Alert Rule Scheduled Args
data class AlertRuleScheduledArgs(val alertDetailsOverrides: Output<List<AlertRuleScheduledAlertDetailsOverrideArgs>>? = null, val alertRuleTemplateGuid: Output<String>? = null, val alertRuleTemplateVersion: Output<String>? = null, val customDetails: Output<Map<String, String>>? = null, val description: Output<String>? = null, val displayName: Output<String>? = null, val enabled: Output<Boolean>? = null, val entityMappings: Output<List<AlertRuleScheduledEntityMappingArgs>>? = null, val eventGrouping: Output<AlertRuleScheduledEventGroupingArgs>? = null, val incidentConfiguration: Output<AlertRuleScheduledIncidentConfigurationArgs>? = null, val logAnalyticsWorkspaceId: Output<String>? = null, val name: Output<String>? = null, val query: Output<String>? = null, val queryFrequency: Output<String>? = null, val queryPeriod: Output<String>? = null, val sentinelEntityMappings: Output<List<AlertRuleScheduledSentinelEntityMappingArgs>>? = null, val severity: Output<String>? = null, val suppressionDuration: Output<String>? = null, val suppressionEnabled: Output<Boolean>? = null, val tactics: Output<List<String>>? = null, val techniques: Output<List<String>>? = null, val triggerOperator: Output<String>? = null, val triggerThreshold: Output<Int>? = null) : ConvertibleToJava<AlertRuleScheduledArgs>
Manages a Sentinel Scheduled Alert Rule.
Example Usage
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azure.core.ResourceGroup;
import com.pulumi.azure.core.ResourceGroupArgs;
import com.pulumi.azure.operationalinsights.AnalyticsWorkspace;
import com.pulumi.azure.operationalinsights.AnalyticsWorkspaceArgs;
import com.pulumi.azure.sentinel.LogAnalyticsWorkspaceOnboarding;
import com.pulumi.azure.sentinel.LogAnalyticsWorkspaceOnboardingArgs;
import com.pulumi.azure.sentinel.AlertRuleScheduled;
import com.pulumi.azure.sentinel.AlertRuleScheduledArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var example = new ResourceGroup("example", ResourceGroupArgs.builder()
.name("example-resources")
.location("West Europe")
.build());
var exampleAnalyticsWorkspace = new AnalyticsWorkspace("exampleAnalyticsWorkspace", AnalyticsWorkspaceArgs.builder()
.name("example-workspace")
.location(example.location())
.resourceGroupName(example.name())
.sku("PerGB2018")
.build());
var exampleLogAnalyticsWorkspaceOnboarding = new LogAnalyticsWorkspaceOnboarding("exampleLogAnalyticsWorkspaceOnboarding", LogAnalyticsWorkspaceOnboardingArgs.builder()
.workspaceId(exampleAnalyticsWorkspace.id())
.build());
var exampleAlertRuleScheduled = new AlertRuleScheduled("exampleAlertRuleScheduled", AlertRuleScheduledArgs.builder()
.name("example")
.logAnalyticsWorkspaceId(exampleLogAnalyticsWorkspaceOnboarding.workspaceId())
.displayName("example")
.severity("High")
.query("""
AzureActivity |
where OperationName == "Create or Update Virtual Machine" or OperationName =="Create Deployment" |
where ActivityStatus == "Succeeded" |
make-series dcount(ResourceId) default=0 on EventSubmissionTimestamp in range(ago(7d), now(), 1d) by Caller
""")
.build());
}
}Content copied to clipboard
Import
Sentinel Scheduled Alert Rules can be imported using the resource id, e.g.
$ pulumi import azure:sentinel/alertRuleScheduled:AlertRuleScheduled example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.OperationalInsights/workspaces/workspace1/providers/Microsoft.SecurityInsights/alertRules/rule1Content copied to clipboard
Constructors
Link copied to clipboard
fun AlertRuleScheduledArgs(alertDetailsOverrides: Output<List<AlertRuleScheduledAlertDetailsOverrideArgs>>? = null, alertRuleTemplateGuid: Output<String>? = null, alertRuleTemplateVersion: Output<String>? = null, customDetails: Output<Map<String, String>>? = null, description: Output<String>? = null, displayName: Output<String>? = null, enabled: Output<Boolean>? = null, entityMappings: Output<List<AlertRuleScheduledEntityMappingArgs>>? = null, eventGrouping: Output<AlertRuleScheduledEventGroupingArgs>? = null, incidentConfiguration: Output<AlertRuleScheduledIncidentConfigurationArgs>? = null, logAnalyticsWorkspaceId: Output<String>? = null, name: Output<String>? = null, query: Output<String>? = null, queryFrequency: Output<String>? = null, queryPeriod: Output<String>? = null, sentinelEntityMappings: Output<List<AlertRuleScheduledSentinelEntityMappingArgs>>? = null, severity: Output<String>? = null, suppressionDuration: Output<String>? = null, suppressionEnabled: Output<Boolean>? = null, tactics: Output<List<String>>? = null, techniques: Output<List<String>>? = null, triggerOperator: Output<String>? = null, triggerThreshold: Output<Int>? = null)
Functions
Properties
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
A list of categories of attacks by which to classify the rule. Possible values are Collection, CommandAndControl, CredentialAccess, DefenseEvasion, Discovery, Execution, Exfiltration, ImpairProcessControl, InhibitResponseFunction, Impact, InitialAccess, LateralMovement, Persistence, PrivilegeEscalation, PreAttack, Reconnaissance and ResourceDevelopment.