pulumi-azure-native 2.66.0a1728396986__py3-none-any.whl → 2.66.0a1728463590__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-azure-native might be problematic. Click here for more details.
- pulumi_azure_native/__init__.py +66 -0
- pulumi_azure_native/app/__init__.py +3 -0
- pulumi_azure_native/app/app_resiliency.py +3 -3
- pulumi_azure_native/app/build.py +3 -3
- pulumi_azure_native/app/builder.py +3 -3
- pulumi_azure_native/app/certificate.py +3 -3
- pulumi_azure_native/app/connected_environment.py +3 -3
- pulumi_azure_native/app/connected_environments_certificate.py +3 -3
- pulumi_azure_native/app/connected_environments_dapr_component.py +3 -3
- pulumi_azure_native/app/connected_environments_storage.py +3 -3
- pulumi_azure_native/app/container_app.py +3 -3
- pulumi_azure_native/app/container_apps_auth_config.py +3 -3
- pulumi_azure_native/app/container_apps_session_pool.py +5 -1
- pulumi_azure_native/app/container_apps_source_control.py +3 -3
- pulumi_azure_native/app/dapr_component.py +3 -3
- pulumi_azure_native/app/dapr_component_resiliency_policy.py +3 -3
- pulumi_azure_native/app/dapr_subscription.py +3 -3
- pulumi_azure_native/app/dot_net_component.py +3 -3
- pulumi_azure_native/app/get_app_resiliency.py +2 -2
- pulumi_azure_native/app/get_build.py +2 -2
- pulumi_azure_native/app/get_builder.py +2 -2
- pulumi_azure_native/app/get_certificate.py +2 -2
- pulumi_azure_native/app/get_connected_environment.py +2 -2
- pulumi_azure_native/app/get_connected_environments_certificate.py +2 -2
- pulumi_azure_native/app/get_connected_environments_dapr_component.py +2 -2
- pulumi_azure_native/app/get_connected_environments_storage.py +2 -2
- pulumi_azure_native/app/get_container_app.py +2 -2
- pulumi_azure_native/app/get_container_app_auth_token.py +2 -2
- pulumi_azure_native/app/get_container_apps_auth_config.py +2 -2
- pulumi_azure_native/app/get_container_apps_session_pool.py +4 -0
- pulumi_azure_native/app/get_container_apps_source_control.py +2 -2
- pulumi_azure_native/app/get_custom_domain_verification_id.py +2 -2
- pulumi_azure_native/app/get_dapr_component.py +2 -2
- pulumi_azure_native/app/get_dapr_component_resiliency_policy.py +2 -2
- pulumi_azure_native/app/get_dapr_subscription.py +2 -2
- pulumi_azure_native/app/get_dot_net_component.py +2 -2
- pulumi_azure_native/app/get_java_component.py +2 -2
- pulumi_azure_native/app/get_job.py +2 -2
- pulumi_azure_native/app/get_logic_app.py +4 -0
- pulumi_azure_native/app/get_managed_certificate.py +2 -2
- pulumi_azure_native/app/get_managed_environment.py +2 -2
- pulumi_azure_native/app/get_managed_environment_auth_token.py +2 -2
- pulumi_azure_native/app/get_managed_environment_private_endpoint_connection.py +4 -0
- pulumi_azure_native/app/get_managed_environments_storage.py +2 -2
- pulumi_azure_native/app/java_component.py +3 -3
- pulumi_azure_native/app/job.py +3 -3
- pulumi_azure_native/app/list_build_auth_token.py +2 -2
- pulumi_azure_native/app/list_connected_environments_dapr_component_secrets.py +2 -2
- pulumi_azure_native/app/list_container_app_custom_host_name_analysis.py +2 -2
- pulumi_azure_native/app/list_container_app_secrets.py +2 -2
- pulumi_azure_native/app/list_dapr_component_secrets.py +2 -2
- pulumi_azure_native/app/list_job_secrets.py +2 -2
- pulumi_azure_native/app/list_logic_app_workflows_connections.py +4 -0
- pulumi_azure_native/app/logic_app.py +5 -1
- pulumi_azure_native/app/managed_certificate.py +3 -3
- pulumi_azure_native/app/managed_environment.py +3 -3
- pulumi_azure_native/app/managed_environment_private_endpoint_connection.py +5 -1
- pulumi_azure_native/app/managed_environments_storage.py +3 -3
- pulumi_azure_native/app/v20220101preview/certificate.py +1 -1
- pulumi_azure_native/app/v20220101preview/container_app.py +1 -1
- pulumi_azure_native/app/v20220101preview/container_apps_auth_config.py +1 -1
- pulumi_azure_native/app/v20220101preview/container_apps_source_control.py +1 -1
- pulumi_azure_native/app/v20220101preview/dapr_component.py +1 -1
- pulumi_azure_native/app/v20220101preview/managed_environment.py +1 -1
- pulumi_azure_native/app/v20220101preview/managed_environments_storage.py +1 -1
- pulumi_azure_native/app/v20221001/certificate.py +1 -1
- pulumi_azure_native/app/v20221001/connected_environment.py +1 -1
- pulumi_azure_native/app/v20221001/connected_environments_certificate.py +1 -1
- pulumi_azure_native/app/v20221001/connected_environments_dapr_component.py +1 -1
- pulumi_azure_native/app/v20221001/connected_environments_storage.py +1 -1
- pulumi_azure_native/app/v20221001/container_app.py +1 -1
- pulumi_azure_native/app/v20221001/container_apps_auth_config.py +1 -1
- pulumi_azure_native/app/v20221001/container_apps_source_control.py +1 -1
- pulumi_azure_native/app/v20221001/dapr_component.py +1 -1
- pulumi_azure_native/app/v20221001/managed_environment.py +1 -1
- pulumi_azure_native/app/v20221001/managed_environments_storage.py +1 -1
- pulumi_azure_native/app/v20230401preview/certificate.py +1 -1
- pulumi_azure_native/app/v20230401preview/connected_environment.py +1 -1
- pulumi_azure_native/app/v20230401preview/connected_environments_certificate.py +1 -1
- pulumi_azure_native/app/v20230401preview/connected_environments_dapr_component.py +1 -1
- pulumi_azure_native/app/v20230401preview/connected_environments_storage.py +1 -1
- pulumi_azure_native/app/v20230401preview/container_app.py +1 -1
- pulumi_azure_native/app/v20230401preview/container_apps_auth_config.py +1 -1
- pulumi_azure_native/app/v20230401preview/container_apps_source_control.py +1 -1
- pulumi_azure_native/app/v20230401preview/dapr_component.py +1 -1
- pulumi_azure_native/app/v20230401preview/job.py +1 -1
- pulumi_azure_native/app/v20230401preview/managed_certificate.py +1 -1
- pulumi_azure_native/app/v20230401preview/managed_environment.py +1 -1
- pulumi_azure_native/app/v20230401preview/managed_environments_storage.py +1 -1
- pulumi_azure_native/app/v20230501/certificate.py +1 -1
- pulumi_azure_native/app/v20230501/connected_environment.py +1 -1
- pulumi_azure_native/app/v20230501/connected_environments_certificate.py +1 -1
- pulumi_azure_native/app/v20230501/connected_environments_dapr_component.py +1 -1
- pulumi_azure_native/app/v20230501/connected_environments_storage.py +1 -1
- pulumi_azure_native/app/v20230501/container_app.py +1 -1
- pulumi_azure_native/app/v20230501/container_apps_auth_config.py +1 -1
- pulumi_azure_native/app/v20230501/container_apps_source_control.py +1 -1
- pulumi_azure_native/app/v20230501/dapr_component.py +1 -1
- pulumi_azure_native/app/v20230501/job.py +1 -1
- pulumi_azure_native/app/v20230501/managed_certificate.py +1 -1
- pulumi_azure_native/app/v20230501/managed_environment.py +1 -1
- pulumi_azure_native/app/v20230501/managed_environments_storage.py +1 -1
- pulumi_azure_native/app/v20230502preview/certificate.py +1 -1
- pulumi_azure_native/app/v20230502preview/connected_environment.py +1 -1
- pulumi_azure_native/app/v20230502preview/connected_environments_certificate.py +1 -1
- pulumi_azure_native/app/v20230502preview/connected_environments_dapr_component.py +1 -1
- pulumi_azure_native/app/v20230502preview/connected_environments_storage.py +1 -1
- pulumi_azure_native/app/v20230502preview/container_app.py +1 -1
- pulumi_azure_native/app/v20230502preview/container_apps_auth_config.py +1 -1
- pulumi_azure_native/app/v20230502preview/container_apps_source_control.py +1 -1
- pulumi_azure_native/app/v20230502preview/dapr_component.py +1 -1
- pulumi_azure_native/app/v20230502preview/job.py +1 -1
- pulumi_azure_native/app/v20230502preview/managed_certificate.py +1 -1
- pulumi_azure_native/app/v20230502preview/managed_environment.py +1 -1
- pulumi_azure_native/app/v20230502preview/managed_environments_storage.py +1 -1
- pulumi_azure_native/app/v20230801preview/app_resiliency.py +1 -1
- pulumi_azure_native/app/v20230801preview/build.py +1 -1
- pulumi_azure_native/app/v20230801preview/builder.py +1 -1
- pulumi_azure_native/app/v20230801preview/certificate.py +1 -1
- pulumi_azure_native/app/v20230801preview/connected_environment.py +1 -1
- pulumi_azure_native/app/v20230801preview/connected_environments_certificate.py +1 -1
- pulumi_azure_native/app/v20230801preview/connected_environments_dapr_component.py +1 -1
- pulumi_azure_native/app/v20230801preview/connected_environments_storage.py +1 -1
- pulumi_azure_native/app/v20230801preview/container_app.py +1 -1
- pulumi_azure_native/app/v20230801preview/container_apps_auth_config.py +1 -1
- pulumi_azure_native/app/v20230801preview/container_apps_source_control.py +1 -1
- pulumi_azure_native/app/v20230801preview/dapr_component.py +1 -1
- pulumi_azure_native/app/v20230801preview/dapr_component_resiliency_policy.py +1 -1
- pulumi_azure_native/app/v20230801preview/dapr_subscription.py +1 -1
- pulumi_azure_native/app/v20230801preview/job.py +1 -1
- pulumi_azure_native/app/v20230801preview/managed_certificate.py +1 -1
- pulumi_azure_native/app/v20230801preview/managed_environment.py +1 -1
- pulumi_azure_native/app/v20230801preview/managed_environments_storage.py +1 -1
- pulumi_azure_native/app/v20231102preview/app_resiliency.py +1 -1
- pulumi_azure_native/app/v20231102preview/build.py +1 -1
- pulumi_azure_native/app/v20231102preview/builder.py +1 -1
- pulumi_azure_native/app/v20231102preview/certificate.py +1 -1
- pulumi_azure_native/app/v20231102preview/connected_environment.py +1 -1
- pulumi_azure_native/app/v20231102preview/connected_environments_certificate.py +1 -1
- pulumi_azure_native/app/v20231102preview/connected_environments_dapr_component.py +1 -1
- pulumi_azure_native/app/v20231102preview/connected_environments_storage.py +1 -1
- pulumi_azure_native/app/v20231102preview/container_app.py +1 -1
- pulumi_azure_native/app/v20231102preview/container_apps_auth_config.py +1 -1
- pulumi_azure_native/app/v20231102preview/container_apps_source_control.py +1 -1
- pulumi_azure_native/app/v20231102preview/dapr_component.py +1 -1
- pulumi_azure_native/app/v20231102preview/dapr_component_resiliency_policy.py +1 -1
- pulumi_azure_native/app/v20231102preview/dapr_subscription.py +1 -1
- pulumi_azure_native/app/v20231102preview/dot_net_component.py +1 -1
- pulumi_azure_native/app/v20231102preview/java_component.py +1 -1
- pulumi_azure_native/app/v20231102preview/job.py +1 -1
- pulumi_azure_native/app/v20231102preview/managed_certificate.py +1 -1
- pulumi_azure_native/app/v20231102preview/managed_environment.py +1 -1
- pulumi_azure_native/app/v20231102preview/managed_environments_storage.py +1 -1
- pulumi_azure_native/app/v20240202preview/app_resiliency.py +1 -1
- pulumi_azure_native/app/v20240202preview/build.py +1 -1
- pulumi_azure_native/app/v20240202preview/builder.py +1 -1
- pulumi_azure_native/app/v20240202preview/certificate.py +1 -1
- pulumi_azure_native/app/v20240202preview/connected_environment.py +1 -1
- pulumi_azure_native/app/v20240202preview/connected_environments_certificate.py +1 -1
- pulumi_azure_native/app/v20240202preview/connected_environments_dapr_component.py +1 -1
- pulumi_azure_native/app/v20240202preview/connected_environments_storage.py +1 -1
- pulumi_azure_native/app/v20240202preview/container_app.py +1 -1
- pulumi_azure_native/app/v20240202preview/container_apps_auth_config.py +1 -1
- pulumi_azure_native/app/v20240202preview/container_apps_session_pool.py +1 -1
- pulumi_azure_native/app/v20240202preview/container_apps_source_control.py +1 -1
- pulumi_azure_native/app/v20240202preview/dapr_component.py +1 -1
- pulumi_azure_native/app/v20240202preview/dapr_component_resiliency_policy.py +1 -1
- pulumi_azure_native/app/v20240202preview/dapr_subscription.py +1 -1
- pulumi_azure_native/app/v20240202preview/dot_net_component.py +1 -1
- pulumi_azure_native/app/v20240202preview/java_component.py +1 -1
- pulumi_azure_native/app/v20240202preview/job.py +1 -1
- pulumi_azure_native/app/v20240202preview/logic_app.py +1 -1
- pulumi_azure_native/app/v20240202preview/managed_certificate.py +1 -1
- pulumi_azure_native/app/v20240202preview/managed_environment.py +1 -1
- pulumi_azure_native/app/v20240202preview/managed_environment_private_endpoint_connection.py +1 -1
- pulumi_azure_native/app/v20240202preview/managed_environments_storage.py +1 -1
- pulumi_azure_native/app/v20240301/certificate.py +1 -1
- pulumi_azure_native/app/v20240301/connected_environment.py +1 -1
- pulumi_azure_native/app/v20240301/connected_environments_certificate.py +1 -1
- pulumi_azure_native/app/v20240301/connected_environments_dapr_component.py +1 -1
- pulumi_azure_native/app/v20240301/connected_environments_storage.py +1 -1
- pulumi_azure_native/app/v20240301/container_app.py +1 -1
- pulumi_azure_native/app/v20240301/container_apps_auth_config.py +1 -1
- pulumi_azure_native/app/v20240301/container_apps_source_control.py +1 -1
- pulumi_azure_native/app/v20240301/dapr_component.py +1 -1
- pulumi_azure_native/app/v20240301/job.py +1 -1
- pulumi_azure_native/app/v20240301/managed_certificate.py +1 -1
- pulumi_azure_native/app/v20240301/managed_environment.py +1 -1
- pulumi_azure_native/app/v20240301/managed_environments_storage.py +1 -1
- pulumi_azure_native/app/v20240802preview/__init__.py +66 -0
- pulumi_azure_native/app/v20240802preview/_enums.py +347 -0
- pulumi_azure_native/app/v20240802preview/_inputs.py +13190 -0
- pulumi_azure_native/app/v20240802preview/app_resiliency.py +364 -0
- pulumi_azure_native/app/v20240802preview/build.py +299 -0
- pulumi_azure_native/app/v20240802preview/builder.py +327 -0
- pulumi_azure_native/app/v20240802preview/certificate.py +279 -0
- pulumi_azure_native/app/v20240802preview/connected_environment.py +375 -0
- pulumi_azure_native/app/v20240802preview/connected_environments_certificate.py +279 -0
- pulumi_azure_native/app/v20240802preview/connected_environments_dapr_component.py +456 -0
- pulumi_azure_native/app/v20240802preview/connected_environments_storage.py +221 -0
- pulumi_azure_native/app/v20240802preview/container_app.py +599 -0
- pulumi_azure_native/app/v20240802preview/container_apps_auth_config.py +366 -0
- pulumi_azure_native/app/v20240802preview/container_apps_session_pool.py +491 -0
- pulumi_azure_native/app/v20240802preview/container_apps_source_control.py +296 -0
- pulumi_azure_native/app/v20240802preview/dapr_component.py +456 -0
- pulumi_azure_native/app/v20240802preview/dapr_component_resiliency_policy.py +269 -0
- pulumi_azure_native/app/v20240802preview/dapr_subscription.py +393 -0
- pulumi_azure_native/app/v20240802preview/dot_net_component.py +288 -0
- pulumi_azure_native/app/v20240802preview/get_app_resiliency.py +206 -0
- pulumi_azure_native/app/v20240802preview/get_build.py +219 -0
- pulumi_azure_native/app/v20240802preview/get_builder.py +201 -0
- pulumi_azure_native/app/v20240802preview/get_certificate.py +167 -0
- pulumi_azure_native/app/v20240802preview/get_connected_environment.py +240 -0
- pulumi_azure_native/app/v20240802preview/get_connected_environments_certificate.py +167 -0
- pulumi_azure_native/app/v20240802preview/get_connected_environments_dapr_component.py +245 -0
- pulumi_azure_native/app/v20240802preview/get_connected_environments_storage.py +141 -0
- pulumi_azure_native/app/v20240802preview/get_container_app.py +383 -0
- pulumi_azure_native/app/v20240802preview/get_container_app_auth_token.py +175 -0
- pulumi_azure_native/app/v20240802preview/get_container_apps_auth_config.py +206 -0
- pulumi_azure_native/app/v20240802preview/get_container_apps_session_pool.py +292 -0
- pulumi_azure_native/app/v20240802preview/get_container_apps_source_control.py +182 -0
- pulumi_azure_native/app/v20240802preview/get_custom_domain_verification_id.py +66 -0
- pulumi_azure_native/app/v20240802preview/get_dapr_component.py +245 -0
- pulumi_azure_native/app/v20240802preview/get_dapr_component_resiliency_policy.py +159 -0
- pulumi_azure_native/app/v20240802preview/get_dapr_subscription.py +219 -0
- pulumi_azure_native/app/v20240802preview/get_dot_net_component.py +180 -0
- pulumi_azure_native/app/v20240802preview/get_java_component.py +141 -0
- pulumi_azure_native/app/v20240802preview/get_job.py +279 -0
- pulumi_azure_native/app/v20240802preview/get_logic_app.py +128 -0
- pulumi_azure_native/app/v20240802preview/get_managed_certificate.py +167 -0
- pulumi_azure_native/app/v20240802preview/get_managed_environment.py +450 -0
- pulumi_azure_native/app/v20240802preview/get_managed_environment_auth_token.py +175 -0
- pulumi_azure_native/app/v20240802preview/get_managed_environment_private_endpoint_connection.py +180 -0
- pulumi_azure_native/app/v20240802preview/get_managed_environments_storage.py +141 -0
- pulumi_azure_native/app/v20240802preview/java_component.py +219 -0
- pulumi_azure_native/app/v20240802preview/job.py +443 -0
- pulumi_azure_native/app/v20240802preview/list_build_auth_token.py +101 -0
- pulumi_azure_native/app/v20240802preview/list_connected_environments_dapr_component_secrets.py +89 -0
- pulumi_azure_native/app/v20240802preview/list_container_app_custom_host_name_analysis.py +232 -0
- pulumi_azure_native/app/v20240802preview/list_container_app_secrets.py +84 -0
- pulumi_azure_native/app/v20240802preview/list_dapr_component_secrets.py +89 -0
- pulumi_azure_native/app/v20240802preview/list_job_secrets.py +84 -0
- pulumi_azure_native/app/v20240802preview/list_logic_app_workflows_connections.py +154 -0
- pulumi_azure_native/app/v20240802preview/logic_app.py +190 -0
- pulumi_azure_native/app/v20240802preview/managed_certificate.py +279 -0
- pulumi_azure_native/app/v20240802preview/managed_environment.py +752 -0
- pulumi_azure_native/app/v20240802preview/managed_environment_private_endpoint_connection.py +252 -0
- pulumi_azure_native/app/v20240802preview/managed_environments_storage.py +221 -0
- pulumi_azure_native/app/v20240802preview/outputs.py +11488 -0
- pulumi_azure_native/devcenter/__init__.py +5 -0
- pulumi_azure_native/devcenter/_inputs.py +3 -3
- pulumi_azure_native/devcenter/attached_network_by_dev_center.py +3 -3
- pulumi_azure_native/devcenter/catalog.py +3 -3
- pulumi_azure_native/devcenter/curation_profile.py +5 -1
- pulumi_azure_native/devcenter/dev_box_definition.py +3 -3
- pulumi_azure_native/devcenter/dev_center.py +3 -3
- pulumi_azure_native/devcenter/encryption_set.py +3 -3
- pulumi_azure_native/devcenter/environment_type.py +3 -3
- pulumi_azure_native/devcenter/gallery.py +3 -3
- pulumi_azure_native/devcenter/get_attached_network_by_dev_center.py +2 -2
- pulumi_azure_native/devcenter/get_catalog.py +2 -2
- pulumi_azure_native/devcenter/get_catalog_sync_error_details.py +2 -2
- pulumi_azure_native/devcenter/get_curation_profile.py +4 -0
- pulumi_azure_native/devcenter/get_customization_task_error_details.py +2 -2
- pulumi_azure_native/devcenter/get_dev_box_definition.py +2 -2
- pulumi_azure_native/devcenter/get_dev_center.py +2 -2
- pulumi_azure_native/devcenter/get_encryption_set.py +2 -2
- pulumi_azure_native/devcenter/get_environment_definition_error_details.py +2 -2
- pulumi_azure_native/devcenter/get_environment_type.py +2 -2
- pulumi_azure_native/devcenter/get_gallery.py +2 -2
- pulumi_azure_native/devcenter/get_network_connection.py +2 -2
- pulumi_azure_native/devcenter/get_plan.py +2 -2
- pulumi_azure_native/devcenter/get_plan_member.py +2 -2
- pulumi_azure_native/devcenter/get_pool.py +2 -2
- pulumi_azure_native/devcenter/get_project.py +2 -2
- pulumi_azure_native/devcenter/get_project_catalog.py +2 -2
- pulumi_azure_native/devcenter/get_project_catalog_environment_definition_error_details.py +2 -2
- pulumi_azure_native/devcenter/get_project_catalog_image_definition_build_details.py +2 -2
- pulumi_azure_native/devcenter/get_project_catalog_sync_error_details.py +2 -2
- pulumi_azure_native/devcenter/get_project_environment_type.py +2 -2
- pulumi_azure_native/devcenter/get_project_inherited_settings.py +2 -2
- pulumi_azure_native/devcenter/get_project_policy.py +169 -0
- pulumi_azure_native/devcenter/get_schedule.py +2 -2
- pulumi_azure_native/devcenter/list_skus_by_project.py +2 -2
- pulumi_azure_native/devcenter/network_connection.py +3 -3
- pulumi_azure_native/devcenter/outputs.py +2 -2
- pulumi_azure_native/devcenter/plan.py +3 -3
- pulumi_azure_native/devcenter/plan_member.py +3 -3
- pulumi_azure_native/devcenter/pool.py +3 -3
- pulumi_azure_native/devcenter/project.py +3 -3
- pulumi_azure_native/devcenter/project_catalog.py +3 -3
- pulumi_azure_native/devcenter/project_environment_type.py +3 -3
- pulumi_azure_native/devcenter/project_policy.py +261 -0
- pulumi_azure_native/devcenter/schedule.py +3 -3
- pulumi_azure_native/devcenter/v20221111preview/dev_box_definition.py +1 -1
- pulumi_azure_native/devcenter/v20230401/attached_network_by_dev_center.py +1 -1
- pulumi_azure_native/devcenter/v20230401/catalog.py +1 -1
- pulumi_azure_native/devcenter/v20230401/dev_box_definition.py +1 -1
- pulumi_azure_native/devcenter/v20230401/dev_center.py +1 -1
- pulumi_azure_native/devcenter/v20230401/environment_type.py +1 -1
- pulumi_azure_native/devcenter/v20230401/gallery.py +1 -1
- pulumi_azure_native/devcenter/v20230401/network_connection.py +1 -1
- pulumi_azure_native/devcenter/v20230401/pool.py +1 -1
- pulumi_azure_native/devcenter/v20230401/project.py +1 -1
- pulumi_azure_native/devcenter/v20230401/project_environment_type.py +1 -1
- pulumi_azure_native/devcenter/v20230401/schedule.py +1 -1
- pulumi_azure_native/devcenter/v20230801preview/attached_network_by_dev_center.py +1 -1
- pulumi_azure_native/devcenter/v20230801preview/catalog.py +1 -1
- pulumi_azure_native/devcenter/v20230801preview/dev_box_definition.py +1 -1
- pulumi_azure_native/devcenter/v20230801preview/dev_center.py +1 -1
- pulumi_azure_native/devcenter/v20230801preview/environment_type.py +1 -1
- pulumi_azure_native/devcenter/v20230801preview/gallery.py +1 -1
- pulumi_azure_native/devcenter/v20230801preview/network_connection.py +1 -1
- pulumi_azure_native/devcenter/v20230801preview/pool.py +1 -1
- pulumi_azure_native/devcenter/v20230801preview/project.py +1 -1
- pulumi_azure_native/devcenter/v20230801preview/project_environment_type.py +1 -1
- pulumi_azure_native/devcenter/v20230801preview/schedule.py +1 -1
- pulumi_azure_native/devcenter/v20231001preview/attached_network_by_dev_center.py +1 -1
- pulumi_azure_native/devcenter/v20231001preview/catalog.py +1 -1
- pulumi_azure_native/devcenter/v20231001preview/dev_box_definition.py +1 -1
- pulumi_azure_native/devcenter/v20231001preview/dev_center.py +1 -1
- pulumi_azure_native/devcenter/v20231001preview/environment_type.py +1 -1
- pulumi_azure_native/devcenter/v20231001preview/gallery.py +1 -1
- pulumi_azure_native/devcenter/v20231001preview/network_connection.py +1 -1
- pulumi_azure_native/devcenter/v20231001preview/pool.py +1 -1
- pulumi_azure_native/devcenter/v20231001preview/project.py +1 -1
- pulumi_azure_native/devcenter/v20231001preview/project_environment_type.py +1 -1
- pulumi_azure_native/devcenter/v20231001preview/schedule.py +1 -1
- pulumi_azure_native/devcenter/v20240201/attached_network_by_dev_center.py +1 -1
- pulumi_azure_native/devcenter/v20240201/catalog.py +1 -1
- pulumi_azure_native/devcenter/v20240201/dev_box_definition.py +1 -1
- pulumi_azure_native/devcenter/v20240201/dev_center.py +1 -1
- pulumi_azure_native/devcenter/v20240201/environment_type.py +1 -1
- pulumi_azure_native/devcenter/v20240201/gallery.py +1 -1
- pulumi_azure_native/devcenter/v20240201/network_connection.py +1 -1
- pulumi_azure_native/devcenter/v20240201/pool.py +1 -1
- pulumi_azure_native/devcenter/v20240201/project.py +1 -1
- pulumi_azure_native/devcenter/v20240201/project_catalog.py +1 -1
- pulumi_azure_native/devcenter/v20240201/project_environment_type.py +1 -1
- pulumi_azure_native/devcenter/v20240201/schedule.py +1 -1
- pulumi_azure_native/devcenter/v20240501preview/attached_network_by_dev_center.py +1 -1
- pulumi_azure_native/devcenter/v20240501preview/catalog.py +1 -1
- pulumi_azure_native/devcenter/v20240501preview/dev_box_definition.py +1 -1
- pulumi_azure_native/devcenter/v20240501preview/dev_center.py +1 -1
- pulumi_azure_native/devcenter/v20240501preview/encryption_set.py +1 -1
- pulumi_azure_native/devcenter/v20240501preview/environment_type.py +1 -1
- pulumi_azure_native/devcenter/v20240501preview/gallery.py +1 -1
- pulumi_azure_native/devcenter/v20240501preview/network_connection.py +1 -1
- pulumi_azure_native/devcenter/v20240501preview/plan.py +1 -1
- pulumi_azure_native/devcenter/v20240501preview/plan_member.py +1 -1
- pulumi_azure_native/devcenter/v20240501preview/pool.py +1 -1
- pulumi_azure_native/devcenter/v20240501preview/project.py +1 -1
- pulumi_azure_native/devcenter/v20240501preview/project_catalog.py +1 -1
- pulumi_azure_native/devcenter/v20240501preview/project_environment_type.py +1 -1
- pulumi_azure_native/devcenter/v20240501preview/schedule.py +1 -1
- pulumi_azure_native/devcenter/v20240601preview/attached_network_by_dev_center.py +1 -1
- pulumi_azure_native/devcenter/v20240601preview/catalog.py +1 -1
- pulumi_azure_native/devcenter/v20240601preview/dev_box_definition.py +1 -1
- pulumi_azure_native/devcenter/v20240601preview/dev_center.py +1 -1
- pulumi_azure_native/devcenter/v20240601preview/encryption_set.py +1 -1
- pulumi_azure_native/devcenter/v20240601preview/environment_type.py +1 -1
- pulumi_azure_native/devcenter/v20240601preview/gallery.py +1 -1
- pulumi_azure_native/devcenter/v20240601preview/network_connection.py +1 -1
- pulumi_azure_native/devcenter/v20240601preview/plan.py +1 -1
- pulumi_azure_native/devcenter/v20240601preview/plan_member.py +1 -1
- pulumi_azure_native/devcenter/v20240601preview/pool.py +1 -1
- pulumi_azure_native/devcenter/v20240601preview/project.py +1 -1
- pulumi_azure_native/devcenter/v20240601preview/project_catalog.py +1 -1
- pulumi_azure_native/devcenter/v20240601preview/project_environment_type.py +1 -1
- pulumi_azure_native/devcenter/v20240601preview/schedule.py +1 -1
- pulumi_azure_native/devcenter/v20240701preview/attached_network_by_dev_center.py +1 -1
- pulumi_azure_native/devcenter/v20240701preview/catalog.py +1 -1
- pulumi_azure_native/devcenter/v20240701preview/dev_box_definition.py +1 -1
- pulumi_azure_native/devcenter/v20240701preview/dev_center.py +1 -1
- pulumi_azure_native/devcenter/v20240701preview/encryption_set.py +1 -1
- pulumi_azure_native/devcenter/v20240701preview/environment_type.py +1 -1
- pulumi_azure_native/devcenter/v20240701preview/gallery.py +1 -1
- pulumi_azure_native/devcenter/v20240701preview/network_connection.py +1 -1
- pulumi_azure_native/devcenter/v20240701preview/plan.py +1 -1
- pulumi_azure_native/devcenter/v20240701preview/plan_member.py +1 -1
- pulumi_azure_native/devcenter/v20240701preview/pool.py +1 -1
- pulumi_azure_native/devcenter/v20240701preview/project.py +1 -1
- pulumi_azure_native/devcenter/v20240701preview/project_catalog.py +1 -1
- pulumi_azure_native/devcenter/v20240701preview/project_environment_type.py +1 -1
- pulumi_azure_native/devcenter/v20240701preview/schedule.py +1 -1
- pulumi_azure_native/devcenter/v20240801preview/attached_network_by_dev_center.py +1 -1
- pulumi_azure_native/devcenter/v20240801preview/catalog.py +1 -1
- pulumi_azure_native/devcenter/v20240801preview/curation_profile.py +1 -1
- pulumi_azure_native/devcenter/v20240801preview/dev_box_definition.py +1 -1
- pulumi_azure_native/devcenter/v20240801preview/dev_center.py +1 -1
- pulumi_azure_native/devcenter/v20240801preview/encryption_set.py +1 -1
- pulumi_azure_native/devcenter/v20240801preview/environment_type.py +1 -1
- pulumi_azure_native/devcenter/v20240801preview/gallery.py +1 -1
- pulumi_azure_native/devcenter/v20240801preview/network_connection.py +1 -1
- pulumi_azure_native/devcenter/v20240801preview/plan.py +1 -1
- pulumi_azure_native/devcenter/v20240801preview/plan_member.py +1 -1
- pulumi_azure_native/devcenter/v20240801preview/pool.py +1 -1
- pulumi_azure_native/devcenter/v20240801preview/project.py +1 -1
- pulumi_azure_native/devcenter/v20240801preview/project_catalog.py +1 -1
- pulumi_azure_native/devcenter/v20240801preview/project_environment_type.py +1 -1
- pulumi_azure_native/devcenter/v20240801preview/schedule.py +1 -1
- pulumi_azure_native/devcenter/v20241001preview/__init__.py +52 -0
- pulumi_azure_native/devcenter/v20241001preview/_enums.py +228 -0
- pulumi_azure_native/devcenter/v20241001preview/_inputs.py +962 -0
- pulumi_azure_native/devcenter/v20241001preview/attached_network_by_dev_center.py +260 -0
- pulumi_azure_native/devcenter/v20241001preview/catalog.py +368 -0
- pulumi_azure_native/devcenter/v20241001preview/curation_profile.py +259 -0
- pulumi_azure_native/devcenter/v20241001preview/dev_box_definition.py +418 -0
- pulumi_azure_native/devcenter/v20241001preview/dev_center.py +481 -0
- pulumi_azure_native/devcenter/v20241001preview/encryption_set.py +347 -0
- pulumi_azure_native/devcenter/v20241001preview/environment_type.py +258 -0
- pulumi_azure_native/devcenter/v20241001preview/gallery.py +230 -0
- pulumi_azure_native/devcenter/v20241001preview/get_attached_network_by_dev_center.py +193 -0
- pulumi_azure_native/devcenter/v20241001preview/get_catalog.py +258 -0
- pulumi_azure_native/devcenter/v20241001preview/get_catalog_sync_error_details.py +115 -0
- pulumi_azure_native/devcenter/v20241001preview/get_curation_profile.py +167 -0
- pulumi_azure_native/devcenter/v20241001preview/get_customization_task_error_details.py +94 -0
- pulumi_azure_native/devcenter/v20241001preview/get_dev_box_definition.py +271 -0
- pulumi_azure_native/devcenter/v20241001preview/get_dev_center.py +279 -0
- pulumi_azure_native/devcenter/v20241001preview/get_encryption_set.py +206 -0
- pulumi_azure_native/devcenter/v20241001preview/get_environment_definition_error_details.py +94 -0
- pulumi_azure_native/devcenter/v20241001preview/get_environment_type.py +167 -0
- pulumi_azure_native/devcenter/v20241001preview/get_gallery.py +154 -0
- pulumi_azure_native/devcenter/v20241001preview/get_network_connection.py +266 -0
- pulumi_azure_native/devcenter/v20241001preview/get_plan.py +175 -0
- pulumi_azure_native/devcenter/v20241001preview/get_plan_member.py +206 -0
- pulumi_azure_native/devcenter/v20241001preview/get_pool.py +362 -0
- pulumi_azure_native/devcenter/v20241001preview/get_project.py +253 -0
- pulumi_azure_native/devcenter/v20241001preview/get_project_catalog.py +258 -0
- pulumi_azure_native/devcenter/v20241001preview/get_project_catalog_environment_definition_error_details.py +94 -0
- pulumi_azure_native/devcenter/v20241001preview/get_project_catalog_image_definition_build_details.py +216 -0
- pulumi_azure_native/devcenter/v20241001preview/get_project_catalog_sync_error_details.py +115 -0
- pulumi_azure_native/devcenter/v20241001preview/get_project_environment_type.py +258 -0
- pulumi_azure_native/devcenter/v20241001preview/get_project_inherited_settings.py +97 -0
- pulumi_azure_native/devcenter/v20241001preview/get_project_policy.py +167 -0
- pulumi_azure_native/devcenter/v20241001preview/get_schedule.py +229 -0
- pulumi_azure_native/devcenter/v20241001preview/list_skus_by_project.py +97 -0
- pulumi_azure_native/devcenter/v20241001preview/network_connection.py +453 -0
- pulumi_azure_native/devcenter/v20241001preview/outputs.py +1952 -0
- pulumi_azure_native/devcenter/v20241001preview/plan.py +268 -0
- pulumi_azure_native/devcenter/v20241001preview/plan_member.py +327 -0
- pulumi_azure_native/devcenter/v20241001preview/pool.py +642 -0
- pulumi_azure_native/devcenter/v20241001preview/project.py +423 -0
- pulumi_azure_native/devcenter/v20241001preview/project_catalog.py +368 -0
- pulumi_azure_native/devcenter/v20241001preview/project_environment_type.py +444 -0
- pulumi_azure_native/devcenter/v20241001preview/project_policy.py +259 -0
- pulumi_azure_native/devcenter/v20241001preview/schedule.py +439 -0
- pulumi_azure_native/elastic/__init__.py +3 -0
- pulumi_azure_native/elastic/get_billing_info.py +2 -2
- pulumi_azure_native/elastic/get_monitor.py +2 -2
- pulumi_azure_native/elastic/get_monitored_subscription.py +2 -2
- pulumi_azure_native/elastic/get_open_ai.py +2 -2
- pulumi_azure_native/elastic/get_open_ai_status.py +2 -2
- pulumi_azure_native/elastic/get_organization_api_key.py +2 -2
- pulumi_azure_native/elastic/get_organization_elastic_to_azure_subscription_mapping.py +2 -2
- pulumi_azure_native/elastic/get_tag_rule.py +2 -2
- pulumi_azure_native/elastic/list_all_traffic_filter.py +2 -2
- pulumi_azure_native/elastic/list_connected_partner_resource.py +2 -2
- pulumi_azure_native/elastic/list_deployment_info.py +2 -2
- pulumi_azure_native/elastic/list_monitored_resource.py +2 -2
- pulumi_azure_native/elastic/list_upgradable_version_details.py +2 -2
- pulumi_azure_native/elastic/list_vm_host.py +2 -2
- pulumi_azure_native/elastic/listlist_associated_traffic_filter.py +2 -2
- pulumi_azure_native/elastic/monitor.py +3 -3
- pulumi_azure_native/elastic/monitored_subscription.py +3 -3
- pulumi_azure_native/elastic/open_ai.py +3 -3
- pulumi_azure_native/elastic/tag_rule.py +3 -3
- pulumi_azure_native/elastic/v20230601/monitor.py +1 -1
- pulumi_azure_native/elastic/v20230601/tag_rule.py +1 -1
- pulumi_azure_native/elastic/v20230615preview/monitor.py +1 -1
- pulumi_azure_native/elastic/v20230615preview/tag_rule.py +1 -1
- pulumi_azure_native/elastic/v20230701preview/monitor.py +1 -1
- pulumi_azure_native/elastic/v20230701preview/tag_rule.py +1 -1
- pulumi_azure_native/elastic/v20231001preview/monitor.py +1 -1
- pulumi_azure_native/elastic/v20231001preview/tag_rule.py +1 -1
- pulumi_azure_native/elastic/v20231101preview/monitor.py +1 -1
- pulumi_azure_native/elastic/v20231101preview/tag_rule.py +1 -1
- pulumi_azure_native/elastic/v20240101preview/monitor.py +1 -1
- pulumi_azure_native/elastic/v20240101preview/open_ai.py +1 -1
- pulumi_azure_native/elastic/v20240101preview/tag_rule.py +1 -1
- pulumi_azure_native/elastic/v20240301/monitor.py +1 -1
- pulumi_azure_native/elastic/v20240301/open_ai.py +1 -1
- pulumi_azure_native/elastic/v20240301/tag_rule.py +1 -1
- pulumi_azure_native/elastic/v20240501preview/monitor.py +1 -1
- pulumi_azure_native/elastic/v20240501preview/monitored_subscription.py +1 -1
- pulumi_azure_native/elastic/v20240501preview/open_ai.py +1 -1
- pulumi_azure_native/elastic/v20240501preview/tag_rule.py +1 -1
- pulumi_azure_native/elastic/v20240615preview/monitor.py +1 -1
- pulumi_azure_native/elastic/v20240615preview/monitored_subscription.py +1 -1
- pulumi_azure_native/elastic/v20240615preview/open_ai.py +1 -1
- pulumi_azure_native/elastic/v20240615preview/tag_rule.py +1 -1
- pulumi_azure_native/elastic/v20241001preview/__init__.py +29 -0
- pulumi_azure_native/elastic/v20241001preview/_enums.py +57 -0
- pulumi_azure_native/elastic/v20241001preview/_inputs.py +1117 -0
- pulumi_azure_native/elastic/v20241001preview/get_billing_info.py +97 -0
- pulumi_azure_native/elastic/v20241001preview/get_monitor.py +188 -0
- pulumi_azure_native/elastic/v20241001preview/get_monitored_subscription.py +128 -0
- pulumi_azure_native/elastic/v20241001preview/get_open_ai.py +128 -0
- pulumi_azure_native/elastic/v20241001preview/get_open_ai_status.py +89 -0
- pulumi_azure_native/elastic/v20241001preview/get_organization_api_key.py +76 -0
- pulumi_azure_native/elastic/v20241001preview/get_organization_elastic_to_azure_subscription_mapping.py +70 -0
- pulumi_azure_native/elastic/v20241001preview/get_tag_rule.py +141 -0
- pulumi_azure_native/elastic/v20241001preview/list_all_traffic_filter.py +84 -0
- pulumi_azure_native/elastic/v20241001preview/list_connected_partner_resource.py +97 -0
- pulumi_azure_native/elastic/v20241001preview/list_deployment_info.py +162 -0
- pulumi_azure_native/elastic/v20241001preview/list_monitored_resource.py +97 -0
- pulumi_azure_native/elastic/v20241001preview/list_upgradable_version_details.py +96 -0
- pulumi_azure_native/elastic/v20241001preview/list_vm_host.py +97 -0
- pulumi_azure_native/elastic/v20241001preview/listlist_associated_traffic_filter.py +84 -0
- pulumi_azure_native/elastic/v20241001preview/monitor.py +316 -0
- pulumi_azure_native/elastic/v20241001preview/monitored_subscription.py +211 -0
- pulumi_azure_native/elastic/v20241001preview/open_ai.py +210 -0
- pulumi_azure_native/elastic/v20241001preview/outputs.py +1757 -0
- pulumi_azure_native/elastic/v20241001preview/tag_rule.py +221 -0
- pulumi_azure_native/hybridconnectivity/outputs.py +44 -2
- pulumi_azure_native/hybridconnectivity/v20241201/outputs.py +44 -2
- pulumi_azure_native/pulumi-plugin.json +1 -1
- pulumi_azure_native/security/_inputs.py +3 -15
- pulumi_azure_native/security/outputs.py +2 -10
- pulumi_azure_native/security/v20240101/_inputs.py +3 -15
- pulumi_azure_native/security/v20240101/outputs.py +2 -10
- {pulumi_azure_native-2.66.0a1728396986.dist-info → pulumi_azure_native-2.66.0a1728463590.dist-info}/METADATA +1 -1
- {pulumi_azure_native-2.66.0a1728396986.dist-info → pulumi_azure_native-2.66.0a1728463590.dist-info}/RECORD +525 -394
- {pulumi_azure_native-2.66.0a1728396986.dist-info → pulumi_azure_native-2.66.0a1728463590.dist-info}/WHEEL +0 -0
- {pulumi_azure_native-2.66.0a1728396986.dist-info → pulumi_azure_native-2.66.0a1728463590.dist-info}/top_level.txt +0 -0
|
@@ -0,0 +1,221 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import copy
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from ... import _utilities
|
|
16
|
+
from . import outputs
|
|
17
|
+
from ._enums import *
|
|
18
|
+
from ._inputs import *
|
|
19
|
+
|
|
20
|
+
__all__ = ['TagRuleArgs', 'TagRule']
|
|
21
|
+
|
|
22
|
+
@pulumi.input_type
|
|
23
|
+
class TagRuleArgs:
|
|
24
|
+
def __init__(__self__, *,
|
|
25
|
+
monitor_name: pulumi.Input[str],
|
|
26
|
+
resource_group_name: pulumi.Input[str],
|
|
27
|
+
properties: Optional[pulumi.Input['MonitoringTagRulesPropertiesArgs']] = None,
|
|
28
|
+
rule_set_name: Optional[pulumi.Input[str]] = None):
|
|
29
|
+
"""
|
|
30
|
+
The set of arguments for constructing a TagRule resource.
|
|
31
|
+
:param pulumi.Input[str] monitor_name: Monitor resource name
|
|
32
|
+
:param pulumi.Input[str] resource_group_name: The name of the resource group. The name is case insensitive.
|
|
33
|
+
:param pulumi.Input['MonitoringTagRulesPropertiesArgs'] properties: Properties of the monitoring tag rules.
|
|
34
|
+
:param pulumi.Input[str] rule_set_name: Tag Rule Set resource name
|
|
35
|
+
"""
|
|
36
|
+
pulumi.set(__self__, "monitor_name", monitor_name)
|
|
37
|
+
pulumi.set(__self__, "resource_group_name", resource_group_name)
|
|
38
|
+
if properties is not None:
|
|
39
|
+
pulumi.set(__self__, "properties", properties)
|
|
40
|
+
if rule_set_name is not None:
|
|
41
|
+
pulumi.set(__self__, "rule_set_name", rule_set_name)
|
|
42
|
+
|
|
43
|
+
@property
|
|
44
|
+
@pulumi.getter(name="monitorName")
|
|
45
|
+
def monitor_name(self) -> pulumi.Input[str]:
|
|
46
|
+
"""
|
|
47
|
+
Monitor resource name
|
|
48
|
+
"""
|
|
49
|
+
return pulumi.get(self, "monitor_name")
|
|
50
|
+
|
|
51
|
+
@monitor_name.setter
|
|
52
|
+
def monitor_name(self, value: pulumi.Input[str]):
|
|
53
|
+
pulumi.set(self, "monitor_name", value)
|
|
54
|
+
|
|
55
|
+
@property
|
|
56
|
+
@pulumi.getter(name="resourceGroupName")
|
|
57
|
+
def resource_group_name(self) -> pulumi.Input[str]:
|
|
58
|
+
"""
|
|
59
|
+
The name of the resource group. The name is case insensitive.
|
|
60
|
+
"""
|
|
61
|
+
return pulumi.get(self, "resource_group_name")
|
|
62
|
+
|
|
63
|
+
@resource_group_name.setter
|
|
64
|
+
def resource_group_name(self, value: pulumi.Input[str]):
|
|
65
|
+
pulumi.set(self, "resource_group_name", value)
|
|
66
|
+
|
|
67
|
+
@property
|
|
68
|
+
@pulumi.getter
|
|
69
|
+
def properties(self) -> Optional[pulumi.Input['MonitoringTagRulesPropertiesArgs']]:
|
|
70
|
+
"""
|
|
71
|
+
Properties of the monitoring tag rules.
|
|
72
|
+
"""
|
|
73
|
+
return pulumi.get(self, "properties")
|
|
74
|
+
|
|
75
|
+
@properties.setter
|
|
76
|
+
def properties(self, value: Optional[pulumi.Input['MonitoringTagRulesPropertiesArgs']]):
|
|
77
|
+
pulumi.set(self, "properties", value)
|
|
78
|
+
|
|
79
|
+
@property
|
|
80
|
+
@pulumi.getter(name="ruleSetName")
|
|
81
|
+
def rule_set_name(self) -> Optional[pulumi.Input[str]]:
|
|
82
|
+
"""
|
|
83
|
+
Tag Rule Set resource name
|
|
84
|
+
"""
|
|
85
|
+
return pulumi.get(self, "rule_set_name")
|
|
86
|
+
|
|
87
|
+
@rule_set_name.setter
|
|
88
|
+
def rule_set_name(self, value: Optional[pulumi.Input[str]]):
|
|
89
|
+
pulumi.set(self, "rule_set_name", value)
|
|
90
|
+
|
|
91
|
+
|
|
92
|
+
class TagRule(pulumi.CustomResource):
|
|
93
|
+
@overload
|
|
94
|
+
def __init__(__self__,
|
|
95
|
+
resource_name: str,
|
|
96
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
97
|
+
monitor_name: Optional[pulumi.Input[str]] = None,
|
|
98
|
+
properties: Optional[pulumi.Input[Union['MonitoringTagRulesPropertiesArgs', 'MonitoringTagRulesPropertiesArgsDict']]] = None,
|
|
99
|
+
resource_group_name: Optional[pulumi.Input[str]] = None,
|
|
100
|
+
rule_set_name: Optional[pulumi.Input[str]] = None,
|
|
101
|
+
__props__=None):
|
|
102
|
+
"""
|
|
103
|
+
Capture logs and metrics of Azure resources based on ARM tags.
|
|
104
|
+
|
|
105
|
+
:param str resource_name: The name of the resource.
|
|
106
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
107
|
+
:param pulumi.Input[str] monitor_name: Monitor resource name
|
|
108
|
+
:param pulumi.Input[Union['MonitoringTagRulesPropertiesArgs', 'MonitoringTagRulesPropertiesArgsDict']] properties: Properties of the monitoring tag rules.
|
|
109
|
+
:param pulumi.Input[str] resource_group_name: The name of the resource group. The name is case insensitive.
|
|
110
|
+
:param pulumi.Input[str] rule_set_name: Tag Rule Set resource name
|
|
111
|
+
"""
|
|
112
|
+
...
|
|
113
|
+
@overload
|
|
114
|
+
def __init__(__self__,
|
|
115
|
+
resource_name: str,
|
|
116
|
+
args: TagRuleArgs,
|
|
117
|
+
opts: Optional[pulumi.ResourceOptions] = None):
|
|
118
|
+
"""
|
|
119
|
+
Capture logs and metrics of Azure resources based on ARM tags.
|
|
120
|
+
|
|
121
|
+
:param str resource_name: The name of the resource.
|
|
122
|
+
:param TagRuleArgs args: The arguments to use to populate this resource's properties.
|
|
123
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
124
|
+
"""
|
|
125
|
+
...
|
|
126
|
+
def __init__(__self__, resource_name: str, *args, **kwargs):
|
|
127
|
+
resource_args, opts = _utilities.get_resource_args_opts(TagRuleArgs, pulumi.ResourceOptions, *args, **kwargs)
|
|
128
|
+
if resource_args is not None:
|
|
129
|
+
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
|
130
|
+
else:
|
|
131
|
+
__self__._internal_init(resource_name, *args, **kwargs)
|
|
132
|
+
|
|
133
|
+
def _internal_init(__self__,
|
|
134
|
+
resource_name: str,
|
|
135
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
136
|
+
monitor_name: Optional[pulumi.Input[str]] = None,
|
|
137
|
+
properties: Optional[pulumi.Input[Union['MonitoringTagRulesPropertiesArgs', 'MonitoringTagRulesPropertiesArgsDict']]] = None,
|
|
138
|
+
resource_group_name: Optional[pulumi.Input[str]] = None,
|
|
139
|
+
rule_set_name: Optional[pulumi.Input[str]] = None,
|
|
140
|
+
__props__=None):
|
|
141
|
+
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
142
|
+
if not isinstance(opts, pulumi.ResourceOptions):
|
|
143
|
+
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
|
144
|
+
if opts.id is None:
|
|
145
|
+
if __props__ is not None:
|
|
146
|
+
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
|
147
|
+
__props__ = TagRuleArgs.__new__(TagRuleArgs)
|
|
148
|
+
|
|
149
|
+
if monitor_name is None and not opts.urn:
|
|
150
|
+
raise TypeError("Missing required property 'monitor_name'")
|
|
151
|
+
__props__.__dict__["monitor_name"] = monitor_name
|
|
152
|
+
__props__.__dict__["properties"] = properties
|
|
153
|
+
if resource_group_name is None and not opts.urn:
|
|
154
|
+
raise TypeError("Missing required property 'resource_group_name'")
|
|
155
|
+
__props__.__dict__["resource_group_name"] = resource_group_name
|
|
156
|
+
__props__.__dict__["rule_set_name"] = rule_set_name
|
|
157
|
+
__props__.__dict__["name"] = None
|
|
158
|
+
__props__.__dict__["system_data"] = None
|
|
159
|
+
__props__.__dict__["type"] = None
|
|
160
|
+
alias_opts = pulumi.ResourceOptions(aliases=[pulumi.Alias(type_="azure-native:elastic:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20200701:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20200701preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20210901preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20211001preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20220505preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20220701preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20220901preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20230201preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20230501preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20230601:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20230615preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20230701preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20231001preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20231101preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20240101preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20240301:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20240501preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20240615preview:TagRule")])
|
|
161
|
+
opts = pulumi.ResourceOptions.merge(opts, alias_opts)
|
|
162
|
+
super(TagRule, __self__).__init__(
|
|
163
|
+
'azure-native:elastic/v20241001preview:TagRule',
|
|
164
|
+
resource_name,
|
|
165
|
+
__props__,
|
|
166
|
+
opts)
|
|
167
|
+
|
|
168
|
+
@staticmethod
|
|
169
|
+
def get(resource_name: str,
|
|
170
|
+
id: pulumi.Input[str],
|
|
171
|
+
opts: Optional[pulumi.ResourceOptions] = None) -> 'TagRule':
|
|
172
|
+
"""
|
|
173
|
+
Get an existing TagRule resource's state with the given name, id, and optional extra
|
|
174
|
+
properties used to qualify the lookup.
|
|
175
|
+
|
|
176
|
+
:param str resource_name: The unique name of the resulting resource.
|
|
177
|
+
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
178
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
179
|
+
"""
|
|
180
|
+
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
181
|
+
|
|
182
|
+
__props__ = TagRuleArgs.__new__(TagRuleArgs)
|
|
183
|
+
|
|
184
|
+
__props__.__dict__["name"] = None
|
|
185
|
+
__props__.__dict__["properties"] = None
|
|
186
|
+
__props__.__dict__["system_data"] = None
|
|
187
|
+
__props__.__dict__["type"] = None
|
|
188
|
+
return TagRule(resource_name, opts=opts, __props__=__props__)
|
|
189
|
+
|
|
190
|
+
@property
|
|
191
|
+
@pulumi.getter
|
|
192
|
+
def name(self) -> pulumi.Output[str]:
|
|
193
|
+
"""
|
|
194
|
+
Name of the rule set.
|
|
195
|
+
"""
|
|
196
|
+
return pulumi.get(self, "name")
|
|
197
|
+
|
|
198
|
+
@property
|
|
199
|
+
@pulumi.getter
|
|
200
|
+
def properties(self) -> pulumi.Output['outputs.MonitoringTagRulesPropertiesResponse']:
|
|
201
|
+
"""
|
|
202
|
+
Properties of the monitoring tag rules.
|
|
203
|
+
"""
|
|
204
|
+
return pulumi.get(self, "properties")
|
|
205
|
+
|
|
206
|
+
@property
|
|
207
|
+
@pulumi.getter(name="systemData")
|
|
208
|
+
def system_data(self) -> pulumi.Output['outputs.SystemDataResponse']:
|
|
209
|
+
"""
|
|
210
|
+
The system metadata relating to this resource
|
|
211
|
+
"""
|
|
212
|
+
return pulumi.get(self, "system_data")
|
|
213
|
+
|
|
214
|
+
@property
|
|
215
|
+
@pulumi.getter
|
|
216
|
+
def type(self) -> pulumi.Output[str]:
|
|
217
|
+
"""
|
|
218
|
+
The type of the rule set.
|
|
219
|
+
"""
|
|
220
|
+
return pulumi.get(self, "type")
|
|
221
|
+
|
|
@@ -32,8 +32,12 @@ class AwsCloudProfileResponse(dict):
|
|
|
32
32
|
@staticmethod
|
|
33
33
|
def __key_warning(key: str):
|
|
34
34
|
suggest = None
|
|
35
|
-
if key == "
|
|
35
|
+
if key == "accountId":
|
|
36
|
+
suggest = "account_id"
|
|
37
|
+
elif key == "excludedAccounts":
|
|
36
38
|
suggest = "excluded_accounts"
|
|
39
|
+
elif key == "isOrganizationalAccount":
|
|
40
|
+
suggest = "is_organizational_account"
|
|
37
41
|
|
|
38
42
|
if suggest:
|
|
39
43
|
pulumi.log.warn(f"Key '{key}' not found in AwsCloudProfileResponse. Access the value via the '{suggest}' property getter instead.")
|
|
@@ -47,13 +51,30 @@ class AwsCloudProfileResponse(dict):
|
|
|
47
51
|
return super().get(key, default)
|
|
48
52
|
|
|
49
53
|
def __init__(__self__, *,
|
|
50
|
-
|
|
54
|
+
account_id: str,
|
|
55
|
+
excluded_accounts: Optional[Sequence[str]] = None,
|
|
56
|
+
is_organizational_account: Optional[bool] = None):
|
|
51
57
|
"""
|
|
52
58
|
cloud profile for AWS.
|
|
59
|
+
:param str account_id: Account id for the AWS account.
|
|
53
60
|
:param Sequence[str] excluded_accounts: List of AWS accounts which need to be excluded.
|
|
61
|
+
:param bool is_organizational_account: Boolean value that indicates whether the account is organizational or not. True represents organization account, whereas false represents a single account.
|
|
54
62
|
"""
|
|
63
|
+
pulumi.set(__self__, "account_id", account_id)
|
|
55
64
|
if excluded_accounts is not None:
|
|
56
65
|
pulumi.set(__self__, "excluded_accounts", excluded_accounts)
|
|
66
|
+
if is_organizational_account is None:
|
|
67
|
+
is_organizational_account = False
|
|
68
|
+
if is_organizational_account is not None:
|
|
69
|
+
pulumi.set(__self__, "is_organizational_account", is_organizational_account)
|
|
70
|
+
|
|
71
|
+
@property
|
|
72
|
+
@pulumi.getter(name="accountId")
|
|
73
|
+
def account_id(self) -> str:
|
|
74
|
+
"""
|
|
75
|
+
Account id for the AWS account.
|
|
76
|
+
"""
|
|
77
|
+
return pulumi.get(self, "account_id")
|
|
57
78
|
|
|
58
79
|
@property
|
|
59
80
|
@pulumi.getter(name="excludedAccounts")
|
|
@@ -63,6 +84,14 @@ class AwsCloudProfileResponse(dict):
|
|
|
63
84
|
"""
|
|
64
85
|
return pulumi.get(self, "excluded_accounts")
|
|
65
86
|
|
|
87
|
+
@property
|
|
88
|
+
@pulumi.getter(name="isOrganizationalAccount")
|
|
89
|
+
def is_organizational_account(self) -> Optional[bool]:
|
|
90
|
+
"""
|
|
91
|
+
Boolean value that indicates whether the account is organizational or not. True represents organization account, whereas false represents a single account.
|
|
92
|
+
"""
|
|
93
|
+
return pulumi.get(self, "is_organizational_account")
|
|
94
|
+
|
|
66
95
|
|
|
67
96
|
@pulumi.output_type
|
|
68
97
|
class EndpointPropertiesResponse(dict):
|
|
@@ -140,6 +169,8 @@ class PublicCloudConnectorPropertiesResponse(dict):
|
|
|
140
169
|
suggest = "aws_cloud_profile"
|
|
141
170
|
elif key == "connectorPrimaryIdentifier":
|
|
142
171
|
suggest = "connector_primary_identifier"
|
|
172
|
+
elif key == "hostType":
|
|
173
|
+
suggest = "host_type"
|
|
143
174
|
elif key == "provisioningState":
|
|
144
175
|
suggest = "provisioning_state"
|
|
145
176
|
|
|
@@ -157,15 +188,18 @@ class PublicCloudConnectorPropertiesResponse(dict):
|
|
|
157
188
|
def __init__(__self__, *,
|
|
158
189
|
aws_cloud_profile: 'outputs.AwsCloudProfileResponse',
|
|
159
190
|
connector_primary_identifier: str,
|
|
191
|
+
host_type: str,
|
|
160
192
|
provisioning_state: str):
|
|
161
193
|
"""
|
|
162
194
|
Properties of public cloud connectors.
|
|
163
195
|
:param 'AwsCloudProfileResponse' aws_cloud_profile: Cloud profile for AWS.
|
|
164
196
|
:param str connector_primary_identifier: Connector primary identifier.
|
|
197
|
+
:param str host_type: Host cloud the public cloud connector.
|
|
165
198
|
:param str provisioning_state: The resource provisioning state.
|
|
166
199
|
"""
|
|
167
200
|
pulumi.set(__self__, "aws_cloud_profile", aws_cloud_profile)
|
|
168
201
|
pulumi.set(__self__, "connector_primary_identifier", connector_primary_identifier)
|
|
202
|
+
pulumi.set(__self__, "host_type", host_type)
|
|
169
203
|
pulumi.set(__self__, "provisioning_state", provisioning_state)
|
|
170
204
|
|
|
171
205
|
@property
|
|
@@ -184,6 +218,14 @@ class PublicCloudConnectorPropertiesResponse(dict):
|
|
|
184
218
|
"""
|
|
185
219
|
return pulumi.get(self, "connector_primary_identifier")
|
|
186
220
|
|
|
221
|
+
@property
|
|
222
|
+
@pulumi.getter(name="hostType")
|
|
223
|
+
def host_type(self) -> str:
|
|
224
|
+
"""
|
|
225
|
+
Host cloud the public cloud connector.
|
|
226
|
+
"""
|
|
227
|
+
return pulumi.get(self, "host_type")
|
|
228
|
+
|
|
187
229
|
@property
|
|
188
230
|
@pulumi.getter(name="provisioningState")
|
|
189
231
|
def provisioning_state(self) -> str:
|
|
@@ -32,8 +32,12 @@ class AwsCloudProfileResponse(dict):
|
|
|
32
32
|
@staticmethod
|
|
33
33
|
def __key_warning(key: str):
|
|
34
34
|
suggest = None
|
|
35
|
-
if key == "
|
|
35
|
+
if key == "accountId":
|
|
36
|
+
suggest = "account_id"
|
|
37
|
+
elif key == "excludedAccounts":
|
|
36
38
|
suggest = "excluded_accounts"
|
|
39
|
+
elif key == "isOrganizationalAccount":
|
|
40
|
+
suggest = "is_organizational_account"
|
|
37
41
|
|
|
38
42
|
if suggest:
|
|
39
43
|
pulumi.log.warn(f"Key '{key}' not found in AwsCloudProfileResponse. Access the value via the '{suggest}' property getter instead.")
|
|
@@ -47,13 +51,30 @@ class AwsCloudProfileResponse(dict):
|
|
|
47
51
|
return super().get(key, default)
|
|
48
52
|
|
|
49
53
|
def __init__(__self__, *,
|
|
50
|
-
|
|
54
|
+
account_id: str,
|
|
55
|
+
excluded_accounts: Optional[Sequence[str]] = None,
|
|
56
|
+
is_organizational_account: Optional[bool] = None):
|
|
51
57
|
"""
|
|
52
58
|
cloud profile for AWS.
|
|
59
|
+
:param str account_id: Account id for the AWS account.
|
|
53
60
|
:param Sequence[str] excluded_accounts: List of AWS accounts which need to be excluded.
|
|
61
|
+
:param bool is_organizational_account: Boolean value that indicates whether the account is organizational or not. True represents organization account, whereas false represents a single account.
|
|
54
62
|
"""
|
|
63
|
+
pulumi.set(__self__, "account_id", account_id)
|
|
55
64
|
if excluded_accounts is not None:
|
|
56
65
|
pulumi.set(__self__, "excluded_accounts", excluded_accounts)
|
|
66
|
+
if is_organizational_account is None:
|
|
67
|
+
is_organizational_account = False
|
|
68
|
+
if is_organizational_account is not None:
|
|
69
|
+
pulumi.set(__self__, "is_organizational_account", is_organizational_account)
|
|
70
|
+
|
|
71
|
+
@property
|
|
72
|
+
@pulumi.getter(name="accountId")
|
|
73
|
+
def account_id(self) -> str:
|
|
74
|
+
"""
|
|
75
|
+
Account id for the AWS account.
|
|
76
|
+
"""
|
|
77
|
+
return pulumi.get(self, "account_id")
|
|
57
78
|
|
|
58
79
|
@property
|
|
59
80
|
@pulumi.getter(name="excludedAccounts")
|
|
@@ -63,6 +84,14 @@ class AwsCloudProfileResponse(dict):
|
|
|
63
84
|
"""
|
|
64
85
|
return pulumi.get(self, "excluded_accounts")
|
|
65
86
|
|
|
87
|
+
@property
|
|
88
|
+
@pulumi.getter(name="isOrganizationalAccount")
|
|
89
|
+
def is_organizational_account(self) -> Optional[bool]:
|
|
90
|
+
"""
|
|
91
|
+
Boolean value that indicates whether the account is organizational or not. True represents organization account, whereas false represents a single account.
|
|
92
|
+
"""
|
|
93
|
+
return pulumi.get(self, "is_organizational_account")
|
|
94
|
+
|
|
66
95
|
|
|
67
96
|
@pulumi.output_type
|
|
68
97
|
class EndpointPropertiesResponse(dict):
|
|
@@ -140,6 +169,8 @@ class PublicCloudConnectorPropertiesResponse(dict):
|
|
|
140
169
|
suggest = "aws_cloud_profile"
|
|
141
170
|
elif key == "connectorPrimaryIdentifier":
|
|
142
171
|
suggest = "connector_primary_identifier"
|
|
172
|
+
elif key == "hostType":
|
|
173
|
+
suggest = "host_type"
|
|
143
174
|
elif key == "provisioningState":
|
|
144
175
|
suggest = "provisioning_state"
|
|
145
176
|
|
|
@@ -157,15 +188,18 @@ class PublicCloudConnectorPropertiesResponse(dict):
|
|
|
157
188
|
def __init__(__self__, *,
|
|
158
189
|
aws_cloud_profile: 'outputs.AwsCloudProfileResponse',
|
|
159
190
|
connector_primary_identifier: str,
|
|
191
|
+
host_type: str,
|
|
160
192
|
provisioning_state: str):
|
|
161
193
|
"""
|
|
162
194
|
Properties of public cloud connectors.
|
|
163
195
|
:param 'AwsCloudProfileResponse' aws_cloud_profile: Cloud profile for AWS.
|
|
164
196
|
:param str connector_primary_identifier: Connector primary identifier.
|
|
197
|
+
:param str host_type: Host cloud the public cloud connector.
|
|
165
198
|
:param str provisioning_state: The resource provisioning state.
|
|
166
199
|
"""
|
|
167
200
|
pulumi.set(__self__, "aws_cloud_profile", aws_cloud_profile)
|
|
168
201
|
pulumi.set(__self__, "connector_primary_identifier", connector_primary_identifier)
|
|
202
|
+
pulumi.set(__self__, "host_type", host_type)
|
|
169
203
|
pulumi.set(__self__, "provisioning_state", provisioning_state)
|
|
170
204
|
|
|
171
205
|
@property
|
|
@@ -184,6 +218,14 @@ class PublicCloudConnectorPropertiesResponse(dict):
|
|
|
184
218
|
"""
|
|
185
219
|
return pulumi.get(self, "connector_primary_identifier")
|
|
186
220
|
|
|
221
|
+
@property
|
|
222
|
+
@pulumi.getter(name="hostType")
|
|
223
|
+
def host_type(self) -> str:
|
|
224
|
+
"""
|
|
225
|
+
Host cloud the public cloud connector.
|
|
226
|
+
"""
|
|
227
|
+
return pulumi.get(self, "host_type")
|
|
228
|
+
|
|
187
229
|
@property
|
|
188
230
|
@pulumi.getter(name="provisioningState")
|
|
189
231
|
def provisioning_state(self) -> str:
|
|
@@ -5508,11 +5508,7 @@ if not MYPY:
|
|
|
5508
5508
|
"""
|
|
5509
5509
|
name: pulumi.Input[str]
|
|
5510
5510
|
"""
|
|
5511
|
-
The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - API-based discovery of
|
|
5512
|
-
Available for CloudPosture plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.
|
|
5513
|
-
Available for StorageAccounts plan.<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.
|
|
5514
|
-
Available for StorageAccounts and CloudPosture plans.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.
|
|
5515
|
-
Available for CloudPosture and Containers plans.
|
|
5511
|
+
The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - Provides zero footprint, API-based discovery of Kubernetes clusters, their configurations and deployments. The collected data is used to create a contextualized security graph for Kubernetes clusters, provide risk hunting capabilities, and visualize risks and threats to Kubernetes environments and workloads.<br>Available for CloudPosture plan and Containers plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plans).<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plan) and CloudPosture plan.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.<br>Available for CloudPosture plan and Containers plan.<br><br>**MdeDesignatedSubscription** - Direct onboarding is a seamless integration between Defender for Endpoint and Defender for Cloud that doesn’t require extra software deployment on your servers. The onboarded resources will be presented under a designated Azure Subscription you configure<br>Available for VirtualMachines plan (P1 and P2 sub plans).<br><br>**AgentlessVmScanning** - Scans your machines for installed software, vulnerabilities, malware and secret scanning without relying on agents or impacting machine performance. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-agentless-data-collection.<br>Available for CloudPosture plan, VirtualMachines plan (P2 sub plan) and Containers plan.<br><br>**EntraPermissionsManagement** - Permissions Management provides Cloud Infrastructure Entitlement Management (CIEM) capabilities that helps organizations to manage and control user access and entitlements in their cloud infrastructure - important attack vector for cloud environments.<br>Permissions Management analyzes all permissions and active usage, and suggests recommendations to reduce permissions to enforce the principle of least privilege. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/permissions-management.<br>Available for CloudPosture plan. <br><br>**FileIntegrityMonitoring** - File integrity monitoring (FIM), examines operating system files.<br>Windows registries, Linux system files, in real time, for changes that might indicate an attack.<br>Available for VirtualMachines plan (P2 sub plan). <br><br>**ContainerSensor** - The sensor is based on IG and provides a rich threat detection suite for Kubernetes clusters, nodes, and workloads, powered by Microsoft leading threat intelligence, provides mapping to MITRE ATT&CK framework.<br>Available for Containers plan. <br><br>**AIPromptEvidence** - Exposes the prompts passed between the user and the AI model as alert evidence. This helps classify and triage the alerts with relevant user context. The prompt snippets will include only segments of the user prompt or model response that were deemed suspicious and relevant for security classifications. The prompt evidence will be available through Defender portal as part of each alert.<br>Available for AI plan. <br><br>
|
|
5516
5512
|
"""
|
|
5517
5513
|
additional_extension_properties: NotRequired[Any]
|
|
5518
5514
|
"""
|
|
@@ -5530,11 +5526,7 @@ class ExtensionArgs:
|
|
|
5530
5526
|
"""
|
|
5531
5527
|
A plan's extension properties
|
|
5532
5528
|
:param pulumi.Input[Union[str, 'IsEnabled']] is_enabled: Indicates whether the extension is enabled.
|
|
5533
|
-
:param pulumi.Input[str] name: The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - API-based discovery of
|
|
5534
|
-
Available for CloudPosture plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.
|
|
5535
|
-
Available for StorageAccounts plan.<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.
|
|
5536
|
-
Available for StorageAccounts and CloudPosture plans.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.
|
|
5537
|
-
Available for CloudPosture and Containers plans.
|
|
5529
|
+
:param pulumi.Input[str] name: The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - Provides zero footprint, API-based discovery of Kubernetes clusters, their configurations and deployments. The collected data is used to create a contextualized security graph for Kubernetes clusters, provide risk hunting capabilities, and visualize risks and threats to Kubernetes environments and workloads.<br>Available for CloudPosture plan and Containers plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plans).<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plan) and CloudPosture plan.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.<br>Available for CloudPosture plan and Containers plan.<br><br>**MdeDesignatedSubscription** - Direct onboarding is a seamless integration between Defender for Endpoint and Defender for Cloud that doesn’t require extra software deployment on your servers. The onboarded resources will be presented under a designated Azure Subscription you configure<br>Available for VirtualMachines plan (P1 and P2 sub plans).<br><br>**AgentlessVmScanning** - Scans your machines for installed software, vulnerabilities, malware and secret scanning without relying on agents or impacting machine performance. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-agentless-data-collection.<br>Available for CloudPosture plan, VirtualMachines plan (P2 sub plan) and Containers plan.<br><br>**EntraPermissionsManagement** - Permissions Management provides Cloud Infrastructure Entitlement Management (CIEM) capabilities that helps organizations to manage and control user access and entitlements in their cloud infrastructure - important attack vector for cloud environments.<br>Permissions Management analyzes all permissions and active usage, and suggests recommendations to reduce permissions to enforce the principle of least privilege. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/permissions-management.<br>Available for CloudPosture plan. <br><br>**FileIntegrityMonitoring** - File integrity monitoring (FIM), examines operating system files.<br>Windows registries, Linux system files, in real time, for changes that might indicate an attack.<br>Available for VirtualMachines plan (P2 sub plan). <br><br>**ContainerSensor** - The sensor is based on IG and provides a rich threat detection suite for Kubernetes clusters, nodes, and workloads, powered by Microsoft leading threat intelligence, provides mapping to MITRE ATT&CK framework.<br>Available for Containers plan. <br><br>**AIPromptEvidence** - Exposes the prompts passed between the user and the AI model as alert evidence. This helps classify and triage the alerts with relevant user context. The prompt snippets will include only segments of the user prompt or model response that were deemed suspicious and relevant for security classifications. The prompt evidence will be available through Defender portal as part of each alert.<br>Available for AI plan. <br><br>
|
|
5538
5530
|
:param Any additional_extension_properties: Property values associated with the extension.
|
|
5539
5531
|
"""
|
|
5540
5532
|
pulumi.set(__self__, "is_enabled", is_enabled)
|
|
@@ -5558,11 +5550,7 @@ class ExtensionArgs:
|
|
|
5558
5550
|
@pulumi.getter
|
|
5559
5551
|
def name(self) -> pulumi.Input[str]:
|
|
5560
5552
|
"""
|
|
5561
|
-
The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - API-based discovery of
|
|
5562
|
-
Available for CloudPosture plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.
|
|
5563
|
-
Available for StorageAccounts plan.<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.
|
|
5564
|
-
Available for StorageAccounts and CloudPosture plans.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.
|
|
5565
|
-
Available for CloudPosture and Containers plans.
|
|
5553
|
+
The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - Provides zero footprint, API-based discovery of Kubernetes clusters, their configurations and deployments. The collected data is used to create a contextualized security graph for Kubernetes clusters, provide risk hunting capabilities, and visualize risks and threats to Kubernetes environments and workloads.<br>Available for CloudPosture plan and Containers plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plans).<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plan) and CloudPosture plan.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.<br>Available for CloudPosture plan and Containers plan.<br><br>**MdeDesignatedSubscription** - Direct onboarding is a seamless integration between Defender for Endpoint and Defender for Cloud that doesn’t require extra software deployment on your servers. The onboarded resources will be presented under a designated Azure Subscription you configure<br>Available for VirtualMachines plan (P1 and P2 sub plans).<br><br>**AgentlessVmScanning** - Scans your machines for installed software, vulnerabilities, malware and secret scanning without relying on agents or impacting machine performance. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-agentless-data-collection.<br>Available for CloudPosture plan, VirtualMachines plan (P2 sub plan) and Containers plan.<br><br>**EntraPermissionsManagement** - Permissions Management provides Cloud Infrastructure Entitlement Management (CIEM) capabilities that helps organizations to manage and control user access and entitlements in their cloud infrastructure - important attack vector for cloud environments.<br>Permissions Management analyzes all permissions and active usage, and suggests recommendations to reduce permissions to enforce the principle of least privilege. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/permissions-management.<br>Available for CloudPosture plan. <br><br>**FileIntegrityMonitoring** - File integrity monitoring (FIM), examines operating system files.<br>Windows registries, Linux system files, in real time, for changes that might indicate an attack.<br>Available for VirtualMachines plan (P2 sub plan). <br><br>**ContainerSensor** - The sensor is based on IG and provides a rich threat detection suite for Kubernetes clusters, nodes, and workloads, powered by Microsoft leading threat intelligence, provides mapping to MITRE ATT&CK framework.<br>Available for Containers plan. <br><br>**AIPromptEvidence** - Exposes the prompts passed between the user and the AI model as alert evidence. This helps classify and triage the alerts with relevant user context. The prompt snippets will include only segments of the user prompt or model response that were deemed suspicious and relevant for security classifications. The prompt evidence will be available through Defender portal as part of each alert.<br>Available for AI plan. <br><br>
|
|
5566
5554
|
"""
|
|
5567
5555
|
return pulumi.get(self, "name")
|
|
5568
5556
|
|
|
@@ -5485,11 +5485,7 @@ class ExtensionResponse(dict):
|
|
|
5485
5485
|
"""
|
|
5486
5486
|
A plan's extension properties
|
|
5487
5487
|
:param str is_enabled: Indicates whether the extension is enabled.
|
|
5488
|
-
:param str name: The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - API-based discovery of
|
|
5489
|
-
Available for CloudPosture plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.
|
|
5490
|
-
Available for StorageAccounts plan.<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.
|
|
5491
|
-
Available for StorageAccounts and CloudPosture plans.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.
|
|
5492
|
-
Available for CloudPosture and Containers plans.
|
|
5488
|
+
:param str name: The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - Provides zero footprint, API-based discovery of Kubernetes clusters, their configurations and deployments. The collected data is used to create a contextualized security graph for Kubernetes clusters, provide risk hunting capabilities, and visualize risks and threats to Kubernetes environments and workloads.<br>Available for CloudPosture plan and Containers plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plans).<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plan) and CloudPosture plan.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.<br>Available for CloudPosture plan and Containers plan.<br><br>**MdeDesignatedSubscription** - Direct onboarding is a seamless integration between Defender for Endpoint and Defender for Cloud that doesn’t require extra software deployment on your servers. The onboarded resources will be presented under a designated Azure Subscription you configure<br>Available for VirtualMachines plan (P1 and P2 sub plans).<br><br>**AgentlessVmScanning** - Scans your machines for installed software, vulnerabilities, malware and secret scanning without relying on agents or impacting machine performance. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-agentless-data-collection.<br>Available for CloudPosture plan, VirtualMachines plan (P2 sub plan) and Containers plan.<br><br>**EntraPermissionsManagement** - Permissions Management provides Cloud Infrastructure Entitlement Management (CIEM) capabilities that helps organizations to manage and control user access and entitlements in their cloud infrastructure - important attack vector for cloud environments.<br>Permissions Management analyzes all permissions and active usage, and suggests recommendations to reduce permissions to enforce the principle of least privilege. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/permissions-management.<br>Available for CloudPosture plan. <br><br>**FileIntegrityMonitoring** - File integrity monitoring (FIM), examines operating system files.<br>Windows registries, Linux system files, in real time, for changes that might indicate an attack.<br>Available for VirtualMachines plan (P2 sub plan). <br><br>**ContainerSensor** - The sensor is based on IG and provides a rich threat detection suite for Kubernetes clusters, nodes, and workloads, powered by Microsoft leading threat intelligence, provides mapping to MITRE ATT&CK framework.<br>Available for Containers plan. <br><br>**AIPromptEvidence** - Exposes the prompts passed between the user and the AI model as alert evidence. This helps classify and triage the alerts with relevant user context. The prompt snippets will include only segments of the user prompt or model response that were deemed suspicious and relevant for security classifications. The prompt evidence will be available through Defender portal as part of each alert.<br>Available for AI plan. <br><br>
|
|
5493
5489
|
:param 'OperationStatusResponse' operation_status: Optional. A status describing the success/failure of the extension's enablement/disablement operation.
|
|
5494
5490
|
:param Any additional_extension_properties: Property values associated with the extension.
|
|
5495
5491
|
"""
|
|
@@ -5511,11 +5507,7 @@ class ExtensionResponse(dict):
|
|
|
5511
5507
|
@pulumi.getter
|
|
5512
5508
|
def name(self) -> str:
|
|
5513
5509
|
"""
|
|
5514
|
-
The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - API-based discovery of
|
|
5515
|
-
Available for CloudPosture plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.
|
|
5516
|
-
Available for StorageAccounts plan.<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.
|
|
5517
|
-
Available for StorageAccounts and CloudPosture plans.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.
|
|
5518
|
-
Available for CloudPosture and Containers plans.
|
|
5510
|
+
The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - Provides zero footprint, API-based discovery of Kubernetes clusters, their configurations and deployments. The collected data is used to create a contextualized security graph for Kubernetes clusters, provide risk hunting capabilities, and visualize risks and threats to Kubernetes environments and workloads.<br>Available for CloudPosture plan and Containers plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plans).<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plan) and CloudPosture plan.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.<br>Available for CloudPosture plan and Containers plan.<br><br>**MdeDesignatedSubscription** - Direct onboarding is a seamless integration between Defender for Endpoint and Defender for Cloud that doesn’t require extra software deployment on your servers. The onboarded resources will be presented under a designated Azure Subscription you configure<br>Available for VirtualMachines plan (P1 and P2 sub plans).<br><br>**AgentlessVmScanning** - Scans your machines for installed software, vulnerabilities, malware and secret scanning without relying on agents or impacting machine performance. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-agentless-data-collection.<br>Available for CloudPosture plan, VirtualMachines plan (P2 sub plan) and Containers plan.<br><br>**EntraPermissionsManagement** - Permissions Management provides Cloud Infrastructure Entitlement Management (CIEM) capabilities that helps organizations to manage and control user access and entitlements in their cloud infrastructure - important attack vector for cloud environments.<br>Permissions Management analyzes all permissions and active usage, and suggests recommendations to reduce permissions to enforce the principle of least privilege. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/permissions-management.<br>Available for CloudPosture plan. <br><br>**FileIntegrityMonitoring** - File integrity monitoring (FIM), examines operating system files.<br>Windows registries, Linux system files, in real time, for changes that might indicate an attack.<br>Available for VirtualMachines plan (P2 sub plan). <br><br>**ContainerSensor** - The sensor is based on IG and provides a rich threat detection suite for Kubernetes clusters, nodes, and workloads, powered by Microsoft leading threat intelligence, provides mapping to MITRE ATT&CK framework.<br>Available for Containers plan. <br><br>**AIPromptEvidence** - Exposes the prompts passed between the user and the AI model as alert evidence. This helps classify and triage the alerts with relevant user context. The prompt snippets will include only segments of the user prompt or model response that were deemed suspicious and relevant for security classifications. The prompt evidence will be available through Defender portal as part of each alert.<br>Available for AI plan. <br><br>
|
|
5519
5511
|
"""
|
|
5520
5512
|
return pulumi.get(self, "name")
|
|
5521
5513
|
|
|
@@ -33,11 +33,7 @@ if not MYPY:
|
|
|
33
33
|
"""
|
|
34
34
|
name: pulumi.Input[str]
|
|
35
35
|
"""
|
|
36
|
-
The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - API-based discovery of
|
|
37
|
-
Available for CloudPosture plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.
|
|
38
|
-
Available for StorageAccounts plan.<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.
|
|
39
|
-
Available for StorageAccounts and CloudPosture plans.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.
|
|
40
|
-
Available for CloudPosture and Containers plans.
|
|
36
|
+
The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - Provides zero footprint, API-based discovery of Kubernetes clusters, their configurations and deployments. The collected data is used to create a contextualized security graph for Kubernetes clusters, provide risk hunting capabilities, and visualize risks and threats to Kubernetes environments and workloads.<br>Available for CloudPosture plan and Containers plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plans).<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plan) and CloudPosture plan.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.<br>Available for CloudPosture plan and Containers plan.<br><br>**MdeDesignatedSubscription** - Direct onboarding is a seamless integration between Defender for Endpoint and Defender for Cloud that doesn’t require extra software deployment on your servers. The onboarded resources will be presented under a designated Azure Subscription you configure<br>Available for VirtualMachines plan (P1 and P2 sub plans).<br><br>**AgentlessVmScanning** - Scans your machines for installed software, vulnerabilities, malware and secret scanning without relying on agents or impacting machine performance. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-agentless-data-collection.<br>Available for CloudPosture plan, VirtualMachines plan (P2 sub plan) and Containers plan.<br><br>**EntraPermissionsManagement** - Permissions Management provides Cloud Infrastructure Entitlement Management (CIEM) capabilities that helps organizations to manage and control user access and entitlements in their cloud infrastructure - important attack vector for cloud environments.<br>Permissions Management analyzes all permissions and active usage, and suggests recommendations to reduce permissions to enforce the principle of least privilege. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/permissions-management.<br>Available for CloudPosture plan. <br><br>**FileIntegrityMonitoring** - File integrity monitoring (FIM), examines operating system files.<br>Windows registries, Linux system files, in real time, for changes that might indicate an attack.<br>Available for VirtualMachines plan (P2 sub plan). <br><br>**ContainerSensor** - The sensor is based on IG and provides a rich threat detection suite for Kubernetes clusters, nodes, and workloads, powered by Microsoft leading threat intelligence, provides mapping to MITRE ATT&CK framework.<br>Available for Containers plan. <br><br>**AIPromptEvidence** - Exposes the prompts passed between the user and the AI model as alert evidence. This helps classify and triage the alerts with relevant user context. The prompt snippets will include only segments of the user prompt or model response that were deemed suspicious and relevant for security classifications. The prompt evidence will be available through Defender portal as part of each alert.<br>Available for AI plan. <br><br>
|
|
41
37
|
"""
|
|
42
38
|
additional_extension_properties: NotRequired[Any]
|
|
43
39
|
"""
|
|
@@ -55,11 +51,7 @@ class ExtensionArgs:
|
|
|
55
51
|
"""
|
|
56
52
|
A plan's extension properties
|
|
57
53
|
:param pulumi.Input[Union[str, 'IsEnabled']] is_enabled: Indicates whether the extension is enabled.
|
|
58
|
-
:param pulumi.Input[str] name: The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - API-based discovery of
|
|
59
|
-
Available for CloudPosture plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.
|
|
60
|
-
Available for StorageAccounts plan.<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.
|
|
61
|
-
Available for StorageAccounts and CloudPosture plans.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.
|
|
62
|
-
Available for CloudPosture and Containers plans.
|
|
54
|
+
:param pulumi.Input[str] name: The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - Provides zero footprint, API-based discovery of Kubernetes clusters, their configurations and deployments. The collected data is used to create a contextualized security graph for Kubernetes clusters, provide risk hunting capabilities, and visualize risks and threats to Kubernetes environments and workloads.<br>Available for CloudPosture plan and Containers plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plans).<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plan) and CloudPosture plan.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.<br>Available for CloudPosture plan and Containers plan.<br><br>**MdeDesignatedSubscription** - Direct onboarding is a seamless integration between Defender for Endpoint and Defender for Cloud that doesn’t require extra software deployment on your servers. The onboarded resources will be presented under a designated Azure Subscription you configure<br>Available for VirtualMachines plan (P1 and P2 sub plans).<br><br>**AgentlessVmScanning** - Scans your machines for installed software, vulnerabilities, malware and secret scanning without relying on agents or impacting machine performance. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-agentless-data-collection.<br>Available for CloudPosture plan, VirtualMachines plan (P2 sub plan) and Containers plan.<br><br>**EntraPermissionsManagement** - Permissions Management provides Cloud Infrastructure Entitlement Management (CIEM) capabilities that helps organizations to manage and control user access and entitlements in their cloud infrastructure - important attack vector for cloud environments.<br>Permissions Management analyzes all permissions and active usage, and suggests recommendations to reduce permissions to enforce the principle of least privilege. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/permissions-management.<br>Available for CloudPosture plan. <br><br>**FileIntegrityMonitoring** - File integrity monitoring (FIM), examines operating system files.<br>Windows registries, Linux system files, in real time, for changes that might indicate an attack.<br>Available for VirtualMachines plan (P2 sub plan). <br><br>**ContainerSensor** - The sensor is based on IG and provides a rich threat detection suite for Kubernetes clusters, nodes, and workloads, powered by Microsoft leading threat intelligence, provides mapping to MITRE ATT&CK framework.<br>Available for Containers plan. <br><br>**AIPromptEvidence** - Exposes the prompts passed between the user and the AI model as alert evidence. This helps classify and triage the alerts with relevant user context. The prompt snippets will include only segments of the user prompt or model response that were deemed suspicious and relevant for security classifications. The prompt evidence will be available through Defender portal as part of each alert.<br>Available for AI plan. <br><br>
|
|
63
55
|
:param Any additional_extension_properties: Property values associated with the extension.
|
|
64
56
|
"""
|
|
65
57
|
pulumi.set(__self__, "is_enabled", is_enabled)
|
|
@@ -83,11 +75,7 @@ class ExtensionArgs:
|
|
|
83
75
|
@pulumi.getter
|
|
84
76
|
def name(self) -> pulumi.Input[str]:
|
|
85
77
|
"""
|
|
86
|
-
The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - API-based discovery of
|
|
87
|
-
Available for CloudPosture plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.
|
|
88
|
-
Available for StorageAccounts plan.<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.
|
|
89
|
-
Available for StorageAccounts and CloudPosture plans.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.
|
|
90
|
-
Available for CloudPosture and Containers plans.
|
|
78
|
+
The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - Provides zero footprint, API-based discovery of Kubernetes clusters, their configurations and deployments. The collected data is used to create a contextualized security graph for Kubernetes clusters, provide risk hunting capabilities, and visualize risks and threats to Kubernetes environments and workloads.<br>Available for CloudPosture plan and Containers plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plans).<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plan) and CloudPosture plan.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.<br>Available for CloudPosture plan and Containers plan.<br><br>**MdeDesignatedSubscription** - Direct onboarding is a seamless integration between Defender for Endpoint and Defender for Cloud that doesn’t require extra software deployment on your servers. The onboarded resources will be presented under a designated Azure Subscription you configure<br>Available for VirtualMachines plan (P1 and P2 sub plans).<br><br>**AgentlessVmScanning** - Scans your machines for installed software, vulnerabilities, malware and secret scanning without relying on agents or impacting machine performance. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-agentless-data-collection.<br>Available for CloudPosture plan, VirtualMachines plan (P2 sub plan) and Containers plan.<br><br>**EntraPermissionsManagement** - Permissions Management provides Cloud Infrastructure Entitlement Management (CIEM) capabilities that helps organizations to manage and control user access and entitlements in their cloud infrastructure - important attack vector for cloud environments.<br>Permissions Management analyzes all permissions and active usage, and suggests recommendations to reduce permissions to enforce the principle of least privilege. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/permissions-management.<br>Available for CloudPosture plan. <br><br>**FileIntegrityMonitoring** - File integrity monitoring (FIM), examines operating system files.<br>Windows registries, Linux system files, in real time, for changes that might indicate an attack.<br>Available for VirtualMachines plan (P2 sub plan). <br><br>**ContainerSensor** - The sensor is based on IG and provides a rich threat detection suite for Kubernetes clusters, nodes, and workloads, powered by Microsoft leading threat intelligence, provides mapping to MITRE ATT&CK framework.<br>Available for Containers plan. <br><br>**AIPromptEvidence** - Exposes the prompts passed between the user and the AI model as alert evidence. This helps classify and triage the alerts with relevant user context. The prompt snippets will include only segments of the user prompt or model response that were deemed suspicious and relevant for security classifications. The prompt evidence will be available through Defender portal as part of each alert.<br>Available for AI plan. <br><br>
|
|
91
79
|
"""
|
|
92
80
|
return pulumi.get(self, "name")
|
|
93
81
|
|