
"fields": {
"dynamic_severity": {
"maxItemsOne": false
},
"rule_ids": {
"maxItemsOne": false
},
Expand Down Expand Up @@ -5276,6 +5279,10 @@
"sumologic:index/CseChainRuleEntitySelector:CseChainRuleEntitySelector": {
"entityType": "entity_type"
},
"sumologic:index/CseCustomInsightDynamicSeverity:CseCustomInsightDynamicSeverity": {
"insightSeverity": "insight_severity",
"minimumSignalSeverity": "minimum_signal_severity"
},
"sumologic:index/CseEntityNormalizationConfigurationDomainMapping:CseEntityNormalizationConfigurationDomainMapping": {
"normalizedDomain": "normalized_domain",
"rawDomain": "raw_domain"
Expand Down Expand Up @@ -7369,6 +7376,7 @@
"recordFields": "record_fields"
},
"sumologic:index/cseCustomInsight:CseCustomInsight": {
"dynamicSeverities": "dynamic_severity",
"ruleIds": "rule_ids",
"signalNames": "signal_names"
},
Expand Down
46 changes: 42 additions & 4 deletions provider/cmd/pulumi-resource-sumologic/schema.json
Original file line number Diff line number Diff line change
Expand Up @@ -1311,6 +1311,23 @@
"limit"
]
},
"sumologic:index/CseCustomInsightDynamicSeverity:CseCustomInsightDynamicSeverity": {
"properties": {
"insightSeverity": {
"type": "string",
"description": "The severity of the generated Insight (CRITICAL, HIGH, MEDIUM, or LOW)\n"
},
"minimumSignalSeverity": {
"type": "integer",
"description": "minimum Signal severity as the threshold for an Insight severity level\n"
}
},
"type": "object",
"required": [
"insightSeverity",
"minimumSignalSeverity"
]
},
"sumologic:index/CseEntityNormalizationConfigurationDomainMapping:CseEntityNormalizationConfigurationDomainMapping": {
"properties": {
"normalizedDomain": {
Expand Down Expand Up @@ -16296,12 +16313,19 @@
}
},
"sumologic:index/cseCustomInsight:CseCustomInsight": {
"description": "Provides a Sumo Logic CSE Custom Insight.\n\n{{% examples %}}\n## Example Usage\n{{% example %}}\n\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sumologic from \"@pulumi/sumologic\";\n\nconst customInsight = new sumologic.CseCustomInsight(\"customInsight\", {\n description: \"Insight description\",\n enabled: true,\n ordered: true,\n ruleIds: [\n \"MATCH-S00001\",\n \"THRESHOLD-U00005\",\n ],\n severity: \"HIGH\",\n signalNames: [\n \"Some Signal Name\",\n \"Wildcard Signal Name *\",\n ],\n tags: [\"_mitreAttackTactic:TA0009\"],\n});\n```\n```python\nimport pulumi\nimport pulumi_sumologic as sumologic\n\ncustom_insight = sumologic.CseCustomInsight(\"customInsight\",\n description=\"Insight description\",\n enabled=True,\n ordered=True,\n rule_ids=[\n \"MATCH-S00001\",\n \"THRESHOLD-U00005\",\n ],\n severity=\"HIGH\",\n signal_names=[\n \"Some Signal Name\",\n \"Wildcard Signal Name *\",\n ],\n tags=[\"_mitreAttackTactic:TA0009\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing SumoLogic = Pulumi.SumoLogic;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var customInsight = new SumoLogic.CseCustomInsight(\"customInsight\", new()\n {\n Description = \"Insight description\",\n Enabled = true,\n Ordered = true,\n RuleIds = new[]\n {\n \"MATCH-S00001\",\n \"THRESHOLD-U00005\",\n },\n Severity = \"HIGH\",\n SignalNames = new[]\n {\n \"Some Signal Name\",\n \"Wildcard Signal Name *\",\n },\n Tags = new[]\n {\n \"_mitreAttackTactic:TA0009\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-sumologic/sdk/go/sumologic\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sumologic.NewCseCustomInsight(ctx, \"customInsight\", \u0026sumologic.CseCustomInsightArgs{\n\t\t\tDescription: pulumi.String(\"Insight description\"),\n\t\t\tEnabled: pulumi.Bool(true),\n\t\t\tOrdered: pulumi.Bool(true),\n\t\t\tRuleIds: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"MATCH-S00001\"),\n\t\t\t\tpulumi.String(\"THRESHOLD-U00005\"),\n\t\t\t},\n\t\t\tSeverity: pulumi.String(\"HIGH\"),\n\t\t\tSignalNames: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Some Signal Name\"),\n\t\t\t\tpulumi.String(\"Wildcard Signal Name *\"),\n\t\t\t},\n\t\t\tTags: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"_mitreAttackTactic:TA0009\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sumologic.CseCustomInsight;\nimport com.pulumi.sumologic.CseCustomInsightArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var customInsight = new CseCustomInsight(\"customInsight\", CseCustomInsightArgs.builder() \n .description(\"Insight description\")\n .enabled(true)\n .ordered(true)\n .ruleIds( \n \"MATCH-S00001\",\n \"THRESHOLD-U00005\")\n .severity(\"HIGH\")\n .signalNames( \n \"Some Signal Name\",\n \"Wildcard Signal Name *\")\n .tags(\"_mitreAttackTactic:TA0009\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n customInsight:\n type: sumologic:CseCustomInsight\n properties:\n description: Insight description\n enabled: true\n ordered: true\n ruleIds:\n - MATCH-S00001\n - THRESHOLD-U00005\n severity: HIGH\n signalNames:\n - Some Signal Name\n - Wildcard Signal Name *\n tags:\n - _mitreAttackTactic:TA0009\n```\n{{% /example %}}\n{{% /examples %}}\n\n## Import\n\nCustom Insights can be imported using the field id, e.g.hcl\n\n```sh\n $ pulumi import sumologic:index/cseCustomInsight:CseCustomInsight custom_insight id\n```\n\n ",
"description": "Provides a Sumo Logic CSE Custom Insight.\n\n{{% examples %}}\n## Example Usage\n{{% example %}}\n\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sumologic from \"@pulumi/sumologic\";\n\nconst customInsight = new sumologic.CseCustomInsight(\"customInsight\", {\n description: \"Insight description\",\n dynamicSeverities: [{\n insightSeverity: \"CRITICAL\",\n minimumSignalSeverity: 8,\n }],\n enabled: true,\n ordered: true,\n ruleIds: [\n \"MATCH-S00001\",\n \"THRESHOLD-U00005\",\n ],\n severity: \"HIGH\",\n signalNames: [\n \"Some Signal Name\",\n \"Wildcard Signal Name *\",\n ],\n tags: [\"_mitreAttackTactic:TA0009\"],\n});\n```\n```python\nimport pulumi\nimport pulumi_sumologic as sumologic\n\ncustom_insight = sumologic.CseCustomInsight(\"customInsight\",\n description=\"Insight description\",\n dynamic_severities=[sumologic.CseCustomInsightDynamicSeverityArgs(\n insight_severity=\"CRITICAL\",\n minimum_signal_severity=8,\n )],\n enabled=True,\n ordered=True,\n rule_ids=[\n \"MATCH-S00001\",\n \"THRESHOLD-U00005\",\n ],\n severity=\"HIGH\",\n signal_names=[\n \"Some Signal Name\",\n \"Wildcard Signal Name *\",\n ],\n tags=[\"_mitreAttackTactic:TA0009\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing SumoLogic = Pulumi.SumoLogic;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var customInsight = new SumoLogic.CseCustomInsight(\"customInsight\", new()\n {\n Description = \"Insight description\",\n DynamicSeverities = new[]\n {\n new SumoLogic.Inputs.CseCustomInsightDynamicSeverityArgs\n {\n InsightSeverity = \"CRITICAL\",\n MinimumSignalSeverity = 8,\n },\n },\n Enabled = true,\n Ordered = true,\n RuleIds = new[]\n {\n \"MATCH-S00001\",\n \"THRESHOLD-U00005\",\n },\n Severity = \"HIGH\",\n SignalNames = new[]\n {\n \"Some Signal Name\",\n \"Wildcard Signal Name *\",\n },\n Tags = new[]\n {\n \"_mitreAttackTactic:TA0009\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-sumologic/sdk/go/sumologic\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sumologic.NewCseCustomInsight(ctx, \"customInsight\", \u0026sumologic.CseCustomInsightArgs{\n\t\t\tDescription: pulumi.String(\"Insight description\"),\n\t\t\tDynamicSeverities: sumologic.CseCustomInsightDynamicSeverityArray{\n\t\t\t\t\u0026sumologic.CseCustomInsightDynamicSeverityArgs{\n\t\t\t\t\tInsightSeverity: pulumi.String(\"CRITICAL\"),\n\t\t\t\t\tMinimumSignalSeverity: pulumi.Int(8),\n\t\t\t\t},\n\t\t\t},\n\t\t\tEnabled: pulumi.Bool(true),\n\t\t\tOrdered: pulumi.Bool(true),\n\t\t\tRuleIds: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"MATCH-S00001\"),\n\t\t\t\tpulumi.String(\"THRESHOLD-U00005\"),\n\t\t\t},\n\t\t\tSeverity: pulumi.String(\"HIGH\"),\n\t\t\tSignalNames: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Some Signal Name\"),\n\t\t\t\tpulumi.String(\"Wildcard Signal Name *\"),\n\t\t\t},\n\t\t\tTags: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"_mitreAttackTactic:TA0009\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sumologic.CseCustomInsight;\nimport com.pulumi.sumologic.CseCustomInsightArgs;\nimport com.pulumi.sumologic.inputs.CseCustomInsightDynamicSeverityArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var customInsight = new CseCustomInsight(\"customInsight\", CseCustomInsightArgs.builder() \n .description(\"Insight description\")\n .dynamicSeverities(CseCustomInsightDynamicSeverityArgs.builder()\n .insightSeverity(\"CRITICAL\")\n .minimumSignalSeverity(8)\n .build())\n .enabled(true)\n .ordered(true)\n .ruleIds( \n \"MATCH-S00001\",\n \"THRESHOLD-U00005\")\n .severity(\"HIGH\")\n .signalNames( \n \"Some Signal Name\",\n \"Wildcard Signal Name *\")\n .tags(\"_mitreAttackTactic:TA0009\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n customInsight:\n type: sumologic:CseCustomInsight\n properties:\n description: Insight description\n dynamicSeverities:\n - insightSeverity: CRITICAL\n minimumSignalSeverity: 8\n enabled: true\n ordered: true\n ruleIds:\n - MATCH-S00001\n - THRESHOLD-U00005\n severity: HIGH\n signalNames:\n - Some Signal Name\n - Wildcard Signal Name *\n tags:\n - _mitreAttackTactic:TA0009\n```\n{{% /example %}}\n{{% /examples %}}\n\n## Import\n\nCustom Insights can be imported using the field id, e.g.hcl\n\n```sh\n $ pulumi import sumologic:index/cseCustomInsight:CseCustomInsight custom_insight id\n```\n\n ",
"properties": {
"description": {
"type": "string",
"description": "The description of the generated Insights\n"
},
"dynamicSeverities": {
"type": "array",
"items": {
"$ref": "#/types/sumologic:index/CseCustomInsightDynamicSeverity:CseCustomInsightDynamicSeverity"
},
"description": "The severity of the generated Insight that is based on the severity of the Signals that trigger the Insight.\n"
},
"enabled": {
"type": "boolean",
"description": "Whether the Custom Insight should generate Insights\n"
Expand All @@ -16323,7 +16347,7 @@
},
"severity": {
"type": "string",
"description": "The severity of the generated Insights (HIGH, MEDIUM, or LOW)\n"
"description": "The severity of the generated Insights (CRITICAL, HIGH, MEDIUM, or LOW)\n"
},
"signalNames": {
"type": "array",
Expand Down Expand Up @@ -16353,6 +16377,13 @@
"type": "string",
"description": "The description of the generated Insights\n"
},
"dynamicSeverities": {
"type": "array",
"items": {
"$ref": "#/types/sumologic:index/CseCustomInsightDynamicSeverity:CseCustomInsightDynamicSeverity"
},
"description": "The severity of the generated Insight that is based on the severity of the Signals that trigger the Insight.\n"
},
"enabled": {
"type": "boolean",
"description": "Whether the Custom Insight should generate Insights\n"
Expand All @@ -16374,7 +16405,7 @@
},
"severity": {
"type": "string",
"description": "The severity of the generated Insights (HIGH, MEDIUM, or LOW)\n"
"description": "The severity of the generated Insights (CRITICAL, HIGH, MEDIUM, or LOW)\n"
},
"signalNames": {
"type": "array",
Expand Down Expand Up @@ -16405,6 +16436,13 @@
"type": "string",
"description": "The description of the generated Insights\n"
},
"dynamicSeverities": {
"type": "array",
"items": {
"$ref": "#/types/sumologic:index/CseCustomInsightDynamicSeverity:CseCustomInsightDynamicSeverity"
},
"description": "The severity of the generated Insight that is based on the severity of the Signals that trigger the Insight.\n"
},
"enabled": {
"type": "boolean",
"description": "Whether the Custom Insight should generate Insights\n"
Expand All @@ -16426,7 +16464,7 @@
},
"severity": {
"type": "string",
"description": "The severity of the generated Insights (HIGH, MEDIUM, or LOW)\n"
"description": "The severity of the generated Insights (CRITICAL, HIGH, MEDIUM, or LOW)\n"
},
"signalNames": {
"type": "array",
Expand Down