pulumi-akamai 9.2.0a1759209024__py3-none-any.whl → 10.2.0a1762837730__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-akamai might be problematic. Click here for more details.

Files changed (48) hide show
  1. pulumi_akamai/__init__.py +118 -0
  2. pulumi_akamai/_inputs.py +611 -0
  3. pulumi_akamai/apidefinitions_activation.py +415 -0
  4. pulumi_akamai/apidefinitions_api.py +368 -0
  5. pulumi_akamai/apidefinitions_resource_operations.py +226 -0
  6. pulumi_akamai/app_sec_ip_geo.py +156 -107
  7. pulumi_akamai/app_sec_siem_settings.py +47 -0
  8. pulumi_akamai/appsec_advanced_settings_ase_penalty_box.py +248 -0
  9. pulumi_akamai/appsec_advanced_settings_ja4_fingerprint.py +197 -0
  10. pulumi_akamai/apr_general_settings.py +233 -0
  11. pulumi_akamai/apr_protected_operations.py +281 -0
  12. pulumi_akamai/apr_user_allow_list.py +184 -0
  13. pulumi_akamai/apr_user_risk_response_strategy.py +185 -0
  14. pulumi_akamai/clientlist_list.py +7 -7
  15. pulumi_akamai/cloud_access_key.py +7 -7
  16. pulumi_akamai/get_apidefinitions_api.py +152 -0
  17. pulumi_akamai/get_apidefinitions_openapi.py +115 -0
  18. pulumi_akamai/get_apidefinitions_resource_operations.py +137 -0
  19. pulumi_akamai/get_app_sec_ip_geo.py +40 -28
  20. pulumi_akamai/get_appsec_advanced_settings_ase_penalty_box.py +107 -0
  21. pulumi_akamai/get_appsec_advanced_settings_ja4_fingerprint.py +107 -0
  22. pulumi_akamai/get_appsec_custom_rules_usage.py +134 -0
  23. pulumi_akamai/get_appsec_rapid_rules.py +16 -1
  24. pulumi_akamai/get_apr_general_settings.py +111 -0
  25. pulumi_akamai/get_apr_protected_operations.py +126 -0
  26. pulumi_akamai/get_apr_user_allow_list.py +96 -0
  27. pulumi_akamai/get_apr_user_risk_response_strategy.py +96 -0
  28. pulumi_akamai/get_clientlist_list.py +119 -0
  29. pulumi_akamai/get_dns_record_set.py +16 -16
  30. pulumi_akamai/get_mtlstruststore_ca_set.py +267 -0
  31. pulumi_akamai/get_mtlstruststore_ca_set_activation.py +189 -0
  32. pulumi_akamai/get_mtlstruststore_ca_set_activations.py +172 -0
  33. pulumi_akamai/get_mtlstruststore_ca_set_activities.py +183 -0
  34. pulumi_akamai/get_mtlstruststore_ca_set_associations.py +124 -0
  35. pulumi_akamai/get_mtlstruststore_ca_set_certificates.py +173 -0
  36. pulumi_akamai/get_mtlstruststore_ca_set_versions.py +128 -0
  37. pulumi_akamai/get_mtlstruststore_ca_sets.py +112 -0
  38. pulumi_akamai/mtlskeystore_client_certificate_akamai.py +129 -1
  39. pulumi_akamai/mtlskeystore_client_certificate_third_party.py +56 -0
  40. pulumi_akamai/mtlstruststore_ca_set.py +654 -0
  41. pulumi_akamai/mtlstruststore_ca_set_activation.py +394 -0
  42. pulumi_akamai/outputs.py +12656 -10706
  43. pulumi_akamai/property_hostname_bucket.py +7 -7
  44. pulumi_akamai/pulumi-plugin.json +1 -1
  45. {pulumi_akamai-9.2.0a1759209024.dist-info → pulumi_akamai-10.2.0a1762837730.dist-info}/METADATA +1 -1
  46. {pulumi_akamai-9.2.0a1759209024.dist-info → pulumi_akamai-10.2.0a1762837730.dist-info}/RECORD +48 -18
  47. {pulumi_akamai-9.2.0a1759209024.dist-info → pulumi_akamai-10.2.0a1762837730.dist-info}/WHEEL +0 -0
  48. {pulumi_akamai-9.2.0a1759209024.dist-info → pulumi_akamai-10.2.0a1762837730.dist-info}/top_level.txt +0 -0
@@ -13,6 +13,8 @@ if sys.version_info >= (3, 11):
13
13
  else:
14
14
  from typing_extensions import NotRequired, TypedDict, TypeAlias
15
15
  from . import _utilities
16
+ from . import outputs
17
+ from ._inputs import *
16
18
 
17
19
  __all__ = ['AppSecIPGeoArgs', 'AppSecIPGeo']
18
20
 
@@ -22,33 +24,37 @@ class AppSecIPGeoArgs:
22
24
  config_id: pulumi.Input[_builtins.int],
23
25
  mode: pulumi.Input[_builtins.str],
24
26
  security_policy_id: pulumi.Input[_builtins.str],
25
- asn_network_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ asn_controls: Optional[pulumi.Input['AppSecIPGeoAsnControlsArgs']] = None,
28
+ block_action: Optional[pulumi.Input[_builtins.str]] = None,
26
29
  exception_ip_network_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
- geo_network_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
28
- ip_network_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
30
+ geo_controls: Optional[pulumi.Input['AppSecIPGeoGeoControlsArgs']] = None,
31
+ ip_controls: Optional[pulumi.Input['AppSecIPGeoIpControlsArgs']] = None,
29
32
  ukraine_geo_control_action: Optional[pulumi.Input[_builtins.str]] = None):
30
33
  """
31
34
  The set of arguments for constructing a AppSecIPGeo resource.
32
35
  :param pulumi.Input[_builtins.int] config_id: Unique identifier of the security configuration
33
36
  :param pulumi.Input[_builtins.str] mode: Protection mode (block or allow)
34
37
  :param pulumi.Input[_builtins.str] security_policy_id: Unique identifier of the security policy
35
- :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] asn_network_lists: List of IDs of ASN network list to be blocked
36
- :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] exception_ip_network_lists: List of IDs of network list that are always allowed
37
- :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] geo_network_lists: List of IDs of geographic network list to be blocked
38
- :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_network_lists: List of IDs of IP network list to be blocked
38
+ :param pulumi.Input['AppSecIPGeoAsnControlsArgs'] asn_controls: An Object containing List of ASN network lists to be blocked with specified action
39
+ :param pulumi.Input[_builtins.str] block_action: Specifies the action set for BLOCK Mode blocking all the traffic except from lists identified in exception_ip_network_lists
40
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] exception_ip_network_lists: List of unique identifiers of ip_network_lists allowed through the firewall.
41
+ :param pulumi.Input['AppSecIPGeoGeoControlsArgs'] geo_controls: An Object containing List of geographic network lists to be blocked with specified action
42
+ :param pulumi.Input['AppSecIPGeoIpControlsArgs'] ip_controls: An Object containing List of IP network lists to be blocked with specified action
39
43
  :param pulumi.Input[_builtins.str] ukraine_geo_control_action: Action set for Ukraine geo control
40
44
  """
41
45
  pulumi.set(__self__, "config_id", config_id)
42
46
  pulumi.set(__self__, "mode", mode)
43
47
  pulumi.set(__self__, "security_policy_id", security_policy_id)
44
- if asn_network_lists is not None:
45
- pulumi.set(__self__, "asn_network_lists", asn_network_lists)
48
+ if asn_controls is not None:
49
+ pulumi.set(__self__, "asn_controls", asn_controls)
50
+ if block_action is not None:
51
+ pulumi.set(__self__, "block_action", block_action)
46
52
  if exception_ip_network_lists is not None:
47
53
  pulumi.set(__self__, "exception_ip_network_lists", exception_ip_network_lists)
48
- if geo_network_lists is not None:
49
- pulumi.set(__self__, "geo_network_lists", geo_network_lists)
50
- if ip_network_lists is not None:
51
- pulumi.set(__self__, "ip_network_lists", ip_network_lists)
54
+ if geo_controls is not None:
55
+ pulumi.set(__self__, "geo_controls", geo_controls)
56
+ if ip_controls is not None:
57
+ pulumi.set(__self__, "ip_controls", ip_controls)
52
58
  if ukraine_geo_control_action is not None:
53
59
  pulumi.set(__self__, "ukraine_geo_control_action", ukraine_geo_control_action)
54
60
 
@@ -89,22 +95,34 @@ class AppSecIPGeoArgs:
89
95
  pulumi.set(self, "security_policy_id", value)
90
96
 
91
97
  @_builtins.property
92
- @pulumi.getter(name="asnNetworkLists")
93
- def asn_network_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
98
+ @pulumi.getter(name="asnControls")
99
+ def asn_controls(self) -> Optional[pulumi.Input['AppSecIPGeoAsnControlsArgs']]:
94
100
  """
95
- List of IDs of ASN network list to be blocked
101
+ An Object containing List of ASN network lists to be blocked with specified action
96
102
  """
97
- return pulumi.get(self, "asn_network_lists")
103
+ return pulumi.get(self, "asn_controls")
98
104
 
99
- @asn_network_lists.setter
100
- def asn_network_lists(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
101
- pulumi.set(self, "asn_network_lists", value)
105
+ @asn_controls.setter
106
+ def asn_controls(self, value: Optional[pulumi.Input['AppSecIPGeoAsnControlsArgs']]):
107
+ pulumi.set(self, "asn_controls", value)
108
+
109
+ @_builtins.property
110
+ @pulumi.getter(name="blockAction")
111
+ def block_action(self) -> Optional[pulumi.Input[_builtins.str]]:
112
+ """
113
+ Specifies the action set for BLOCK Mode blocking all the traffic except from lists identified in exception_ip_network_lists
114
+ """
115
+ return pulumi.get(self, "block_action")
116
+
117
+ @block_action.setter
118
+ def block_action(self, value: Optional[pulumi.Input[_builtins.str]]):
119
+ pulumi.set(self, "block_action", value)
102
120
 
103
121
  @_builtins.property
104
122
  @pulumi.getter(name="exceptionIpNetworkLists")
105
123
  def exception_ip_network_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
106
124
  """
107
- List of IDs of network list that are always allowed
125
+ List of unique identifiers of ip_network_lists allowed through the firewall.
108
126
  """
109
127
  return pulumi.get(self, "exception_ip_network_lists")
110
128
 
@@ -113,28 +131,28 @@ class AppSecIPGeoArgs:
113
131
  pulumi.set(self, "exception_ip_network_lists", value)
114
132
 
115
133
  @_builtins.property
116
- @pulumi.getter(name="geoNetworkLists")
117
- def geo_network_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
134
+ @pulumi.getter(name="geoControls")
135
+ def geo_controls(self) -> Optional[pulumi.Input['AppSecIPGeoGeoControlsArgs']]:
118
136
  """
119
- List of IDs of geographic network list to be blocked
137
+ An Object containing List of geographic network lists to be blocked with specified action
120
138
  """
121
- return pulumi.get(self, "geo_network_lists")
139
+ return pulumi.get(self, "geo_controls")
122
140
 
123
- @geo_network_lists.setter
124
- def geo_network_lists(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
125
- pulumi.set(self, "geo_network_lists", value)
141
+ @geo_controls.setter
142
+ def geo_controls(self, value: Optional[pulumi.Input['AppSecIPGeoGeoControlsArgs']]):
143
+ pulumi.set(self, "geo_controls", value)
126
144
 
127
145
  @_builtins.property
128
- @pulumi.getter(name="ipNetworkLists")
129
- def ip_network_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
146
+ @pulumi.getter(name="ipControls")
147
+ def ip_controls(self) -> Optional[pulumi.Input['AppSecIPGeoIpControlsArgs']]:
130
148
  """
131
- List of IDs of IP network list to be blocked
149
+ An Object containing List of IP network lists to be blocked with specified action
132
150
  """
133
- return pulumi.get(self, "ip_network_lists")
151
+ return pulumi.get(self, "ip_controls")
134
152
 
135
- @ip_network_lists.setter
136
- def ip_network_lists(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
137
- pulumi.set(self, "ip_network_lists", value)
153
+ @ip_controls.setter
154
+ def ip_controls(self, value: Optional[pulumi.Input['AppSecIPGeoIpControlsArgs']]):
155
+ pulumi.set(self, "ip_controls", value)
138
156
 
139
157
  @_builtins.property
140
158
  @pulumi.getter(name="ukraineGeoControlAction")
@@ -152,35 +170,39 @@ class AppSecIPGeoArgs:
152
170
  @pulumi.input_type
153
171
  class _AppSecIPGeoState:
154
172
  def __init__(__self__, *,
155
- asn_network_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
173
+ asn_controls: Optional[pulumi.Input['AppSecIPGeoAsnControlsArgs']] = None,
174
+ block_action: Optional[pulumi.Input[_builtins.str]] = None,
156
175
  config_id: Optional[pulumi.Input[_builtins.int]] = None,
157
176
  exception_ip_network_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
158
- geo_network_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
159
- ip_network_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
177
+ geo_controls: Optional[pulumi.Input['AppSecIPGeoGeoControlsArgs']] = None,
178
+ ip_controls: Optional[pulumi.Input['AppSecIPGeoIpControlsArgs']] = None,
160
179
  mode: Optional[pulumi.Input[_builtins.str]] = None,
161
180
  security_policy_id: Optional[pulumi.Input[_builtins.str]] = None,
162
181
  ukraine_geo_control_action: Optional[pulumi.Input[_builtins.str]] = None):
163
182
  """
164
183
  Input properties used for looking up and filtering AppSecIPGeo resources.
165
- :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] asn_network_lists: List of IDs of ASN network list to be blocked
184
+ :param pulumi.Input['AppSecIPGeoAsnControlsArgs'] asn_controls: An Object containing List of ASN network lists to be blocked with specified action
185
+ :param pulumi.Input[_builtins.str] block_action: Specifies the action set for BLOCK Mode blocking all the traffic except from lists identified in exception_ip_network_lists
166
186
  :param pulumi.Input[_builtins.int] config_id: Unique identifier of the security configuration
167
- :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] exception_ip_network_lists: List of IDs of network list that are always allowed
168
- :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] geo_network_lists: List of IDs of geographic network list to be blocked
169
- :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_network_lists: List of IDs of IP network list to be blocked
187
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] exception_ip_network_lists: List of unique identifiers of ip_network_lists allowed through the firewall.
188
+ :param pulumi.Input['AppSecIPGeoGeoControlsArgs'] geo_controls: An Object containing List of geographic network lists to be blocked with specified action
189
+ :param pulumi.Input['AppSecIPGeoIpControlsArgs'] ip_controls: An Object containing List of IP network lists to be blocked with specified action
170
190
  :param pulumi.Input[_builtins.str] mode: Protection mode (block or allow)
171
191
  :param pulumi.Input[_builtins.str] security_policy_id: Unique identifier of the security policy
172
192
  :param pulumi.Input[_builtins.str] ukraine_geo_control_action: Action set for Ukraine geo control
173
193
  """
174
- if asn_network_lists is not None:
175
- pulumi.set(__self__, "asn_network_lists", asn_network_lists)
194
+ if asn_controls is not None:
195
+ pulumi.set(__self__, "asn_controls", asn_controls)
196
+ if block_action is not None:
197
+ pulumi.set(__self__, "block_action", block_action)
176
198
  if config_id is not None:
177
199
  pulumi.set(__self__, "config_id", config_id)
178
200
  if exception_ip_network_lists is not None:
179
201
  pulumi.set(__self__, "exception_ip_network_lists", exception_ip_network_lists)
180
- if geo_network_lists is not None:
181
- pulumi.set(__self__, "geo_network_lists", geo_network_lists)
182
- if ip_network_lists is not None:
183
- pulumi.set(__self__, "ip_network_lists", ip_network_lists)
202
+ if geo_controls is not None:
203
+ pulumi.set(__self__, "geo_controls", geo_controls)
204
+ if ip_controls is not None:
205
+ pulumi.set(__self__, "ip_controls", ip_controls)
184
206
  if mode is not None:
185
207
  pulumi.set(__self__, "mode", mode)
186
208
  if security_policy_id is not None:
@@ -189,16 +211,28 @@ class _AppSecIPGeoState:
189
211
  pulumi.set(__self__, "ukraine_geo_control_action", ukraine_geo_control_action)
190
212
 
191
213
  @_builtins.property
192
- @pulumi.getter(name="asnNetworkLists")
193
- def asn_network_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
214
+ @pulumi.getter(name="asnControls")
215
+ def asn_controls(self) -> Optional[pulumi.Input['AppSecIPGeoAsnControlsArgs']]:
216
+ """
217
+ An Object containing List of ASN network lists to be blocked with specified action
218
+ """
219
+ return pulumi.get(self, "asn_controls")
220
+
221
+ @asn_controls.setter
222
+ def asn_controls(self, value: Optional[pulumi.Input['AppSecIPGeoAsnControlsArgs']]):
223
+ pulumi.set(self, "asn_controls", value)
224
+
225
+ @_builtins.property
226
+ @pulumi.getter(name="blockAction")
227
+ def block_action(self) -> Optional[pulumi.Input[_builtins.str]]:
194
228
  """
195
- List of IDs of ASN network list to be blocked
229
+ Specifies the action set for BLOCK Mode blocking all the traffic except from lists identified in exception_ip_network_lists
196
230
  """
197
- return pulumi.get(self, "asn_network_lists")
231
+ return pulumi.get(self, "block_action")
198
232
 
199
- @asn_network_lists.setter
200
- def asn_network_lists(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
201
- pulumi.set(self, "asn_network_lists", value)
233
+ @block_action.setter
234
+ def block_action(self, value: Optional[pulumi.Input[_builtins.str]]):
235
+ pulumi.set(self, "block_action", value)
202
236
 
203
237
  @_builtins.property
204
238
  @pulumi.getter(name="configId")
@@ -216,7 +250,7 @@ class _AppSecIPGeoState:
216
250
  @pulumi.getter(name="exceptionIpNetworkLists")
217
251
  def exception_ip_network_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
218
252
  """
219
- List of IDs of network list that are always allowed
253
+ List of unique identifiers of ip_network_lists allowed through the firewall.
220
254
  """
221
255
  return pulumi.get(self, "exception_ip_network_lists")
222
256
 
@@ -225,28 +259,28 @@ class _AppSecIPGeoState:
225
259
  pulumi.set(self, "exception_ip_network_lists", value)
226
260
 
227
261
  @_builtins.property
228
- @pulumi.getter(name="geoNetworkLists")
229
- def geo_network_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
262
+ @pulumi.getter(name="geoControls")
263
+ def geo_controls(self) -> Optional[pulumi.Input['AppSecIPGeoGeoControlsArgs']]:
230
264
  """
231
- List of IDs of geographic network list to be blocked
265
+ An Object containing List of geographic network lists to be blocked with specified action
232
266
  """
233
- return pulumi.get(self, "geo_network_lists")
267
+ return pulumi.get(self, "geo_controls")
234
268
 
235
- @geo_network_lists.setter
236
- def geo_network_lists(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
237
- pulumi.set(self, "geo_network_lists", value)
269
+ @geo_controls.setter
270
+ def geo_controls(self, value: Optional[pulumi.Input['AppSecIPGeoGeoControlsArgs']]):
271
+ pulumi.set(self, "geo_controls", value)
238
272
 
239
273
  @_builtins.property
240
- @pulumi.getter(name="ipNetworkLists")
241
- def ip_network_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
274
+ @pulumi.getter(name="ipControls")
275
+ def ip_controls(self) -> Optional[pulumi.Input['AppSecIPGeoIpControlsArgs']]:
242
276
  """
243
- List of IDs of IP network list to be blocked
277
+ An Object containing List of IP network lists to be blocked with specified action
244
278
  """
245
- return pulumi.get(self, "ip_network_lists")
279
+ return pulumi.get(self, "ip_controls")
246
280
 
247
- @ip_network_lists.setter
248
- def ip_network_lists(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
249
- pulumi.set(self, "ip_network_lists", value)
281
+ @ip_controls.setter
282
+ def ip_controls(self, value: Optional[pulumi.Input['AppSecIPGeoIpControlsArgs']]):
283
+ pulumi.set(self, "ip_controls", value)
250
284
 
251
285
  @_builtins.property
252
286
  @pulumi.getter
@@ -291,11 +325,12 @@ class AppSecIPGeo(pulumi.CustomResource):
291
325
  def __init__(__self__,
292
326
  resource_name: str,
293
327
  opts: Optional[pulumi.ResourceOptions] = None,
294
- asn_network_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
328
+ asn_controls: Optional[pulumi.Input[Union['AppSecIPGeoAsnControlsArgs', 'AppSecIPGeoAsnControlsArgsDict']]] = None,
329
+ block_action: Optional[pulumi.Input[_builtins.str]] = None,
295
330
  config_id: Optional[pulumi.Input[_builtins.int]] = None,
296
331
  exception_ip_network_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
297
- geo_network_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
298
- ip_network_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
332
+ geo_controls: Optional[pulumi.Input[Union['AppSecIPGeoGeoControlsArgs', 'AppSecIPGeoGeoControlsArgsDict']]] = None,
333
+ ip_controls: Optional[pulumi.Input[Union['AppSecIPGeoIpControlsArgs', 'AppSecIPGeoIpControlsArgsDict']]] = None,
299
334
  mode: Optional[pulumi.Input[_builtins.str]] = None,
300
335
  security_policy_id: Optional[pulumi.Input[_builtins.str]] = None,
301
336
  ukraine_geo_control_action: Optional[pulumi.Input[_builtins.str]] = None,
@@ -304,11 +339,12 @@ class AppSecIPGeo(pulumi.CustomResource):
304
339
  Create a AppSecIPGeo resource with the given unique name, props, and options.
305
340
  :param str resource_name: The name of the resource.
306
341
  :param pulumi.ResourceOptions opts: Options for the resource.
307
- :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] asn_network_lists: List of IDs of ASN network list to be blocked
342
+ :param pulumi.Input[Union['AppSecIPGeoAsnControlsArgs', 'AppSecIPGeoAsnControlsArgsDict']] asn_controls: An Object containing List of ASN network lists to be blocked with specified action
343
+ :param pulumi.Input[_builtins.str] block_action: Specifies the action set for BLOCK Mode blocking all the traffic except from lists identified in exception_ip_network_lists
308
344
  :param pulumi.Input[_builtins.int] config_id: Unique identifier of the security configuration
309
- :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] exception_ip_network_lists: List of IDs of network list that are always allowed
310
- :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] geo_network_lists: List of IDs of geographic network list to be blocked
311
- :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_network_lists: List of IDs of IP network list to be blocked
345
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] exception_ip_network_lists: List of unique identifiers of ip_network_lists allowed through the firewall.
346
+ :param pulumi.Input[Union['AppSecIPGeoGeoControlsArgs', 'AppSecIPGeoGeoControlsArgsDict']] geo_controls: An Object containing List of geographic network lists to be blocked with specified action
347
+ :param pulumi.Input[Union['AppSecIPGeoIpControlsArgs', 'AppSecIPGeoIpControlsArgsDict']] ip_controls: An Object containing List of IP network lists to be blocked with specified action
312
348
  :param pulumi.Input[_builtins.str] mode: Protection mode (block or allow)
313
349
  :param pulumi.Input[_builtins.str] security_policy_id: Unique identifier of the security policy
314
350
  :param pulumi.Input[_builtins.str] ukraine_geo_control_action: Action set for Ukraine geo control
@@ -336,11 +372,12 @@ class AppSecIPGeo(pulumi.CustomResource):
336
372
  def _internal_init(__self__,
337
373
  resource_name: str,
338
374
  opts: Optional[pulumi.ResourceOptions] = None,
339
- asn_network_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
375
+ asn_controls: Optional[pulumi.Input[Union['AppSecIPGeoAsnControlsArgs', 'AppSecIPGeoAsnControlsArgsDict']]] = None,
376
+ block_action: Optional[pulumi.Input[_builtins.str]] = None,
340
377
  config_id: Optional[pulumi.Input[_builtins.int]] = None,
341
378
  exception_ip_network_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
342
- geo_network_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
343
- ip_network_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
379
+ geo_controls: Optional[pulumi.Input[Union['AppSecIPGeoGeoControlsArgs', 'AppSecIPGeoGeoControlsArgsDict']]] = None,
380
+ ip_controls: Optional[pulumi.Input[Union['AppSecIPGeoIpControlsArgs', 'AppSecIPGeoIpControlsArgsDict']]] = None,
344
381
  mode: Optional[pulumi.Input[_builtins.str]] = None,
345
382
  security_policy_id: Optional[pulumi.Input[_builtins.str]] = None,
346
383
  ukraine_geo_control_action: Optional[pulumi.Input[_builtins.str]] = None,
@@ -353,13 +390,14 @@ class AppSecIPGeo(pulumi.CustomResource):
353
390
  raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
354
391
  __props__ = AppSecIPGeoArgs.__new__(AppSecIPGeoArgs)
355
392
 
356
- __props__.__dict__["asn_network_lists"] = asn_network_lists
393
+ __props__.__dict__["asn_controls"] = asn_controls
394
+ __props__.__dict__["block_action"] = block_action
357
395
  if config_id is None and not opts.urn:
358
396
  raise TypeError("Missing required property 'config_id'")
359
397
  __props__.__dict__["config_id"] = config_id
360
398
  __props__.__dict__["exception_ip_network_lists"] = exception_ip_network_lists
361
- __props__.__dict__["geo_network_lists"] = geo_network_lists
362
- __props__.__dict__["ip_network_lists"] = ip_network_lists
399
+ __props__.__dict__["geo_controls"] = geo_controls
400
+ __props__.__dict__["ip_controls"] = ip_controls
363
401
  if mode is None and not opts.urn:
364
402
  raise TypeError("Missing required property 'mode'")
365
403
  __props__.__dict__["mode"] = mode
@@ -377,11 +415,12 @@ class AppSecIPGeo(pulumi.CustomResource):
377
415
  def get(resource_name: str,
378
416
  id: pulumi.Input[str],
379
417
  opts: Optional[pulumi.ResourceOptions] = None,
380
- asn_network_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
418
+ asn_controls: Optional[pulumi.Input[Union['AppSecIPGeoAsnControlsArgs', 'AppSecIPGeoAsnControlsArgsDict']]] = None,
419
+ block_action: Optional[pulumi.Input[_builtins.str]] = None,
381
420
  config_id: Optional[pulumi.Input[_builtins.int]] = None,
382
421
  exception_ip_network_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
383
- geo_network_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
384
- ip_network_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
422
+ geo_controls: Optional[pulumi.Input[Union['AppSecIPGeoGeoControlsArgs', 'AppSecIPGeoGeoControlsArgsDict']]] = None,
423
+ ip_controls: Optional[pulumi.Input[Union['AppSecIPGeoIpControlsArgs', 'AppSecIPGeoIpControlsArgsDict']]] = None,
385
424
  mode: Optional[pulumi.Input[_builtins.str]] = None,
386
425
  security_policy_id: Optional[pulumi.Input[_builtins.str]] = None,
387
426
  ukraine_geo_control_action: Optional[pulumi.Input[_builtins.str]] = None) -> 'AppSecIPGeo':
@@ -392,11 +431,12 @@ class AppSecIPGeo(pulumi.CustomResource):
392
431
  :param str resource_name: The unique name of the resulting resource.
393
432
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
394
433
  :param pulumi.ResourceOptions opts: Options for the resource.
395
- :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] asn_network_lists: List of IDs of ASN network list to be blocked
434
+ :param pulumi.Input[Union['AppSecIPGeoAsnControlsArgs', 'AppSecIPGeoAsnControlsArgsDict']] asn_controls: An Object containing List of ASN network lists to be blocked with specified action
435
+ :param pulumi.Input[_builtins.str] block_action: Specifies the action set for BLOCK Mode blocking all the traffic except from lists identified in exception_ip_network_lists
396
436
  :param pulumi.Input[_builtins.int] config_id: Unique identifier of the security configuration
397
- :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] exception_ip_network_lists: List of IDs of network list that are always allowed
398
- :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] geo_network_lists: List of IDs of geographic network list to be blocked
399
- :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_network_lists: List of IDs of IP network list to be blocked
437
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] exception_ip_network_lists: List of unique identifiers of ip_network_lists allowed through the firewall.
438
+ :param pulumi.Input[Union['AppSecIPGeoGeoControlsArgs', 'AppSecIPGeoGeoControlsArgsDict']] geo_controls: An Object containing List of geographic network lists to be blocked with specified action
439
+ :param pulumi.Input[Union['AppSecIPGeoIpControlsArgs', 'AppSecIPGeoIpControlsArgsDict']] ip_controls: An Object containing List of IP network lists to be blocked with specified action
400
440
  :param pulumi.Input[_builtins.str] mode: Protection mode (block or allow)
401
441
  :param pulumi.Input[_builtins.str] security_policy_id: Unique identifier of the security policy
402
442
  :param pulumi.Input[_builtins.str] ukraine_geo_control_action: Action set for Ukraine geo control
@@ -405,23 +445,32 @@ class AppSecIPGeo(pulumi.CustomResource):
405
445
 
406
446
  __props__ = _AppSecIPGeoState.__new__(_AppSecIPGeoState)
407
447
 
408
- __props__.__dict__["asn_network_lists"] = asn_network_lists
448
+ __props__.__dict__["asn_controls"] = asn_controls
449
+ __props__.__dict__["block_action"] = block_action
409
450
  __props__.__dict__["config_id"] = config_id
410
451
  __props__.__dict__["exception_ip_network_lists"] = exception_ip_network_lists
411
- __props__.__dict__["geo_network_lists"] = geo_network_lists
412
- __props__.__dict__["ip_network_lists"] = ip_network_lists
452
+ __props__.__dict__["geo_controls"] = geo_controls
453
+ __props__.__dict__["ip_controls"] = ip_controls
413
454
  __props__.__dict__["mode"] = mode
414
455
  __props__.__dict__["security_policy_id"] = security_policy_id
415
456
  __props__.__dict__["ukraine_geo_control_action"] = ukraine_geo_control_action
416
457
  return AppSecIPGeo(resource_name, opts=opts, __props__=__props__)
417
458
 
418
459
  @_builtins.property
419
- @pulumi.getter(name="asnNetworkLists")
420
- def asn_network_lists(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
460
+ @pulumi.getter(name="asnControls")
461
+ def asn_controls(self) -> pulumi.Output[Optional['outputs.AppSecIPGeoAsnControls']]:
462
+ """
463
+ An Object containing List of ASN network lists to be blocked with specified action
464
+ """
465
+ return pulumi.get(self, "asn_controls")
466
+
467
+ @_builtins.property
468
+ @pulumi.getter(name="blockAction")
469
+ def block_action(self) -> pulumi.Output[Optional[_builtins.str]]:
421
470
  """
422
- List of IDs of ASN network list to be blocked
471
+ Specifies the action set for BLOCK Mode blocking all the traffic except from lists identified in exception_ip_network_lists
423
472
  """
424
- return pulumi.get(self, "asn_network_lists")
473
+ return pulumi.get(self, "block_action")
425
474
 
426
475
  @_builtins.property
427
476
  @pulumi.getter(name="configId")
@@ -435,25 +484,25 @@ class AppSecIPGeo(pulumi.CustomResource):
435
484
  @pulumi.getter(name="exceptionIpNetworkLists")
436
485
  def exception_ip_network_lists(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
437
486
  """
438
- List of IDs of network list that are always allowed
487
+ List of unique identifiers of ip_network_lists allowed through the firewall.
439
488
  """
440
489
  return pulumi.get(self, "exception_ip_network_lists")
441
490
 
442
491
  @_builtins.property
443
- @pulumi.getter(name="geoNetworkLists")
444
- def geo_network_lists(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
492
+ @pulumi.getter(name="geoControls")
493
+ def geo_controls(self) -> pulumi.Output[Optional['outputs.AppSecIPGeoGeoControls']]:
445
494
  """
446
- List of IDs of geographic network list to be blocked
495
+ An Object containing List of geographic network lists to be blocked with specified action
447
496
  """
448
- return pulumi.get(self, "geo_network_lists")
497
+ return pulumi.get(self, "geo_controls")
449
498
 
450
499
  @_builtins.property
451
- @pulumi.getter(name="ipNetworkLists")
452
- def ip_network_lists(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
500
+ @pulumi.getter(name="ipControls")
501
+ def ip_controls(self) -> pulumi.Output[Optional['outputs.AppSecIPGeoIpControls']]:
453
502
  """
454
- List of IDs of IP network list to be blocked
503
+ An Object containing List of IP network lists to be blocked with specified action
455
504
  """
456
- return pulumi.get(self, "ip_network_lists")
505
+ return pulumi.get(self, "ip_controls")
457
506
 
458
507
  @_builtins.property
459
508
  @pulumi.getter
@@ -473,7 +522,7 @@ class AppSecIPGeo(pulumi.CustomResource):
473
522
 
474
523
  @_builtins.property
475
524
  @pulumi.getter(name="ukraineGeoControlAction")
476
- def ukraine_geo_control_action(self) -> pulumi.Output[Optional[_builtins.str]]:
525
+ def ukraine_geo_control_action(self) -> pulumi.Output[_builtins.str]:
477
526
  """
478
527
  Action set for Ukraine geo control
479
528
  """
@@ -27,6 +27,7 @@ class AppSecSiemSettingsArgs:
27
27
  siem_id: pulumi.Input[_builtins.int],
28
28
  enable_botman_siem: Optional[pulumi.Input[_builtins.bool]] = None,
29
29
  exceptions: Optional[pulumi.Input['AppSecSiemSettingsExceptionsArgs']] = None,
30
+ include_ja4_fingerprint_to_siem: Optional[pulumi.Input[_builtins.bool]] = None,
30
31
  security_policy_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
31
32
  """
32
33
  The set of arguments for constructing a AppSecSiemSettings resource.
@@ -36,6 +37,7 @@ class AppSecSiemSettingsArgs:
36
37
  :param pulumi.Input[_builtins.int] siem_id: Unique identifier of the SIEM settings being modified
37
38
  :param pulumi.Input[_builtins.bool] enable_botman_siem: Whether Bot Manager events should be included in SIEM events
38
39
  :param pulumi.Input['AppSecSiemSettingsExceptionsArgs'] exceptions: Describes all the protections and actions to be excluded from SIEM events
40
+ :param pulumi.Input[_builtins.bool] include_ja4_fingerprint_to_siem: Whether JA4 Fingerprint should be included in SIEM events
39
41
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] security_policy_ids: List of IDs of security policy for which SIEM integration is to be enabled
40
42
  """
41
43
  pulumi.set(__self__, "config_id", config_id)
@@ -46,6 +48,8 @@ class AppSecSiemSettingsArgs:
46
48
  pulumi.set(__self__, "enable_botman_siem", enable_botman_siem)
47
49
  if exceptions is not None:
48
50
  pulumi.set(__self__, "exceptions", exceptions)
51
+ if include_ja4_fingerprint_to_siem is not None:
52
+ pulumi.set(__self__, "include_ja4_fingerprint_to_siem", include_ja4_fingerprint_to_siem)
49
53
  if security_policy_ids is not None:
50
54
  pulumi.set(__self__, "security_policy_ids", security_policy_ids)
51
55
 
@@ -121,6 +125,18 @@ class AppSecSiemSettingsArgs:
121
125
  def exceptions(self, value: Optional[pulumi.Input['AppSecSiemSettingsExceptionsArgs']]):
122
126
  pulumi.set(self, "exceptions", value)
123
127
 
128
+ @_builtins.property
129
+ @pulumi.getter(name="includeJa4FingerprintToSiem")
130
+ def include_ja4_fingerprint_to_siem(self) -> Optional[pulumi.Input[_builtins.bool]]:
131
+ """
132
+ Whether JA4 Fingerprint should be included in SIEM events
133
+ """
134
+ return pulumi.get(self, "include_ja4_fingerprint_to_siem")
135
+
136
+ @include_ja4_fingerprint_to_siem.setter
137
+ def include_ja4_fingerprint_to_siem(self, value: Optional[pulumi.Input[_builtins.bool]]):
138
+ pulumi.set(self, "include_ja4_fingerprint_to_siem", value)
139
+
124
140
  @_builtins.property
125
141
  @pulumi.getter(name="securityPolicyIds")
126
142
  def security_policy_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
@@ -142,6 +158,7 @@ class _AppSecSiemSettingsState:
142
158
  enable_for_all_policies: Optional[pulumi.Input[_builtins.bool]] = None,
143
159
  enable_siem: Optional[pulumi.Input[_builtins.bool]] = None,
144
160
  exceptions: Optional[pulumi.Input['AppSecSiemSettingsExceptionsArgs']] = None,
161
+ include_ja4_fingerprint_to_siem: Optional[pulumi.Input[_builtins.bool]] = None,
145
162
  security_policy_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
146
163
  siem_id: Optional[pulumi.Input[_builtins.int]] = None):
147
164
  """
@@ -151,6 +168,7 @@ class _AppSecSiemSettingsState:
151
168
  :param pulumi.Input[_builtins.bool] enable_for_all_policies: Whether to enable SIEM on all security policies in the security configuration
152
169
  :param pulumi.Input[_builtins.bool] enable_siem: Whether to enable SIEM
153
170
  :param pulumi.Input['AppSecSiemSettingsExceptionsArgs'] exceptions: Describes all the protections and actions to be excluded from SIEM events
171
+ :param pulumi.Input[_builtins.bool] include_ja4_fingerprint_to_siem: Whether JA4 Fingerprint should be included in SIEM events
154
172
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] security_policy_ids: List of IDs of security policy for which SIEM integration is to be enabled
155
173
  :param pulumi.Input[_builtins.int] siem_id: Unique identifier of the SIEM settings being modified
156
174
  """
@@ -164,6 +182,8 @@ class _AppSecSiemSettingsState:
164
182
  pulumi.set(__self__, "enable_siem", enable_siem)
165
183
  if exceptions is not None:
166
184
  pulumi.set(__self__, "exceptions", exceptions)
185
+ if include_ja4_fingerprint_to_siem is not None:
186
+ pulumi.set(__self__, "include_ja4_fingerprint_to_siem", include_ja4_fingerprint_to_siem)
167
187
  if security_policy_ids is not None:
168
188
  pulumi.set(__self__, "security_policy_ids", security_policy_ids)
169
189
  if siem_id is not None:
@@ -229,6 +249,18 @@ class _AppSecSiemSettingsState:
229
249
  def exceptions(self, value: Optional[pulumi.Input['AppSecSiemSettingsExceptionsArgs']]):
230
250
  pulumi.set(self, "exceptions", value)
231
251
 
252
+ @_builtins.property
253
+ @pulumi.getter(name="includeJa4FingerprintToSiem")
254
+ def include_ja4_fingerprint_to_siem(self) -> Optional[pulumi.Input[_builtins.bool]]:
255
+ """
256
+ Whether JA4 Fingerprint should be included in SIEM events
257
+ """
258
+ return pulumi.get(self, "include_ja4_fingerprint_to_siem")
259
+
260
+ @include_ja4_fingerprint_to_siem.setter
261
+ def include_ja4_fingerprint_to_siem(self, value: Optional[pulumi.Input[_builtins.bool]]):
262
+ pulumi.set(self, "include_ja4_fingerprint_to_siem", value)
263
+
232
264
  @_builtins.property
233
265
  @pulumi.getter(name="securityPolicyIds")
234
266
  def security_policy_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
@@ -265,6 +297,7 @@ class AppSecSiemSettings(pulumi.CustomResource):
265
297
  enable_for_all_policies: Optional[pulumi.Input[_builtins.bool]] = None,
266
298
  enable_siem: Optional[pulumi.Input[_builtins.bool]] = None,
267
299
  exceptions: Optional[pulumi.Input[Union['AppSecSiemSettingsExceptionsArgs', 'AppSecSiemSettingsExceptionsArgsDict']]] = None,
300
+ include_ja4_fingerprint_to_siem: Optional[pulumi.Input[_builtins.bool]] = None,
268
301
  security_policy_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
269
302
  siem_id: Optional[pulumi.Input[_builtins.int]] = None,
270
303
  __props__=None):
@@ -277,6 +310,7 @@ class AppSecSiemSettings(pulumi.CustomResource):
277
310
  :param pulumi.Input[_builtins.bool] enable_for_all_policies: Whether to enable SIEM on all security policies in the security configuration
278
311
  :param pulumi.Input[_builtins.bool] enable_siem: Whether to enable SIEM
279
312
  :param pulumi.Input[Union['AppSecSiemSettingsExceptionsArgs', 'AppSecSiemSettingsExceptionsArgsDict']] exceptions: Describes all the protections and actions to be excluded from SIEM events
313
+ :param pulumi.Input[_builtins.bool] include_ja4_fingerprint_to_siem: Whether JA4 Fingerprint should be included in SIEM events
280
314
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] security_policy_ids: List of IDs of security policy for which SIEM integration is to be enabled
281
315
  :param pulumi.Input[_builtins.int] siem_id: Unique identifier of the SIEM settings being modified
282
316
  """
@@ -308,6 +342,7 @@ class AppSecSiemSettings(pulumi.CustomResource):
308
342
  enable_for_all_policies: Optional[pulumi.Input[_builtins.bool]] = None,
309
343
  enable_siem: Optional[pulumi.Input[_builtins.bool]] = None,
310
344
  exceptions: Optional[pulumi.Input[Union['AppSecSiemSettingsExceptionsArgs', 'AppSecSiemSettingsExceptionsArgsDict']]] = None,
345
+ include_ja4_fingerprint_to_siem: Optional[pulumi.Input[_builtins.bool]] = None,
311
346
  security_policy_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
312
347
  siem_id: Optional[pulumi.Input[_builtins.int]] = None,
313
348
  __props__=None):
@@ -330,6 +365,7 @@ class AppSecSiemSettings(pulumi.CustomResource):
330
365
  raise TypeError("Missing required property 'enable_siem'")
331
366
  __props__.__dict__["enable_siem"] = enable_siem
332
367
  __props__.__dict__["exceptions"] = exceptions
368
+ __props__.__dict__["include_ja4_fingerprint_to_siem"] = include_ja4_fingerprint_to_siem
333
369
  __props__.__dict__["security_policy_ids"] = security_policy_ids
334
370
  if siem_id is None and not opts.urn:
335
371
  raise TypeError("Missing required property 'siem_id'")
@@ -349,6 +385,7 @@ class AppSecSiemSettings(pulumi.CustomResource):
349
385
  enable_for_all_policies: Optional[pulumi.Input[_builtins.bool]] = None,
350
386
  enable_siem: Optional[pulumi.Input[_builtins.bool]] = None,
351
387
  exceptions: Optional[pulumi.Input[Union['AppSecSiemSettingsExceptionsArgs', 'AppSecSiemSettingsExceptionsArgsDict']]] = None,
388
+ include_ja4_fingerprint_to_siem: Optional[pulumi.Input[_builtins.bool]] = None,
352
389
  security_policy_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
353
390
  siem_id: Optional[pulumi.Input[_builtins.int]] = None) -> 'AppSecSiemSettings':
354
391
  """
@@ -363,6 +400,7 @@ class AppSecSiemSettings(pulumi.CustomResource):
363
400
  :param pulumi.Input[_builtins.bool] enable_for_all_policies: Whether to enable SIEM on all security policies in the security configuration
364
401
  :param pulumi.Input[_builtins.bool] enable_siem: Whether to enable SIEM
365
402
  :param pulumi.Input[Union['AppSecSiemSettingsExceptionsArgs', 'AppSecSiemSettingsExceptionsArgsDict']] exceptions: Describes all the protections and actions to be excluded from SIEM events
403
+ :param pulumi.Input[_builtins.bool] include_ja4_fingerprint_to_siem: Whether JA4 Fingerprint should be included in SIEM events
366
404
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] security_policy_ids: List of IDs of security policy for which SIEM integration is to be enabled
367
405
  :param pulumi.Input[_builtins.int] siem_id: Unique identifier of the SIEM settings being modified
368
406
  """
@@ -375,6 +413,7 @@ class AppSecSiemSettings(pulumi.CustomResource):
375
413
  __props__.__dict__["enable_for_all_policies"] = enable_for_all_policies
376
414
  __props__.__dict__["enable_siem"] = enable_siem
377
415
  __props__.__dict__["exceptions"] = exceptions
416
+ __props__.__dict__["include_ja4_fingerprint_to_siem"] = include_ja4_fingerprint_to_siem
378
417
  __props__.__dict__["security_policy_ids"] = security_policy_ids
379
418
  __props__.__dict__["siem_id"] = siem_id
380
419
  return AppSecSiemSettings(resource_name, opts=opts, __props__=__props__)
@@ -419,6 +458,14 @@ class AppSecSiemSettings(pulumi.CustomResource):
419
458
  """
420
459
  return pulumi.get(self, "exceptions")
421
460
 
461
+ @_builtins.property
462
+ @pulumi.getter(name="includeJa4FingerprintToSiem")
463
+ def include_ja4_fingerprint_to_siem(self) -> pulumi.Output[Optional[_builtins.bool]]:
464
+ """
465
+ Whether JA4 Fingerprint should be included in SIEM events
466
+ """
467
+ return pulumi.get(self, "include_ja4_fingerprint_to_siem")
468
+
422
469
  @_builtins.property
423
470
  @pulumi.getter(name="securityPolicyIds")
424
471
  def security_policy_ids(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]: