pulumi-azure-native 2.66.0a1728396986__py3-none-any.whl → 2.66.0a1728463590__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-azure-native might be problematic. Click here for more details.

Files changed (525) hide show
  1. pulumi_azure_native/__init__.py +66 -0
  2. pulumi_azure_native/app/__init__.py +3 -0
  3. pulumi_azure_native/app/app_resiliency.py +3 -3
  4. pulumi_azure_native/app/build.py +3 -3
  5. pulumi_azure_native/app/builder.py +3 -3
  6. pulumi_azure_native/app/certificate.py +3 -3
  7. pulumi_azure_native/app/connected_environment.py +3 -3
  8. pulumi_azure_native/app/connected_environments_certificate.py +3 -3
  9. pulumi_azure_native/app/connected_environments_dapr_component.py +3 -3
  10. pulumi_azure_native/app/connected_environments_storage.py +3 -3
  11. pulumi_azure_native/app/container_app.py +3 -3
  12. pulumi_azure_native/app/container_apps_auth_config.py +3 -3
  13. pulumi_azure_native/app/container_apps_session_pool.py +5 -1
  14. pulumi_azure_native/app/container_apps_source_control.py +3 -3
  15. pulumi_azure_native/app/dapr_component.py +3 -3
  16. pulumi_azure_native/app/dapr_component_resiliency_policy.py +3 -3
  17. pulumi_azure_native/app/dapr_subscription.py +3 -3
  18. pulumi_azure_native/app/dot_net_component.py +3 -3
  19. pulumi_azure_native/app/get_app_resiliency.py +2 -2
  20. pulumi_azure_native/app/get_build.py +2 -2
  21. pulumi_azure_native/app/get_builder.py +2 -2
  22. pulumi_azure_native/app/get_certificate.py +2 -2
  23. pulumi_azure_native/app/get_connected_environment.py +2 -2
  24. pulumi_azure_native/app/get_connected_environments_certificate.py +2 -2
  25. pulumi_azure_native/app/get_connected_environments_dapr_component.py +2 -2
  26. pulumi_azure_native/app/get_connected_environments_storage.py +2 -2
  27. pulumi_azure_native/app/get_container_app.py +2 -2
  28. pulumi_azure_native/app/get_container_app_auth_token.py +2 -2
  29. pulumi_azure_native/app/get_container_apps_auth_config.py +2 -2
  30. pulumi_azure_native/app/get_container_apps_session_pool.py +4 -0
  31. pulumi_azure_native/app/get_container_apps_source_control.py +2 -2
  32. pulumi_azure_native/app/get_custom_domain_verification_id.py +2 -2
  33. pulumi_azure_native/app/get_dapr_component.py +2 -2
  34. pulumi_azure_native/app/get_dapr_component_resiliency_policy.py +2 -2
  35. pulumi_azure_native/app/get_dapr_subscription.py +2 -2
  36. pulumi_azure_native/app/get_dot_net_component.py +2 -2
  37. pulumi_azure_native/app/get_java_component.py +2 -2
  38. pulumi_azure_native/app/get_job.py +2 -2
  39. pulumi_azure_native/app/get_logic_app.py +4 -0
  40. pulumi_azure_native/app/get_managed_certificate.py +2 -2
  41. pulumi_azure_native/app/get_managed_environment.py +2 -2
  42. pulumi_azure_native/app/get_managed_environment_auth_token.py +2 -2
  43. pulumi_azure_native/app/get_managed_environment_private_endpoint_connection.py +4 -0
  44. pulumi_azure_native/app/get_managed_environments_storage.py +2 -2
  45. pulumi_azure_native/app/java_component.py +3 -3
  46. pulumi_azure_native/app/job.py +3 -3
  47. pulumi_azure_native/app/list_build_auth_token.py +2 -2
  48. pulumi_azure_native/app/list_connected_environments_dapr_component_secrets.py +2 -2
  49. pulumi_azure_native/app/list_container_app_custom_host_name_analysis.py +2 -2
  50. pulumi_azure_native/app/list_container_app_secrets.py +2 -2
  51. pulumi_azure_native/app/list_dapr_component_secrets.py +2 -2
  52. pulumi_azure_native/app/list_job_secrets.py +2 -2
  53. pulumi_azure_native/app/list_logic_app_workflows_connections.py +4 -0
  54. pulumi_azure_native/app/logic_app.py +5 -1
  55. pulumi_azure_native/app/managed_certificate.py +3 -3
  56. pulumi_azure_native/app/managed_environment.py +3 -3
  57. pulumi_azure_native/app/managed_environment_private_endpoint_connection.py +5 -1
  58. pulumi_azure_native/app/managed_environments_storage.py +3 -3
  59. pulumi_azure_native/app/v20220101preview/certificate.py +1 -1
  60. pulumi_azure_native/app/v20220101preview/container_app.py +1 -1
  61. pulumi_azure_native/app/v20220101preview/container_apps_auth_config.py +1 -1
  62. pulumi_azure_native/app/v20220101preview/container_apps_source_control.py +1 -1
  63. pulumi_azure_native/app/v20220101preview/dapr_component.py +1 -1
  64. pulumi_azure_native/app/v20220101preview/managed_environment.py +1 -1
  65. pulumi_azure_native/app/v20220101preview/managed_environments_storage.py +1 -1
  66. pulumi_azure_native/app/v20221001/certificate.py +1 -1
  67. pulumi_azure_native/app/v20221001/connected_environment.py +1 -1
  68. pulumi_azure_native/app/v20221001/connected_environments_certificate.py +1 -1
  69. pulumi_azure_native/app/v20221001/connected_environments_dapr_component.py +1 -1
  70. pulumi_azure_native/app/v20221001/connected_environments_storage.py +1 -1
  71. pulumi_azure_native/app/v20221001/container_app.py +1 -1
  72. pulumi_azure_native/app/v20221001/container_apps_auth_config.py +1 -1
  73. pulumi_azure_native/app/v20221001/container_apps_source_control.py +1 -1
  74. pulumi_azure_native/app/v20221001/dapr_component.py +1 -1
  75. pulumi_azure_native/app/v20221001/managed_environment.py +1 -1
  76. pulumi_azure_native/app/v20221001/managed_environments_storage.py +1 -1
  77. pulumi_azure_native/app/v20230401preview/certificate.py +1 -1
  78. pulumi_azure_native/app/v20230401preview/connected_environment.py +1 -1
  79. pulumi_azure_native/app/v20230401preview/connected_environments_certificate.py +1 -1
  80. pulumi_azure_native/app/v20230401preview/connected_environments_dapr_component.py +1 -1
  81. pulumi_azure_native/app/v20230401preview/connected_environments_storage.py +1 -1
  82. pulumi_azure_native/app/v20230401preview/container_app.py +1 -1
  83. pulumi_azure_native/app/v20230401preview/container_apps_auth_config.py +1 -1
  84. pulumi_azure_native/app/v20230401preview/container_apps_source_control.py +1 -1
  85. pulumi_azure_native/app/v20230401preview/dapr_component.py +1 -1
  86. pulumi_azure_native/app/v20230401preview/job.py +1 -1
  87. pulumi_azure_native/app/v20230401preview/managed_certificate.py +1 -1
  88. pulumi_azure_native/app/v20230401preview/managed_environment.py +1 -1
  89. pulumi_azure_native/app/v20230401preview/managed_environments_storage.py +1 -1
  90. pulumi_azure_native/app/v20230501/certificate.py +1 -1
  91. pulumi_azure_native/app/v20230501/connected_environment.py +1 -1
  92. pulumi_azure_native/app/v20230501/connected_environments_certificate.py +1 -1
  93. pulumi_azure_native/app/v20230501/connected_environments_dapr_component.py +1 -1
  94. pulumi_azure_native/app/v20230501/connected_environments_storage.py +1 -1
  95. pulumi_azure_native/app/v20230501/container_app.py +1 -1
  96. pulumi_azure_native/app/v20230501/container_apps_auth_config.py +1 -1
  97. pulumi_azure_native/app/v20230501/container_apps_source_control.py +1 -1
  98. pulumi_azure_native/app/v20230501/dapr_component.py +1 -1
  99. pulumi_azure_native/app/v20230501/job.py +1 -1
  100. pulumi_azure_native/app/v20230501/managed_certificate.py +1 -1
  101. pulumi_azure_native/app/v20230501/managed_environment.py +1 -1
  102. pulumi_azure_native/app/v20230501/managed_environments_storage.py +1 -1
  103. pulumi_azure_native/app/v20230502preview/certificate.py +1 -1
  104. pulumi_azure_native/app/v20230502preview/connected_environment.py +1 -1
  105. pulumi_azure_native/app/v20230502preview/connected_environments_certificate.py +1 -1
  106. pulumi_azure_native/app/v20230502preview/connected_environments_dapr_component.py +1 -1
  107. pulumi_azure_native/app/v20230502preview/connected_environments_storage.py +1 -1
  108. pulumi_azure_native/app/v20230502preview/container_app.py +1 -1
  109. pulumi_azure_native/app/v20230502preview/container_apps_auth_config.py +1 -1
  110. pulumi_azure_native/app/v20230502preview/container_apps_source_control.py +1 -1
  111. pulumi_azure_native/app/v20230502preview/dapr_component.py +1 -1
  112. pulumi_azure_native/app/v20230502preview/job.py +1 -1
  113. pulumi_azure_native/app/v20230502preview/managed_certificate.py +1 -1
  114. pulumi_azure_native/app/v20230502preview/managed_environment.py +1 -1
  115. pulumi_azure_native/app/v20230502preview/managed_environments_storage.py +1 -1
  116. pulumi_azure_native/app/v20230801preview/app_resiliency.py +1 -1
  117. pulumi_azure_native/app/v20230801preview/build.py +1 -1
  118. pulumi_azure_native/app/v20230801preview/builder.py +1 -1
  119. pulumi_azure_native/app/v20230801preview/certificate.py +1 -1
  120. pulumi_azure_native/app/v20230801preview/connected_environment.py +1 -1
  121. pulumi_azure_native/app/v20230801preview/connected_environments_certificate.py +1 -1
  122. pulumi_azure_native/app/v20230801preview/connected_environments_dapr_component.py +1 -1
  123. pulumi_azure_native/app/v20230801preview/connected_environments_storage.py +1 -1
  124. pulumi_azure_native/app/v20230801preview/container_app.py +1 -1
  125. pulumi_azure_native/app/v20230801preview/container_apps_auth_config.py +1 -1
  126. pulumi_azure_native/app/v20230801preview/container_apps_source_control.py +1 -1
  127. pulumi_azure_native/app/v20230801preview/dapr_component.py +1 -1
  128. pulumi_azure_native/app/v20230801preview/dapr_component_resiliency_policy.py +1 -1
  129. pulumi_azure_native/app/v20230801preview/dapr_subscription.py +1 -1
  130. pulumi_azure_native/app/v20230801preview/job.py +1 -1
  131. pulumi_azure_native/app/v20230801preview/managed_certificate.py +1 -1
  132. pulumi_azure_native/app/v20230801preview/managed_environment.py +1 -1
  133. pulumi_azure_native/app/v20230801preview/managed_environments_storage.py +1 -1
  134. pulumi_azure_native/app/v20231102preview/app_resiliency.py +1 -1
  135. pulumi_azure_native/app/v20231102preview/build.py +1 -1
  136. pulumi_azure_native/app/v20231102preview/builder.py +1 -1
  137. pulumi_azure_native/app/v20231102preview/certificate.py +1 -1
  138. pulumi_azure_native/app/v20231102preview/connected_environment.py +1 -1
  139. pulumi_azure_native/app/v20231102preview/connected_environments_certificate.py +1 -1
  140. pulumi_azure_native/app/v20231102preview/connected_environments_dapr_component.py +1 -1
  141. pulumi_azure_native/app/v20231102preview/connected_environments_storage.py +1 -1
  142. pulumi_azure_native/app/v20231102preview/container_app.py +1 -1
  143. pulumi_azure_native/app/v20231102preview/container_apps_auth_config.py +1 -1
  144. pulumi_azure_native/app/v20231102preview/container_apps_source_control.py +1 -1
  145. pulumi_azure_native/app/v20231102preview/dapr_component.py +1 -1
  146. pulumi_azure_native/app/v20231102preview/dapr_component_resiliency_policy.py +1 -1
  147. pulumi_azure_native/app/v20231102preview/dapr_subscription.py +1 -1
  148. pulumi_azure_native/app/v20231102preview/dot_net_component.py +1 -1
  149. pulumi_azure_native/app/v20231102preview/java_component.py +1 -1
  150. pulumi_azure_native/app/v20231102preview/job.py +1 -1
  151. pulumi_azure_native/app/v20231102preview/managed_certificate.py +1 -1
  152. pulumi_azure_native/app/v20231102preview/managed_environment.py +1 -1
  153. pulumi_azure_native/app/v20231102preview/managed_environments_storage.py +1 -1
  154. pulumi_azure_native/app/v20240202preview/app_resiliency.py +1 -1
  155. pulumi_azure_native/app/v20240202preview/build.py +1 -1
  156. pulumi_azure_native/app/v20240202preview/builder.py +1 -1
  157. pulumi_azure_native/app/v20240202preview/certificate.py +1 -1
  158. pulumi_azure_native/app/v20240202preview/connected_environment.py +1 -1
  159. pulumi_azure_native/app/v20240202preview/connected_environments_certificate.py +1 -1
  160. pulumi_azure_native/app/v20240202preview/connected_environments_dapr_component.py +1 -1
  161. pulumi_azure_native/app/v20240202preview/connected_environments_storage.py +1 -1
  162. pulumi_azure_native/app/v20240202preview/container_app.py +1 -1
  163. pulumi_azure_native/app/v20240202preview/container_apps_auth_config.py +1 -1
  164. pulumi_azure_native/app/v20240202preview/container_apps_session_pool.py +1 -1
  165. pulumi_azure_native/app/v20240202preview/container_apps_source_control.py +1 -1
  166. pulumi_azure_native/app/v20240202preview/dapr_component.py +1 -1
  167. pulumi_azure_native/app/v20240202preview/dapr_component_resiliency_policy.py +1 -1
  168. pulumi_azure_native/app/v20240202preview/dapr_subscription.py +1 -1
  169. pulumi_azure_native/app/v20240202preview/dot_net_component.py +1 -1
  170. pulumi_azure_native/app/v20240202preview/java_component.py +1 -1
  171. pulumi_azure_native/app/v20240202preview/job.py +1 -1
  172. pulumi_azure_native/app/v20240202preview/logic_app.py +1 -1
  173. pulumi_azure_native/app/v20240202preview/managed_certificate.py +1 -1
  174. pulumi_azure_native/app/v20240202preview/managed_environment.py +1 -1
  175. pulumi_azure_native/app/v20240202preview/managed_environment_private_endpoint_connection.py +1 -1
  176. pulumi_azure_native/app/v20240202preview/managed_environments_storage.py +1 -1
  177. pulumi_azure_native/app/v20240301/certificate.py +1 -1
  178. pulumi_azure_native/app/v20240301/connected_environment.py +1 -1
  179. pulumi_azure_native/app/v20240301/connected_environments_certificate.py +1 -1
  180. pulumi_azure_native/app/v20240301/connected_environments_dapr_component.py +1 -1
  181. pulumi_azure_native/app/v20240301/connected_environments_storage.py +1 -1
  182. pulumi_azure_native/app/v20240301/container_app.py +1 -1
  183. pulumi_azure_native/app/v20240301/container_apps_auth_config.py +1 -1
  184. pulumi_azure_native/app/v20240301/container_apps_source_control.py +1 -1
  185. pulumi_azure_native/app/v20240301/dapr_component.py +1 -1
  186. pulumi_azure_native/app/v20240301/job.py +1 -1
  187. pulumi_azure_native/app/v20240301/managed_certificate.py +1 -1
  188. pulumi_azure_native/app/v20240301/managed_environment.py +1 -1
  189. pulumi_azure_native/app/v20240301/managed_environments_storage.py +1 -1
  190. pulumi_azure_native/app/v20240802preview/__init__.py +66 -0
  191. pulumi_azure_native/app/v20240802preview/_enums.py +347 -0
  192. pulumi_azure_native/app/v20240802preview/_inputs.py +13190 -0
  193. pulumi_azure_native/app/v20240802preview/app_resiliency.py +364 -0
  194. pulumi_azure_native/app/v20240802preview/build.py +299 -0
  195. pulumi_azure_native/app/v20240802preview/builder.py +327 -0
  196. pulumi_azure_native/app/v20240802preview/certificate.py +279 -0
  197. pulumi_azure_native/app/v20240802preview/connected_environment.py +375 -0
  198. pulumi_azure_native/app/v20240802preview/connected_environments_certificate.py +279 -0
  199. pulumi_azure_native/app/v20240802preview/connected_environments_dapr_component.py +456 -0
  200. pulumi_azure_native/app/v20240802preview/connected_environments_storage.py +221 -0
  201. pulumi_azure_native/app/v20240802preview/container_app.py +599 -0
  202. pulumi_azure_native/app/v20240802preview/container_apps_auth_config.py +366 -0
  203. pulumi_azure_native/app/v20240802preview/container_apps_session_pool.py +491 -0
  204. pulumi_azure_native/app/v20240802preview/container_apps_source_control.py +296 -0
  205. pulumi_azure_native/app/v20240802preview/dapr_component.py +456 -0
  206. pulumi_azure_native/app/v20240802preview/dapr_component_resiliency_policy.py +269 -0
  207. pulumi_azure_native/app/v20240802preview/dapr_subscription.py +393 -0
  208. pulumi_azure_native/app/v20240802preview/dot_net_component.py +288 -0
  209. pulumi_azure_native/app/v20240802preview/get_app_resiliency.py +206 -0
  210. pulumi_azure_native/app/v20240802preview/get_build.py +219 -0
  211. pulumi_azure_native/app/v20240802preview/get_builder.py +201 -0
  212. pulumi_azure_native/app/v20240802preview/get_certificate.py +167 -0
  213. pulumi_azure_native/app/v20240802preview/get_connected_environment.py +240 -0
  214. pulumi_azure_native/app/v20240802preview/get_connected_environments_certificate.py +167 -0
  215. pulumi_azure_native/app/v20240802preview/get_connected_environments_dapr_component.py +245 -0
  216. pulumi_azure_native/app/v20240802preview/get_connected_environments_storage.py +141 -0
  217. pulumi_azure_native/app/v20240802preview/get_container_app.py +383 -0
  218. pulumi_azure_native/app/v20240802preview/get_container_app_auth_token.py +175 -0
  219. pulumi_azure_native/app/v20240802preview/get_container_apps_auth_config.py +206 -0
  220. pulumi_azure_native/app/v20240802preview/get_container_apps_session_pool.py +292 -0
  221. pulumi_azure_native/app/v20240802preview/get_container_apps_source_control.py +182 -0
  222. pulumi_azure_native/app/v20240802preview/get_custom_domain_verification_id.py +66 -0
  223. pulumi_azure_native/app/v20240802preview/get_dapr_component.py +245 -0
  224. pulumi_azure_native/app/v20240802preview/get_dapr_component_resiliency_policy.py +159 -0
  225. pulumi_azure_native/app/v20240802preview/get_dapr_subscription.py +219 -0
  226. pulumi_azure_native/app/v20240802preview/get_dot_net_component.py +180 -0
  227. pulumi_azure_native/app/v20240802preview/get_java_component.py +141 -0
  228. pulumi_azure_native/app/v20240802preview/get_job.py +279 -0
  229. pulumi_azure_native/app/v20240802preview/get_logic_app.py +128 -0
  230. pulumi_azure_native/app/v20240802preview/get_managed_certificate.py +167 -0
  231. pulumi_azure_native/app/v20240802preview/get_managed_environment.py +450 -0
  232. pulumi_azure_native/app/v20240802preview/get_managed_environment_auth_token.py +175 -0
  233. pulumi_azure_native/app/v20240802preview/get_managed_environment_private_endpoint_connection.py +180 -0
  234. pulumi_azure_native/app/v20240802preview/get_managed_environments_storage.py +141 -0
  235. pulumi_azure_native/app/v20240802preview/java_component.py +219 -0
  236. pulumi_azure_native/app/v20240802preview/job.py +443 -0
  237. pulumi_azure_native/app/v20240802preview/list_build_auth_token.py +101 -0
  238. pulumi_azure_native/app/v20240802preview/list_connected_environments_dapr_component_secrets.py +89 -0
  239. pulumi_azure_native/app/v20240802preview/list_container_app_custom_host_name_analysis.py +232 -0
  240. pulumi_azure_native/app/v20240802preview/list_container_app_secrets.py +84 -0
  241. pulumi_azure_native/app/v20240802preview/list_dapr_component_secrets.py +89 -0
  242. pulumi_azure_native/app/v20240802preview/list_job_secrets.py +84 -0
  243. pulumi_azure_native/app/v20240802preview/list_logic_app_workflows_connections.py +154 -0
  244. pulumi_azure_native/app/v20240802preview/logic_app.py +190 -0
  245. pulumi_azure_native/app/v20240802preview/managed_certificate.py +279 -0
  246. pulumi_azure_native/app/v20240802preview/managed_environment.py +752 -0
  247. pulumi_azure_native/app/v20240802preview/managed_environment_private_endpoint_connection.py +252 -0
  248. pulumi_azure_native/app/v20240802preview/managed_environments_storage.py +221 -0
  249. pulumi_azure_native/app/v20240802preview/outputs.py +11488 -0
  250. pulumi_azure_native/devcenter/__init__.py +5 -0
  251. pulumi_azure_native/devcenter/_inputs.py +3 -3
  252. pulumi_azure_native/devcenter/attached_network_by_dev_center.py +3 -3
  253. pulumi_azure_native/devcenter/catalog.py +3 -3
  254. pulumi_azure_native/devcenter/curation_profile.py +5 -1
  255. pulumi_azure_native/devcenter/dev_box_definition.py +3 -3
  256. pulumi_azure_native/devcenter/dev_center.py +3 -3
  257. pulumi_azure_native/devcenter/encryption_set.py +3 -3
  258. pulumi_azure_native/devcenter/environment_type.py +3 -3
  259. pulumi_azure_native/devcenter/gallery.py +3 -3
  260. pulumi_azure_native/devcenter/get_attached_network_by_dev_center.py +2 -2
  261. pulumi_azure_native/devcenter/get_catalog.py +2 -2
  262. pulumi_azure_native/devcenter/get_catalog_sync_error_details.py +2 -2
  263. pulumi_azure_native/devcenter/get_curation_profile.py +4 -0
  264. pulumi_azure_native/devcenter/get_customization_task_error_details.py +2 -2
  265. pulumi_azure_native/devcenter/get_dev_box_definition.py +2 -2
  266. pulumi_azure_native/devcenter/get_dev_center.py +2 -2
  267. pulumi_azure_native/devcenter/get_encryption_set.py +2 -2
  268. pulumi_azure_native/devcenter/get_environment_definition_error_details.py +2 -2
  269. pulumi_azure_native/devcenter/get_environment_type.py +2 -2
  270. pulumi_azure_native/devcenter/get_gallery.py +2 -2
  271. pulumi_azure_native/devcenter/get_network_connection.py +2 -2
  272. pulumi_azure_native/devcenter/get_plan.py +2 -2
  273. pulumi_azure_native/devcenter/get_plan_member.py +2 -2
  274. pulumi_azure_native/devcenter/get_pool.py +2 -2
  275. pulumi_azure_native/devcenter/get_project.py +2 -2
  276. pulumi_azure_native/devcenter/get_project_catalog.py +2 -2
  277. pulumi_azure_native/devcenter/get_project_catalog_environment_definition_error_details.py +2 -2
  278. pulumi_azure_native/devcenter/get_project_catalog_image_definition_build_details.py +2 -2
  279. pulumi_azure_native/devcenter/get_project_catalog_sync_error_details.py +2 -2
  280. pulumi_azure_native/devcenter/get_project_environment_type.py +2 -2
  281. pulumi_azure_native/devcenter/get_project_inherited_settings.py +2 -2
  282. pulumi_azure_native/devcenter/get_project_policy.py +169 -0
  283. pulumi_azure_native/devcenter/get_schedule.py +2 -2
  284. pulumi_azure_native/devcenter/list_skus_by_project.py +2 -2
  285. pulumi_azure_native/devcenter/network_connection.py +3 -3
  286. pulumi_azure_native/devcenter/outputs.py +2 -2
  287. pulumi_azure_native/devcenter/plan.py +3 -3
  288. pulumi_azure_native/devcenter/plan_member.py +3 -3
  289. pulumi_azure_native/devcenter/pool.py +3 -3
  290. pulumi_azure_native/devcenter/project.py +3 -3
  291. pulumi_azure_native/devcenter/project_catalog.py +3 -3
  292. pulumi_azure_native/devcenter/project_environment_type.py +3 -3
  293. pulumi_azure_native/devcenter/project_policy.py +261 -0
  294. pulumi_azure_native/devcenter/schedule.py +3 -3
  295. pulumi_azure_native/devcenter/v20221111preview/dev_box_definition.py +1 -1
  296. pulumi_azure_native/devcenter/v20230401/attached_network_by_dev_center.py +1 -1
  297. pulumi_azure_native/devcenter/v20230401/catalog.py +1 -1
  298. pulumi_azure_native/devcenter/v20230401/dev_box_definition.py +1 -1
  299. pulumi_azure_native/devcenter/v20230401/dev_center.py +1 -1
  300. pulumi_azure_native/devcenter/v20230401/environment_type.py +1 -1
  301. pulumi_azure_native/devcenter/v20230401/gallery.py +1 -1
  302. pulumi_azure_native/devcenter/v20230401/network_connection.py +1 -1
  303. pulumi_azure_native/devcenter/v20230401/pool.py +1 -1
  304. pulumi_azure_native/devcenter/v20230401/project.py +1 -1
  305. pulumi_azure_native/devcenter/v20230401/project_environment_type.py +1 -1
  306. pulumi_azure_native/devcenter/v20230401/schedule.py +1 -1
  307. pulumi_azure_native/devcenter/v20230801preview/attached_network_by_dev_center.py +1 -1
  308. pulumi_azure_native/devcenter/v20230801preview/catalog.py +1 -1
  309. pulumi_azure_native/devcenter/v20230801preview/dev_box_definition.py +1 -1
  310. pulumi_azure_native/devcenter/v20230801preview/dev_center.py +1 -1
  311. pulumi_azure_native/devcenter/v20230801preview/environment_type.py +1 -1
  312. pulumi_azure_native/devcenter/v20230801preview/gallery.py +1 -1
  313. pulumi_azure_native/devcenter/v20230801preview/network_connection.py +1 -1
  314. pulumi_azure_native/devcenter/v20230801preview/pool.py +1 -1
  315. pulumi_azure_native/devcenter/v20230801preview/project.py +1 -1
  316. pulumi_azure_native/devcenter/v20230801preview/project_environment_type.py +1 -1
  317. pulumi_azure_native/devcenter/v20230801preview/schedule.py +1 -1
  318. pulumi_azure_native/devcenter/v20231001preview/attached_network_by_dev_center.py +1 -1
  319. pulumi_azure_native/devcenter/v20231001preview/catalog.py +1 -1
  320. pulumi_azure_native/devcenter/v20231001preview/dev_box_definition.py +1 -1
  321. pulumi_azure_native/devcenter/v20231001preview/dev_center.py +1 -1
  322. pulumi_azure_native/devcenter/v20231001preview/environment_type.py +1 -1
  323. pulumi_azure_native/devcenter/v20231001preview/gallery.py +1 -1
  324. pulumi_azure_native/devcenter/v20231001preview/network_connection.py +1 -1
  325. pulumi_azure_native/devcenter/v20231001preview/pool.py +1 -1
  326. pulumi_azure_native/devcenter/v20231001preview/project.py +1 -1
  327. pulumi_azure_native/devcenter/v20231001preview/project_environment_type.py +1 -1
  328. pulumi_azure_native/devcenter/v20231001preview/schedule.py +1 -1
  329. pulumi_azure_native/devcenter/v20240201/attached_network_by_dev_center.py +1 -1
  330. pulumi_azure_native/devcenter/v20240201/catalog.py +1 -1
  331. pulumi_azure_native/devcenter/v20240201/dev_box_definition.py +1 -1
  332. pulumi_azure_native/devcenter/v20240201/dev_center.py +1 -1
  333. pulumi_azure_native/devcenter/v20240201/environment_type.py +1 -1
  334. pulumi_azure_native/devcenter/v20240201/gallery.py +1 -1
  335. pulumi_azure_native/devcenter/v20240201/network_connection.py +1 -1
  336. pulumi_azure_native/devcenter/v20240201/pool.py +1 -1
  337. pulumi_azure_native/devcenter/v20240201/project.py +1 -1
  338. pulumi_azure_native/devcenter/v20240201/project_catalog.py +1 -1
  339. pulumi_azure_native/devcenter/v20240201/project_environment_type.py +1 -1
  340. pulumi_azure_native/devcenter/v20240201/schedule.py +1 -1
  341. pulumi_azure_native/devcenter/v20240501preview/attached_network_by_dev_center.py +1 -1
  342. pulumi_azure_native/devcenter/v20240501preview/catalog.py +1 -1
  343. pulumi_azure_native/devcenter/v20240501preview/dev_box_definition.py +1 -1
  344. pulumi_azure_native/devcenter/v20240501preview/dev_center.py +1 -1
  345. pulumi_azure_native/devcenter/v20240501preview/encryption_set.py +1 -1
  346. pulumi_azure_native/devcenter/v20240501preview/environment_type.py +1 -1
  347. pulumi_azure_native/devcenter/v20240501preview/gallery.py +1 -1
  348. pulumi_azure_native/devcenter/v20240501preview/network_connection.py +1 -1
  349. pulumi_azure_native/devcenter/v20240501preview/plan.py +1 -1
  350. pulumi_azure_native/devcenter/v20240501preview/plan_member.py +1 -1
  351. pulumi_azure_native/devcenter/v20240501preview/pool.py +1 -1
  352. pulumi_azure_native/devcenter/v20240501preview/project.py +1 -1
  353. pulumi_azure_native/devcenter/v20240501preview/project_catalog.py +1 -1
  354. pulumi_azure_native/devcenter/v20240501preview/project_environment_type.py +1 -1
  355. pulumi_azure_native/devcenter/v20240501preview/schedule.py +1 -1
  356. pulumi_azure_native/devcenter/v20240601preview/attached_network_by_dev_center.py +1 -1
  357. pulumi_azure_native/devcenter/v20240601preview/catalog.py +1 -1
  358. pulumi_azure_native/devcenter/v20240601preview/dev_box_definition.py +1 -1
  359. pulumi_azure_native/devcenter/v20240601preview/dev_center.py +1 -1
  360. pulumi_azure_native/devcenter/v20240601preview/encryption_set.py +1 -1
  361. pulumi_azure_native/devcenter/v20240601preview/environment_type.py +1 -1
  362. pulumi_azure_native/devcenter/v20240601preview/gallery.py +1 -1
  363. pulumi_azure_native/devcenter/v20240601preview/network_connection.py +1 -1
  364. pulumi_azure_native/devcenter/v20240601preview/plan.py +1 -1
  365. pulumi_azure_native/devcenter/v20240601preview/plan_member.py +1 -1
  366. pulumi_azure_native/devcenter/v20240601preview/pool.py +1 -1
  367. pulumi_azure_native/devcenter/v20240601preview/project.py +1 -1
  368. pulumi_azure_native/devcenter/v20240601preview/project_catalog.py +1 -1
  369. pulumi_azure_native/devcenter/v20240601preview/project_environment_type.py +1 -1
  370. pulumi_azure_native/devcenter/v20240601preview/schedule.py +1 -1
  371. pulumi_azure_native/devcenter/v20240701preview/attached_network_by_dev_center.py +1 -1
  372. pulumi_azure_native/devcenter/v20240701preview/catalog.py +1 -1
  373. pulumi_azure_native/devcenter/v20240701preview/dev_box_definition.py +1 -1
  374. pulumi_azure_native/devcenter/v20240701preview/dev_center.py +1 -1
  375. pulumi_azure_native/devcenter/v20240701preview/encryption_set.py +1 -1
  376. pulumi_azure_native/devcenter/v20240701preview/environment_type.py +1 -1
  377. pulumi_azure_native/devcenter/v20240701preview/gallery.py +1 -1
  378. pulumi_azure_native/devcenter/v20240701preview/network_connection.py +1 -1
  379. pulumi_azure_native/devcenter/v20240701preview/plan.py +1 -1
  380. pulumi_azure_native/devcenter/v20240701preview/plan_member.py +1 -1
  381. pulumi_azure_native/devcenter/v20240701preview/pool.py +1 -1
  382. pulumi_azure_native/devcenter/v20240701preview/project.py +1 -1
  383. pulumi_azure_native/devcenter/v20240701preview/project_catalog.py +1 -1
  384. pulumi_azure_native/devcenter/v20240701preview/project_environment_type.py +1 -1
  385. pulumi_azure_native/devcenter/v20240701preview/schedule.py +1 -1
  386. pulumi_azure_native/devcenter/v20240801preview/attached_network_by_dev_center.py +1 -1
  387. pulumi_azure_native/devcenter/v20240801preview/catalog.py +1 -1
  388. pulumi_azure_native/devcenter/v20240801preview/curation_profile.py +1 -1
  389. pulumi_azure_native/devcenter/v20240801preview/dev_box_definition.py +1 -1
  390. pulumi_azure_native/devcenter/v20240801preview/dev_center.py +1 -1
  391. pulumi_azure_native/devcenter/v20240801preview/encryption_set.py +1 -1
  392. pulumi_azure_native/devcenter/v20240801preview/environment_type.py +1 -1
  393. pulumi_azure_native/devcenter/v20240801preview/gallery.py +1 -1
  394. pulumi_azure_native/devcenter/v20240801preview/network_connection.py +1 -1
  395. pulumi_azure_native/devcenter/v20240801preview/plan.py +1 -1
  396. pulumi_azure_native/devcenter/v20240801preview/plan_member.py +1 -1
  397. pulumi_azure_native/devcenter/v20240801preview/pool.py +1 -1
  398. pulumi_azure_native/devcenter/v20240801preview/project.py +1 -1
  399. pulumi_azure_native/devcenter/v20240801preview/project_catalog.py +1 -1
  400. pulumi_azure_native/devcenter/v20240801preview/project_environment_type.py +1 -1
  401. pulumi_azure_native/devcenter/v20240801preview/schedule.py +1 -1
  402. pulumi_azure_native/devcenter/v20241001preview/__init__.py +52 -0
  403. pulumi_azure_native/devcenter/v20241001preview/_enums.py +228 -0
  404. pulumi_azure_native/devcenter/v20241001preview/_inputs.py +962 -0
  405. pulumi_azure_native/devcenter/v20241001preview/attached_network_by_dev_center.py +260 -0
  406. pulumi_azure_native/devcenter/v20241001preview/catalog.py +368 -0
  407. pulumi_azure_native/devcenter/v20241001preview/curation_profile.py +259 -0
  408. pulumi_azure_native/devcenter/v20241001preview/dev_box_definition.py +418 -0
  409. pulumi_azure_native/devcenter/v20241001preview/dev_center.py +481 -0
  410. pulumi_azure_native/devcenter/v20241001preview/encryption_set.py +347 -0
  411. pulumi_azure_native/devcenter/v20241001preview/environment_type.py +258 -0
  412. pulumi_azure_native/devcenter/v20241001preview/gallery.py +230 -0
  413. pulumi_azure_native/devcenter/v20241001preview/get_attached_network_by_dev_center.py +193 -0
  414. pulumi_azure_native/devcenter/v20241001preview/get_catalog.py +258 -0
  415. pulumi_azure_native/devcenter/v20241001preview/get_catalog_sync_error_details.py +115 -0
  416. pulumi_azure_native/devcenter/v20241001preview/get_curation_profile.py +167 -0
  417. pulumi_azure_native/devcenter/v20241001preview/get_customization_task_error_details.py +94 -0
  418. pulumi_azure_native/devcenter/v20241001preview/get_dev_box_definition.py +271 -0
  419. pulumi_azure_native/devcenter/v20241001preview/get_dev_center.py +279 -0
  420. pulumi_azure_native/devcenter/v20241001preview/get_encryption_set.py +206 -0
  421. pulumi_azure_native/devcenter/v20241001preview/get_environment_definition_error_details.py +94 -0
  422. pulumi_azure_native/devcenter/v20241001preview/get_environment_type.py +167 -0
  423. pulumi_azure_native/devcenter/v20241001preview/get_gallery.py +154 -0
  424. pulumi_azure_native/devcenter/v20241001preview/get_network_connection.py +266 -0
  425. pulumi_azure_native/devcenter/v20241001preview/get_plan.py +175 -0
  426. pulumi_azure_native/devcenter/v20241001preview/get_plan_member.py +206 -0
  427. pulumi_azure_native/devcenter/v20241001preview/get_pool.py +362 -0
  428. pulumi_azure_native/devcenter/v20241001preview/get_project.py +253 -0
  429. pulumi_azure_native/devcenter/v20241001preview/get_project_catalog.py +258 -0
  430. pulumi_azure_native/devcenter/v20241001preview/get_project_catalog_environment_definition_error_details.py +94 -0
  431. pulumi_azure_native/devcenter/v20241001preview/get_project_catalog_image_definition_build_details.py +216 -0
  432. pulumi_azure_native/devcenter/v20241001preview/get_project_catalog_sync_error_details.py +115 -0
  433. pulumi_azure_native/devcenter/v20241001preview/get_project_environment_type.py +258 -0
  434. pulumi_azure_native/devcenter/v20241001preview/get_project_inherited_settings.py +97 -0
  435. pulumi_azure_native/devcenter/v20241001preview/get_project_policy.py +167 -0
  436. pulumi_azure_native/devcenter/v20241001preview/get_schedule.py +229 -0
  437. pulumi_azure_native/devcenter/v20241001preview/list_skus_by_project.py +97 -0
  438. pulumi_azure_native/devcenter/v20241001preview/network_connection.py +453 -0
  439. pulumi_azure_native/devcenter/v20241001preview/outputs.py +1952 -0
  440. pulumi_azure_native/devcenter/v20241001preview/plan.py +268 -0
  441. pulumi_azure_native/devcenter/v20241001preview/plan_member.py +327 -0
  442. pulumi_azure_native/devcenter/v20241001preview/pool.py +642 -0
  443. pulumi_azure_native/devcenter/v20241001preview/project.py +423 -0
  444. pulumi_azure_native/devcenter/v20241001preview/project_catalog.py +368 -0
  445. pulumi_azure_native/devcenter/v20241001preview/project_environment_type.py +444 -0
  446. pulumi_azure_native/devcenter/v20241001preview/project_policy.py +259 -0
  447. pulumi_azure_native/devcenter/v20241001preview/schedule.py +439 -0
  448. pulumi_azure_native/elastic/__init__.py +3 -0
  449. pulumi_azure_native/elastic/get_billing_info.py +2 -2
  450. pulumi_azure_native/elastic/get_monitor.py +2 -2
  451. pulumi_azure_native/elastic/get_monitored_subscription.py +2 -2
  452. pulumi_azure_native/elastic/get_open_ai.py +2 -2
  453. pulumi_azure_native/elastic/get_open_ai_status.py +2 -2
  454. pulumi_azure_native/elastic/get_organization_api_key.py +2 -2
  455. pulumi_azure_native/elastic/get_organization_elastic_to_azure_subscription_mapping.py +2 -2
  456. pulumi_azure_native/elastic/get_tag_rule.py +2 -2
  457. pulumi_azure_native/elastic/list_all_traffic_filter.py +2 -2
  458. pulumi_azure_native/elastic/list_connected_partner_resource.py +2 -2
  459. pulumi_azure_native/elastic/list_deployment_info.py +2 -2
  460. pulumi_azure_native/elastic/list_monitored_resource.py +2 -2
  461. pulumi_azure_native/elastic/list_upgradable_version_details.py +2 -2
  462. pulumi_azure_native/elastic/list_vm_host.py +2 -2
  463. pulumi_azure_native/elastic/listlist_associated_traffic_filter.py +2 -2
  464. pulumi_azure_native/elastic/monitor.py +3 -3
  465. pulumi_azure_native/elastic/monitored_subscription.py +3 -3
  466. pulumi_azure_native/elastic/open_ai.py +3 -3
  467. pulumi_azure_native/elastic/tag_rule.py +3 -3
  468. pulumi_azure_native/elastic/v20230601/monitor.py +1 -1
  469. pulumi_azure_native/elastic/v20230601/tag_rule.py +1 -1
  470. pulumi_azure_native/elastic/v20230615preview/monitor.py +1 -1
  471. pulumi_azure_native/elastic/v20230615preview/tag_rule.py +1 -1
  472. pulumi_azure_native/elastic/v20230701preview/monitor.py +1 -1
  473. pulumi_azure_native/elastic/v20230701preview/tag_rule.py +1 -1
  474. pulumi_azure_native/elastic/v20231001preview/monitor.py +1 -1
  475. pulumi_azure_native/elastic/v20231001preview/tag_rule.py +1 -1
  476. pulumi_azure_native/elastic/v20231101preview/monitor.py +1 -1
  477. pulumi_azure_native/elastic/v20231101preview/tag_rule.py +1 -1
  478. pulumi_azure_native/elastic/v20240101preview/monitor.py +1 -1
  479. pulumi_azure_native/elastic/v20240101preview/open_ai.py +1 -1
  480. pulumi_azure_native/elastic/v20240101preview/tag_rule.py +1 -1
  481. pulumi_azure_native/elastic/v20240301/monitor.py +1 -1
  482. pulumi_azure_native/elastic/v20240301/open_ai.py +1 -1
  483. pulumi_azure_native/elastic/v20240301/tag_rule.py +1 -1
  484. pulumi_azure_native/elastic/v20240501preview/monitor.py +1 -1
  485. pulumi_azure_native/elastic/v20240501preview/monitored_subscription.py +1 -1
  486. pulumi_azure_native/elastic/v20240501preview/open_ai.py +1 -1
  487. pulumi_azure_native/elastic/v20240501preview/tag_rule.py +1 -1
  488. pulumi_azure_native/elastic/v20240615preview/monitor.py +1 -1
  489. pulumi_azure_native/elastic/v20240615preview/monitored_subscription.py +1 -1
  490. pulumi_azure_native/elastic/v20240615preview/open_ai.py +1 -1
  491. pulumi_azure_native/elastic/v20240615preview/tag_rule.py +1 -1
  492. pulumi_azure_native/elastic/v20241001preview/__init__.py +29 -0
  493. pulumi_azure_native/elastic/v20241001preview/_enums.py +57 -0
  494. pulumi_azure_native/elastic/v20241001preview/_inputs.py +1117 -0
  495. pulumi_azure_native/elastic/v20241001preview/get_billing_info.py +97 -0
  496. pulumi_azure_native/elastic/v20241001preview/get_monitor.py +188 -0
  497. pulumi_azure_native/elastic/v20241001preview/get_monitored_subscription.py +128 -0
  498. pulumi_azure_native/elastic/v20241001preview/get_open_ai.py +128 -0
  499. pulumi_azure_native/elastic/v20241001preview/get_open_ai_status.py +89 -0
  500. pulumi_azure_native/elastic/v20241001preview/get_organization_api_key.py +76 -0
  501. pulumi_azure_native/elastic/v20241001preview/get_organization_elastic_to_azure_subscription_mapping.py +70 -0
  502. pulumi_azure_native/elastic/v20241001preview/get_tag_rule.py +141 -0
  503. pulumi_azure_native/elastic/v20241001preview/list_all_traffic_filter.py +84 -0
  504. pulumi_azure_native/elastic/v20241001preview/list_connected_partner_resource.py +97 -0
  505. pulumi_azure_native/elastic/v20241001preview/list_deployment_info.py +162 -0
  506. pulumi_azure_native/elastic/v20241001preview/list_monitored_resource.py +97 -0
  507. pulumi_azure_native/elastic/v20241001preview/list_upgradable_version_details.py +96 -0
  508. pulumi_azure_native/elastic/v20241001preview/list_vm_host.py +97 -0
  509. pulumi_azure_native/elastic/v20241001preview/listlist_associated_traffic_filter.py +84 -0
  510. pulumi_azure_native/elastic/v20241001preview/monitor.py +316 -0
  511. pulumi_azure_native/elastic/v20241001preview/monitored_subscription.py +211 -0
  512. pulumi_azure_native/elastic/v20241001preview/open_ai.py +210 -0
  513. pulumi_azure_native/elastic/v20241001preview/outputs.py +1757 -0
  514. pulumi_azure_native/elastic/v20241001preview/tag_rule.py +221 -0
  515. pulumi_azure_native/hybridconnectivity/outputs.py +44 -2
  516. pulumi_azure_native/hybridconnectivity/v20241201/outputs.py +44 -2
  517. pulumi_azure_native/pulumi-plugin.json +1 -1
  518. pulumi_azure_native/security/_inputs.py +3 -15
  519. pulumi_azure_native/security/outputs.py +2 -10
  520. pulumi_azure_native/security/v20240101/_inputs.py +3 -15
  521. pulumi_azure_native/security/v20240101/outputs.py +2 -10
  522. {pulumi_azure_native-2.66.0a1728396986.dist-info → pulumi_azure_native-2.66.0a1728463590.dist-info}/METADATA +1 -1
  523. {pulumi_azure_native-2.66.0a1728396986.dist-info → pulumi_azure_native-2.66.0a1728463590.dist-info}/RECORD +525 -394
  524. {pulumi_azure_native-2.66.0a1728396986.dist-info → pulumi_azure_native-2.66.0a1728463590.dist-info}/WHEEL +0 -0
  525. {pulumi_azure_native-2.66.0a1728396986.dist-info → pulumi_azure_native-2.66.0a1728463590.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,221 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from ... import _utilities
16
+ from . import outputs
17
+ from ._enums import *
18
+ from ._inputs import *
19
+
20
+ __all__ = ['TagRuleArgs', 'TagRule']
21
+
22
+ @pulumi.input_type
23
+ class TagRuleArgs:
24
+ def __init__(__self__, *,
25
+ monitor_name: pulumi.Input[str],
26
+ resource_group_name: pulumi.Input[str],
27
+ properties: Optional[pulumi.Input['MonitoringTagRulesPropertiesArgs']] = None,
28
+ rule_set_name: Optional[pulumi.Input[str]] = None):
29
+ """
30
+ The set of arguments for constructing a TagRule resource.
31
+ :param pulumi.Input[str] monitor_name: Monitor resource name
32
+ :param pulumi.Input[str] resource_group_name: The name of the resource group. The name is case insensitive.
33
+ :param pulumi.Input['MonitoringTagRulesPropertiesArgs'] properties: Properties of the monitoring tag rules.
34
+ :param pulumi.Input[str] rule_set_name: Tag Rule Set resource name
35
+ """
36
+ pulumi.set(__self__, "monitor_name", monitor_name)
37
+ pulumi.set(__self__, "resource_group_name", resource_group_name)
38
+ if properties is not None:
39
+ pulumi.set(__self__, "properties", properties)
40
+ if rule_set_name is not None:
41
+ pulumi.set(__self__, "rule_set_name", rule_set_name)
42
+
43
+ @property
44
+ @pulumi.getter(name="monitorName")
45
+ def monitor_name(self) -> pulumi.Input[str]:
46
+ """
47
+ Monitor resource name
48
+ """
49
+ return pulumi.get(self, "monitor_name")
50
+
51
+ @monitor_name.setter
52
+ def monitor_name(self, value: pulumi.Input[str]):
53
+ pulumi.set(self, "monitor_name", value)
54
+
55
+ @property
56
+ @pulumi.getter(name="resourceGroupName")
57
+ def resource_group_name(self) -> pulumi.Input[str]:
58
+ """
59
+ The name of the resource group. The name is case insensitive.
60
+ """
61
+ return pulumi.get(self, "resource_group_name")
62
+
63
+ @resource_group_name.setter
64
+ def resource_group_name(self, value: pulumi.Input[str]):
65
+ pulumi.set(self, "resource_group_name", value)
66
+
67
+ @property
68
+ @pulumi.getter
69
+ def properties(self) -> Optional[pulumi.Input['MonitoringTagRulesPropertiesArgs']]:
70
+ """
71
+ Properties of the monitoring tag rules.
72
+ """
73
+ return pulumi.get(self, "properties")
74
+
75
+ @properties.setter
76
+ def properties(self, value: Optional[pulumi.Input['MonitoringTagRulesPropertiesArgs']]):
77
+ pulumi.set(self, "properties", value)
78
+
79
+ @property
80
+ @pulumi.getter(name="ruleSetName")
81
+ def rule_set_name(self) -> Optional[pulumi.Input[str]]:
82
+ """
83
+ Tag Rule Set resource name
84
+ """
85
+ return pulumi.get(self, "rule_set_name")
86
+
87
+ @rule_set_name.setter
88
+ def rule_set_name(self, value: Optional[pulumi.Input[str]]):
89
+ pulumi.set(self, "rule_set_name", value)
90
+
91
+
92
+ class TagRule(pulumi.CustomResource):
93
+ @overload
94
+ def __init__(__self__,
95
+ resource_name: str,
96
+ opts: Optional[pulumi.ResourceOptions] = None,
97
+ monitor_name: Optional[pulumi.Input[str]] = None,
98
+ properties: Optional[pulumi.Input[Union['MonitoringTagRulesPropertiesArgs', 'MonitoringTagRulesPropertiesArgsDict']]] = None,
99
+ resource_group_name: Optional[pulumi.Input[str]] = None,
100
+ rule_set_name: Optional[pulumi.Input[str]] = None,
101
+ __props__=None):
102
+ """
103
+ Capture logs and metrics of Azure resources based on ARM tags.
104
+
105
+ :param str resource_name: The name of the resource.
106
+ :param pulumi.ResourceOptions opts: Options for the resource.
107
+ :param pulumi.Input[str] monitor_name: Monitor resource name
108
+ :param pulumi.Input[Union['MonitoringTagRulesPropertiesArgs', 'MonitoringTagRulesPropertiesArgsDict']] properties: Properties of the monitoring tag rules.
109
+ :param pulumi.Input[str] resource_group_name: The name of the resource group. The name is case insensitive.
110
+ :param pulumi.Input[str] rule_set_name: Tag Rule Set resource name
111
+ """
112
+ ...
113
+ @overload
114
+ def __init__(__self__,
115
+ resource_name: str,
116
+ args: TagRuleArgs,
117
+ opts: Optional[pulumi.ResourceOptions] = None):
118
+ """
119
+ Capture logs and metrics of Azure resources based on ARM tags.
120
+
121
+ :param str resource_name: The name of the resource.
122
+ :param TagRuleArgs args: The arguments to use to populate this resource's properties.
123
+ :param pulumi.ResourceOptions opts: Options for the resource.
124
+ """
125
+ ...
126
+ def __init__(__self__, resource_name: str, *args, **kwargs):
127
+ resource_args, opts = _utilities.get_resource_args_opts(TagRuleArgs, pulumi.ResourceOptions, *args, **kwargs)
128
+ if resource_args is not None:
129
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
130
+ else:
131
+ __self__._internal_init(resource_name, *args, **kwargs)
132
+
133
+ def _internal_init(__self__,
134
+ resource_name: str,
135
+ opts: Optional[pulumi.ResourceOptions] = None,
136
+ monitor_name: Optional[pulumi.Input[str]] = None,
137
+ properties: Optional[pulumi.Input[Union['MonitoringTagRulesPropertiesArgs', 'MonitoringTagRulesPropertiesArgsDict']]] = None,
138
+ resource_group_name: Optional[pulumi.Input[str]] = None,
139
+ rule_set_name: Optional[pulumi.Input[str]] = None,
140
+ __props__=None):
141
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
142
+ if not isinstance(opts, pulumi.ResourceOptions):
143
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
144
+ if opts.id is None:
145
+ if __props__ is not None:
146
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
147
+ __props__ = TagRuleArgs.__new__(TagRuleArgs)
148
+
149
+ if monitor_name is None and not opts.urn:
150
+ raise TypeError("Missing required property 'monitor_name'")
151
+ __props__.__dict__["monitor_name"] = monitor_name
152
+ __props__.__dict__["properties"] = properties
153
+ if resource_group_name is None and not opts.urn:
154
+ raise TypeError("Missing required property 'resource_group_name'")
155
+ __props__.__dict__["resource_group_name"] = resource_group_name
156
+ __props__.__dict__["rule_set_name"] = rule_set_name
157
+ __props__.__dict__["name"] = None
158
+ __props__.__dict__["system_data"] = None
159
+ __props__.__dict__["type"] = None
160
+ alias_opts = pulumi.ResourceOptions(aliases=[pulumi.Alias(type_="azure-native:elastic:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20200701:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20200701preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20210901preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20211001preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20220505preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20220701preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20220901preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20230201preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20230501preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20230601:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20230615preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20230701preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20231001preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20231101preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20240101preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20240301:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20240501preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20240615preview:TagRule")])
161
+ opts = pulumi.ResourceOptions.merge(opts, alias_opts)
162
+ super(TagRule, __self__).__init__(
163
+ 'azure-native:elastic/v20241001preview:TagRule',
164
+ resource_name,
165
+ __props__,
166
+ opts)
167
+
168
+ @staticmethod
169
+ def get(resource_name: str,
170
+ id: pulumi.Input[str],
171
+ opts: Optional[pulumi.ResourceOptions] = None) -> 'TagRule':
172
+ """
173
+ Get an existing TagRule resource's state with the given name, id, and optional extra
174
+ properties used to qualify the lookup.
175
+
176
+ :param str resource_name: The unique name of the resulting resource.
177
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
178
+ :param pulumi.ResourceOptions opts: Options for the resource.
179
+ """
180
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
181
+
182
+ __props__ = TagRuleArgs.__new__(TagRuleArgs)
183
+
184
+ __props__.__dict__["name"] = None
185
+ __props__.__dict__["properties"] = None
186
+ __props__.__dict__["system_data"] = None
187
+ __props__.__dict__["type"] = None
188
+ return TagRule(resource_name, opts=opts, __props__=__props__)
189
+
190
+ @property
191
+ @pulumi.getter
192
+ def name(self) -> pulumi.Output[str]:
193
+ """
194
+ Name of the rule set.
195
+ """
196
+ return pulumi.get(self, "name")
197
+
198
+ @property
199
+ @pulumi.getter
200
+ def properties(self) -> pulumi.Output['outputs.MonitoringTagRulesPropertiesResponse']:
201
+ """
202
+ Properties of the monitoring tag rules.
203
+ """
204
+ return pulumi.get(self, "properties")
205
+
206
+ @property
207
+ @pulumi.getter(name="systemData")
208
+ def system_data(self) -> pulumi.Output['outputs.SystemDataResponse']:
209
+ """
210
+ The system metadata relating to this resource
211
+ """
212
+ return pulumi.get(self, "system_data")
213
+
214
+ @property
215
+ @pulumi.getter
216
+ def type(self) -> pulumi.Output[str]:
217
+ """
218
+ The type of the rule set.
219
+ """
220
+ return pulumi.get(self, "type")
221
+
@@ -32,8 +32,12 @@ class AwsCloudProfileResponse(dict):
32
32
  @staticmethod
33
33
  def __key_warning(key: str):
34
34
  suggest = None
35
- if key == "excludedAccounts":
35
+ if key == "accountId":
36
+ suggest = "account_id"
37
+ elif key == "excludedAccounts":
36
38
  suggest = "excluded_accounts"
39
+ elif key == "isOrganizationalAccount":
40
+ suggest = "is_organizational_account"
37
41
 
38
42
  if suggest:
39
43
  pulumi.log.warn(f"Key '{key}' not found in AwsCloudProfileResponse. Access the value via the '{suggest}' property getter instead.")
@@ -47,13 +51,30 @@ class AwsCloudProfileResponse(dict):
47
51
  return super().get(key, default)
48
52
 
49
53
  def __init__(__self__, *,
50
- excluded_accounts: Optional[Sequence[str]] = None):
54
+ account_id: str,
55
+ excluded_accounts: Optional[Sequence[str]] = None,
56
+ is_organizational_account: Optional[bool] = None):
51
57
  """
52
58
  cloud profile for AWS.
59
+ :param str account_id: Account id for the AWS account.
53
60
  :param Sequence[str] excluded_accounts: List of AWS accounts which need to be excluded.
61
+ :param bool is_organizational_account: Boolean value that indicates whether the account is organizational or not. True represents organization account, whereas false represents a single account.
54
62
  """
63
+ pulumi.set(__self__, "account_id", account_id)
55
64
  if excluded_accounts is not None:
56
65
  pulumi.set(__self__, "excluded_accounts", excluded_accounts)
66
+ if is_organizational_account is None:
67
+ is_organizational_account = False
68
+ if is_organizational_account is not None:
69
+ pulumi.set(__self__, "is_organizational_account", is_organizational_account)
70
+
71
+ @property
72
+ @pulumi.getter(name="accountId")
73
+ def account_id(self) -> str:
74
+ """
75
+ Account id for the AWS account.
76
+ """
77
+ return pulumi.get(self, "account_id")
57
78
 
58
79
  @property
59
80
  @pulumi.getter(name="excludedAccounts")
@@ -63,6 +84,14 @@ class AwsCloudProfileResponse(dict):
63
84
  """
64
85
  return pulumi.get(self, "excluded_accounts")
65
86
 
87
+ @property
88
+ @pulumi.getter(name="isOrganizationalAccount")
89
+ def is_organizational_account(self) -> Optional[bool]:
90
+ """
91
+ Boolean value that indicates whether the account is organizational or not. True represents organization account, whereas false represents a single account.
92
+ """
93
+ return pulumi.get(self, "is_organizational_account")
94
+
66
95
 
67
96
  @pulumi.output_type
68
97
  class EndpointPropertiesResponse(dict):
@@ -140,6 +169,8 @@ class PublicCloudConnectorPropertiesResponse(dict):
140
169
  suggest = "aws_cloud_profile"
141
170
  elif key == "connectorPrimaryIdentifier":
142
171
  suggest = "connector_primary_identifier"
172
+ elif key == "hostType":
173
+ suggest = "host_type"
143
174
  elif key == "provisioningState":
144
175
  suggest = "provisioning_state"
145
176
 
@@ -157,15 +188,18 @@ class PublicCloudConnectorPropertiesResponse(dict):
157
188
  def __init__(__self__, *,
158
189
  aws_cloud_profile: 'outputs.AwsCloudProfileResponse',
159
190
  connector_primary_identifier: str,
191
+ host_type: str,
160
192
  provisioning_state: str):
161
193
  """
162
194
  Properties of public cloud connectors.
163
195
  :param 'AwsCloudProfileResponse' aws_cloud_profile: Cloud profile for AWS.
164
196
  :param str connector_primary_identifier: Connector primary identifier.
197
+ :param str host_type: Host cloud the public cloud connector.
165
198
  :param str provisioning_state: The resource provisioning state.
166
199
  """
167
200
  pulumi.set(__self__, "aws_cloud_profile", aws_cloud_profile)
168
201
  pulumi.set(__self__, "connector_primary_identifier", connector_primary_identifier)
202
+ pulumi.set(__self__, "host_type", host_type)
169
203
  pulumi.set(__self__, "provisioning_state", provisioning_state)
170
204
 
171
205
  @property
@@ -184,6 +218,14 @@ class PublicCloudConnectorPropertiesResponse(dict):
184
218
  """
185
219
  return pulumi.get(self, "connector_primary_identifier")
186
220
 
221
+ @property
222
+ @pulumi.getter(name="hostType")
223
+ def host_type(self) -> str:
224
+ """
225
+ Host cloud the public cloud connector.
226
+ """
227
+ return pulumi.get(self, "host_type")
228
+
187
229
  @property
188
230
  @pulumi.getter(name="provisioningState")
189
231
  def provisioning_state(self) -> str:
@@ -32,8 +32,12 @@ class AwsCloudProfileResponse(dict):
32
32
  @staticmethod
33
33
  def __key_warning(key: str):
34
34
  suggest = None
35
- if key == "excludedAccounts":
35
+ if key == "accountId":
36
+ suggest = "account_id"
37
+ elif key == "excludedAccounts":
36
38
  suggest = "excluded_accounts"
39
+ elif key == "isOrganizationalAccount":
40
+ suggest = "is_organizational_account"
37
41
 
38
42
  if suggest:
39
43
  pulumi.log.warn(f"Key '{key}' not found in AwsCloudProfileResponse. Access the value via the '{suggest}' property getter instead.")
@@ -47,13 +51,30 @@ class AwsCloudProfileResponse(dict):
47
51
  return super().get(key, default)
48
52
 
49
53
  def __init__(__self__, *,
50
- excluded_accounts: Optional[Sequence[str]] = None):
54
+ account_id: str,
55
+ excluded_accounts: Optional[Sequence[str]] = None,
56
+ is_organizational_account: Optional[bool] = None):
51
57
  """
52
58
  cloud profile for AWS.
59
+ :param str account_id: Account id for the AWS account.
53
60
  :param Sequence[str] excluded_accounts: List of AWS accounts which need to be excluded.
61
+ :param bool is_organizational_account: Boolean value that indicates whether the account is organizational or not. True represents organization account, whereas false represents a single account.
54
62
  """
63
+ pulumi.set(__self__, "account_id", account_id)
55
64
  if excluded_accounts is not None:
56
65
  pulumi.set(__self__, "excluded_accounts", excluded_accounts)
66
+ if is_organizational_account is None:
67
+ is_organizational_account = False
68
+ if is_organizational_account is not None:
69
+ pulumi.set(__self__, "is_organizational_account", is_organizational_account)
70
+
71
+ @property
72
+ @pulumi.getter(name="accountId")
73
+ def account_id(self) -> str:
74
+ """
75
+ Account id for the AWS account.
76
+ """
77
+ return pulumi.get(self, "account_id")
57
78
 
58
79
  @property
59
80
  @pulumi.getter(name="excludedAccounts")
@@ -63,6 +84,14 @@ class AwsCloudProfileResponse(dict):
63
84
  """
64
85
  return pulumi.get(self, "excluded_accounts")
65
86
 
87
+ @property
88
+ @pulumi.getter(name="isOrganizationalAccount")
89
+ def is_organizational_account(self) -> Optional[bool]:
90
+ """
91
+ Boolean value that indicates whether the account is organizational or not. True represents organization account, whereas false represents a single account.
92
+ """
93
+ return pulumi.get(self, "is_organizational_account")
94
+
66
95
 
67
96
  @pulumi.output_type
68
97
  class EndpointPropertiesResponse(dict):
@@ -140,6 +169,8 @@ class PublicCloudConnectorPropertiesResponse(dict):
140
169
  suggest = "aws_cloud_profile"
141
170
  elif key == "connectorPrimaryIdentifier":
142
171
  suggest = "connector_primary_identifier"
172
+ elif key == "hostType":
173
+ suggest = "host_type"
143
174
  elif key == "provisioningState":
144
175
  suggest = "provisioning_state"
145
176
 
@@ -157,15 +188,18 @@ class PublicCloudConnectorPropertiesResponse(dict):
157
188
  def __init__(__self__, *,
158
189
  aws_cloud_profile: 'outputs.AwsCloudProfileResponse',
159
190
  connector_primary_identifier: str,
191
+ host_type: str,
160
192
  provisioning_state: str):
161
193
  """
162
194
  Properties of public cloud connectors.
163
195
  :param 'AwsCloudProfileResponse' aws_cloud_profile: Cloud profile for AWS.
164
196
  :param str connector_primary_identifier: Connector primary identifier.
197
+ :param str host_type: Host cloud the public cloud connector.
165
198
  :param str provisioning_state: The resource provisioning state.
166
199
  """
167
200
  pulumi.set(__self__, "aws_cloud_profile", aws_cloud_profile)
168
201
  pulumi.set(__self__, "connector_primary_identifier", connector_primary_identifier)
202
+ pulumi.set(__self__, "host_type", host_type)
169
203
  pulumi.set(__self__, "provisioning_state", provisioning_state)
170
204
 
171
205
  @property
@@ -184,6 +218,14 @@ class PublicCloudConnectorPropertiesResponse(dict):
184
218
  """
185
219
  return pulumi.get(self, "connector_primary_identifier")
186
220
 
221
+ @property
222
+ @pulumi.getter(name="hostType")
223
+ def host_type(self) -> str:
224
+ """
225
+ Host cloud the public cloud connector.
226
+ """
227
+ return pulumi.get(self, "host_type")
228
+
187
229
  @property
188
230
  @pulumi.getter(name="provisioningState")
189
231
  def provisioning_state(self) -> str:
@@ -1,5 +1,5 @@
1
1
  {
2
2
  "resource": true,
3
3
  "name": "azure-native",
4
- "version": "2.66.0-alpha.1728396986"
4
+ "version": "2.66.0-alpha.1728463590"
5
5
  }
@@ -5508,11 +5508,7 @@ if not MYPY:
5508
5508
  """
5509
5509
  name: pulumi.Input[str]
5510
5510
  """
5511
- The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - API-based discovery of information about Kubernetes cluster architecture, workload objects, and setup. Required for Kubernetes inventory, identity and network exposure detection, attack path analysis and risk hunting as part of the cloud security explorer.
5512
- Available for CloudPosture plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.
5513
- Available for StorageAccounts plan.<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.
5514
- Available for StorageAccounts and CloudPosture plans.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.
5515
- Available for CloudPosture and Containers plans.
5511
+ The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - Provides zero footprint, API-based discovery of Kubernetes clusters, their configurations and deployments. The collected data is used to create a contextualized security graph for Kubernetes clusters, provide risk hunting capabilities, and visualize risks and threats to Kubernetes environments and workloads.<br>Available for CloudPosture plan and Containers plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plans).<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plan) and CloudPosture plan.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.<br>Available for CloudPosture plan and Containers plan.<br><br>**MdeDesignatedSubscription** - Direct onboarding is a seamless integration between Defender for Endpoint and Defender for Cloud that doesn’t require extra software deployment on your servers. The onboarded resources will be presented under a designated Azure Subscription you configure<br>Available for VirtualMachines plan (P1 and P2 sub plans).<br><br>**AgentlessVmScanning** - Scans your machines for installed software, vulnerabilities, malware and secret scanning without relying on agents or impacting machine performance. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-agentless-data-collection.<br>Available for CloudPosture plan, VirtualMachines plan (P2 sub plan) and Containers plan.<br><br>**EntraPermissionsManagement** - Permissions Management provides Cloud Infrastructure Entitlement Management (CIEM) capabilities that helps organizations to manage and control user access and entitlements in their cloud infrastructure - important attack vector for cloud environments.<br>Permissions Management analyzes all permissions and active usage, and suggests recommendations to reduce permissions to enforce the principle of least privilege. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/permissions-management.<br>Available for CloudPosture plan. <br><br>**FileIntegrityMonitoring** - File integrity monitoring (FIM), examines operating system files.<br>Windows registries, Linux system files, in real time, for changes that might indicate an attack.<br>Available for VirtualMachines plan (P2 sub plan). <br><br>**ContainerSensor** - The sensor is based on IG and provides a rich threat detection suite for Kubernetes clusters, nodes, and workloads, powered by Microsoft leading threat intelligence, provides mapping to MITRE ATT&CK framework.<br>Available for Containers plan. <br><br>**AIPromptEvidence** - Exposes the prompts passed between the user and the AI model as alert evidence. This helps classify and triage the alerts with relevant user context. The prompt snippets will include only segments of the user prompt or model response that were deemed suspicious and relevant for security classifications. The prompt evidence will be available through Defender portal as part of each alert.<br>Available for AI plan. <br><br>
5516
5512
  """
5517
5513
  additional_extension_properties: NotRequired[Any]
5518
5514
  """
@@ -5530,11 +5526,7 @@ class ExtensionArgs:
5530
5526
  """
5531
5527
  A plan's extension properties
5532
5528
  :param pulumi.Input[Union[str, 'IsEnabled']] is_enabled: Indicates whether the extension is enabled.
5533
- :param pulumi.Input[str] name: The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - API-based discovery of information about Kubernetes cluster architecture, workload objects, and setup. Required for Kubernetes inventory, identity and network exposure detection, attack path analysis and risk hunting as part of the cloud security explorer.
5534
- Available for CloudPosture plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.
5535
- Available for StorageAccounts plan.<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.
5536
- Available for StorageAccounts and CloudPosture plans.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.
5537
- Available for CloudPosture and Containers plans.
5529
+ :param pulumi.Input[str] name: The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - Provides zero footprint, API-based discovery of Kubernetes clusters, their configurations and deployments. The collected data is used to create a contextualized security graph for Kubernetes clusters, provide risk hunting capabilities, and visualize risks and threats to Kubernetes environments and workloads.<br>Available for CloudPosture plan and Containers plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plans).<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plan) and CloudPosture plan.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.<br>Available for CloudPosture plan and Containers plan.<br><br>**MdeDesignatedSubscription** - Direct onboarding is a seamless integration between Defender for Endpoint and Defender for Cloud that doesn’t require extra software deployment on your servers. The onboarded resources will be presented under a designated Azure Subscription you configure<br>Available for VirtualMachines plan (P1 and P2 sub plans).<br><br>**AgentlessVmScanning** - Scans your machines for installed software, vulnerabilities, malware and secret scanning without relying on agents or impacting machine performance. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-agentless-data-collection.<br>Available for CloudPosture plan, VirtualMachines plan (P2 sub plan) and Containers plan.<br><br>**EntraPermissionsManagement** - Permissions Management provides Cloud Infrastructure Entitlement Management (CIEM) capabilities that helps organizations to manage and control user access and entitlements in their cloud infrastructure - important attack vector for cloud environments.<br>Permissions Management analyzes all permissions and active usage, and suggests recommendations to reduce permissions to enforce the principle of least privilege. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/permissions-management.<br>Available for CloudPosture plan. <br><br>**FileIntegrityMonitoring** - File integrity monitoring (FIM), examines operating system files.<br>Windows registries, Linux system files, in real time, for changes that might indicate an attack.<br>Available for VirtualMachines plan (P2 sub plan). <br><br>**ContainerSensor** - The sensor is based on IG and provides a rich threat detection suite for Kubernetes clusters, nodes, and workloads, powered by Microsoft leading threat intelligence, provides mapping to MITRE ATT&CK framework.<br>Available for Containers plan. <br><br>**AIPromptEvidence** - Exposes the prompts passed between the user and the AI model as alert evidence. This helps classify and triage the alerts with relevant user context. The prompt snippets will include only segments of the user prompt or model response that were deemed suspicious and relevant for security classifications. The prompt evidence will be available through Defender portal as part of each alert.<br>Available for AI plan. <br><br>
5538
5530
  :param Any additional_extension_properties: Property values associated with the extension.
5539
5531
  """
5540
5532
  pulumi.set(__self__, "is_enabled", is_enabled)
@@ -5558,11 +5550,7 @@ class ExtensionArgs:
5558
5550
  @pulumi.getter
5559
5551
  def name(self) -> pulumi.Input[str]:
5560
5552
  """
5561
- The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - API-based discovery of information about Kubernetes cluster architecture, workload objects, and setup. Required for Kubernetes inventory, identity and network exposure detection, attack path analysis and risk hunting as part of the cloud security explorer.
5562
- Available for CloudPosture plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.
5563
- Available for StorageAccounts plan.<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.
5564
- Available for StorageAccounts and CloudPosture plans.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.
5565
- Available for CloudPosture and Containers plans.
5553
+ The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - Provides zero footprint, API-based discovery of Kubernetes clusters, their configurations and deployments. The collected data is used to create a contextualized security graph for Kubernetes clusters, provide risk hunting capabilities, and visualize risks and threats to Kubernetes environments and workloads.<br>Available for CloudPosture plan and Containers plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plans).<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plan) and CloudPosture plan.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.<br>Available for CloudPosture plan and Containers plan.<br><br>**MdeDesignatedSubscription** - Direct onboarding is a seamless integration between Defender for Endpoint and Defender for Cloud that doesn’t require extra software deployment on your servers. The onboarded resources will be presented under a designated Azure Subscription you configure<br>Available for VirtualMachines plan (P1 and P2 sub plans).<br><br>**AgentlessVmScanning** - Scans your machines for installed software, vulnerabilities, malware and secret scanning without relying on agents or impacting machine performance. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-agentless-data-collection.<br>Available for CloudPosture plan, VirtualMachines plan (P2 sub plan) and Containers plan.<br><br>**EntraPermissionsManagement** - Permissions Management provides Cloud Infrastructure Entitlement Management (CIEM) capabilities that helps organizations to manage and control user access and entitlements in their cloud infrastructure - important attack vector for cloud environments.<br>Permissions Management analyzes all permissions and active usage, and suggests recommendations to reduce permissions to enforce the principle of least privilege. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/permissions-management.<br>Available for CloudPosture plan. <br><br>**FileIntegrityMonitoring** - File integrity monitoring (FIM), examines operating system files.<br>Windows registries, Linux system files, in real time, for changes that might indicate an attack.<br>Available for VirtualMachines plan (P2 sub plan). <br><br>**ContainerSensor** - The sensor is based on IG and provides a rich threat detection suite for Kubernetes clusters, nodes, and workloads, powered by Microsoft leading threat intelligence, provides mapping to MITRE ATT&CK framework.<br>Available for Containers plan. <br><br>**AIPromptEvidence** - Exposes the prompts passed between the user and the AI model as alert evidence. This helps classify and triage the alerts with relevant user context. The prompt snippets will include only segments of the user prompt or model response that were deemed suspicious and relevant for security classifications. The prompt evidence will be available through Defender portal as part of each alert.<br>Available for AI plan. <br><br>
5566
5554
  """
5567
5555
  return pulumi.get(self, "name")
5568
5556
 
@@ -5485,11 +5485,7 @@ class ExtensionResponse(dict):
5485
5485
  """
5486
5486
  A plan's extension properties
5487
5487
  :param str is_enabled: Indicates whether the extension is enabled.
5488
- :param str name: The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - API-based discovery of information about Kubernetes cluster architecture, workload objects, and setup. Required for Kubernetes inventory, identity and network exposure detection, attack path analysis and risk hunting as part of the cloud security explorer.
5489
- Available for CloudPosture plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.
5490
- Available for StorageAccounts plan.<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.
5491
- Available for StorageAccounts and CloudPosture plans.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.
5492
- Available for CloudPosture and Containers plans.
5488
+ :param str name: The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - Provides zero footprint, API-based discovery of Kubernetes clusters, their configurations and deployments. The collected data is used to create a contextualized security graph for Kubernetes clusters, provide risk hunting capabilities, and visualize risks and threats to Kubernetes environments and workloads.<br>Available for CloudPosture plan and Containers plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plans).<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plan) and CloudPosture plan.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.<br>Available for CloudPosture plan and Containers plan.<br><br>**MdeDesignatedSubscription** - Direct onboarding is a seamless integration between Defender for Endpoint and Defender for Cloud that doesn’t require extra software deployment on your servers. The onboarded resources will be presented under a designated Azure Subscription you configure<br>Available for VirtualMachines plan (P1 and P2 sub plans).<br><br>**AgentlessVmScanning** - Scans your machines for installed software, vulnerabilities, malware and secret scanning without relying on agents or impacting machine performance. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-agentless-data-collection.<br>Available for CloudPosture plan, VirtualMachines plan (P2 sub plan) and Containers plan.<br><br>**EntraPermissionsManagement** - Permissions Management provides Cloud Infrastructure Entitlement Management (CIEM) capabilities that helps organizations to manage and control user access and entitlements in their cloud infrastructure - important attack vector for cloud environments.<br>Permissions Management analyzes all permissions and active usage, and suggests recommendations to reduce permissions to enforce the principle of least privilege. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/permissions-management.<br>Available for CloudPosture plan. <br><br>**FileIntegrityMonitoring** - File integrity monitoring (FIM), examines operating system files.<br>Windows registries, Linux system files, in real time, for changes that might indicate an attack.<br>Available for VirtualMachines plan (P2 sub plan). <br><br>**ContainerSensor** - The sensor is based on IG and provides a rich threat detection suite for Kubernetes clusters, nodes, and workloads, powered by Microsoft leading threat intelligence, provides mapping to MITRE ATT&CK framework.<br>Available for Containers plan. <br><br>**AIPromptEvidence** - Exposes the prompts passed between the user and the AI model as alert evidence. This helps classify and triage the alerts with relevant user context. The prompt snippets will include only segments of the user prompt or model response that were deemed suspicious and relevant for security classifications. The prompt evidence will be available through Defender portal as part of each alert.<br>Available for AI plan. <br><br>
5493
5489
  :param 'OperationStatusResponse' operation_status: Optional. A status describing the success/failure of the extension's enablement/disablement operation.
5494
5490
  :param Any additional_extension_properties: Property values associated with the extension.
5495
5491
  """
@@ -5511,11 +5507,7 @@ class ExtensionResponse(dict):
5511
5507
  @pulumi.getter
5512
5508
  def name(self) -> str:
5513
5509
  """
5514
- The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - API-based discovery of information about Kubernetes cluster architecture, workload objects, and setup. Required for Kubernetes inventory, identity and network exposure detection, attack path analysis and risk hunting as part of the cloud security explorer.
5515
- Available for CloudPosture plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.
5516
- Available for StorageAccounts plan.<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.
5517
- Available for StorageAccounts and CloudPosture plans.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.
5518
- Available for CloudPosture and Containers plans.
5510
+ The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - Provides zero footprint, API-based discovery of Kubernetes clusters, their configurations and deployments. The collected data is used to create a contextualized security graph for Kubernetes clusters, provide risk hunting capabilities, and visualize risks and threats to Kubernetes environments and workloads.<br>Available for CloudPosture plan and Containers plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plans).<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plan) and CloudPosture plan.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.<br>Available for CloudPosture plan and Containers plan.<br><br>**MdeDesignatedSubscription** - Direct onboarding is a seamless integration between Defender for Endpoint and Defender for Cloud that doesn’t require extra software deployment on your servers. The onboarded resources will be presented under a designated Azure Subscription you configure<br>Available for VirtualMachines plan (P1 and P2 sub plans).<br><br>**AgentlessVmScanning** - Scans your machines for installed software, vulnerabilities, malware and secret scanning without relying on agents or impacting machine performance. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-agentless-data-collection.<br>Available for CloudPosture plan, VirtualMachines plan (P2 sub plan) and Containers plan.<br><br>**EntraPermissionsManagement** - Permissions Management provides Cloud Infrastructure Entitlement Management (CIEM) capabilities that helps organizations to manage and control user access and entitlements in their cloud infrastructure - important attack vector for cloud environments.<br>Permissions Management analyzes all permissions and active usage, and suggests recommendations to reduce permissions to enforce the principle of least privilege. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/permissions-management.<br>Available for CloudPosture plan. <br><br>**FileIntegrityMonitoring** - File integrity monitoring (FIM), examines operating system files.<br>Windows registries, Linux system files, in real time, for changes that might indicate an attack.<br>Available for VirtualMachines plan (P2 sub plan). <br><br>**ContainerSensor** - The sensor is based on IG and provides a rich threat detection suite for Kubernetes clusters, nodes, and workloads, powered by Microsoft leading threat intelligence, provides mapping to MITRE ATT&CK framework.<br>Available for Containers plan. <br><br>**AIPromptEvidence** - Exposes the prompts passed between the user and the AI model as alert evidence. This helps classify and triage the alerts with relevant user context. The prompt snippets will include only segments of the user prompt or model response that were deemed suspicious and relevant for security classifications. The prompt evidence will be available through Defender portal as part of each alert.<br>Available for AI plan. <br><br>
5519
5511
  """
5520
5512
  return pulumi.get(self, "name")
5521
5513
 
@@ -33,11 +33,7 @@ if not MYPY:
33
33
  """
34
34
  name: pulumi.Input[str]
35
35
  """
36
- The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - API-based discovery of information about Kubernetes cluster architecture, workload objects, and setup. Required for Kubernetes inventory, identity and network exposure detection, attack path analysis and risk hunting as part of the cloud security explorer.
37
- Available for CloudPosture plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.
38
- Available for StorageAccounts plan.<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.
39
- Available for StorageAccounts and CloudPosture plans.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.
40
- Available for CloudPosture and Containers plans.
36
+ The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - Provides zero footprint, API-based discovery of Kubernetes clusters, their configurations and deployments. The collected data is used to create a contextualized security graph for Kubernetes clusters, provide risk hunting capabilities, and visualize risks and threats to Kubernetes environments and workloads.<br>Available for CloudPosture plan and Containers plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plans).<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plan) and CloudPosture plan.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.<br>Available for CloudPosture plan and Containers plan.<br><br>**MdeDesignatedSubscription** - Direct onboarding is a seamless integration between Defender for Endpoint and Defender for Cloud that doesn’t require extra software deployment on your servers. The onboarded resources will be presented under a designated Azure Subscription you configure<br>Available for VirtualMachines plan (P1 and P2 sub plans).<br><br>**AgentlessVmScanning** - Scans your machines for installed software, vulnerabilities, malware and secret scanning without relying on agents or impacting machine performance. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-agentless-data-collection.<br>Available for CloudPosture plan, VirtualMachines plan (P2 sub plan) and Containers plan.<br><br>**EntraPermissionsManagement** - Permissions Management provides Cloud Infrastructure Entitlement Management (CIEM) capabilities that helps organizations to manage and control user access and entitlements in their cloud infrastructure - important attack vector for cloud environments.<br>Permissions Management analyzes all permissions and active usage, and suggests recommendations to reduce permissions to enforce the principle of least privilege. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/permissions-management.<br>Available for CloudPosture plan. <br><br>**FileIntegrityMonitoring** - File integrity monitoring (FIM), examines operating system files.<br>Windows registries, Linux system files, in real time, for changes that might indicate an attack.<br>Available for VirtualMachines plan (P2 sub plan). <br><br>**ContainerSensor** - The sensor is based on IG and provides a rich threat detection suite for Kubernetes clusters, nodes, and workloads, powered by Microsoft leading threat intelligence, provides mapping to MITRE ATT&CK framework.<br>Available for Containers plan. <br><br>**AIPromptEvidence** - Exposes the prompts passed between the user and the AI model as alert evidence. This helps classify and triage the alerts with relevant user context. The prompt snippets will include only segments of the user prompt or model response that were deemed suspicious and relevant for security classifications. The prompt evidence will be available through Defender portal as part of each alert.<br>Available for AI plan. <br><br>
41
37
  """
42
38
  additional_extension_properties: NotRequired[Any]
43
39
  """
@@ -55,11 +51,7 @@ class ExtensionArgs:
55
51
  """
56
52
  A plan's extension properties
57
53
  :param pulumi.Input[Union[str, 'IsEnabled']] is_enabled: Indicates whether the extension is enabled.
58
- :param pulumi.Input[str] name: The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - API-based discovery of information about Kubernetes cluster architecture, workload objects, and setup. Required for Kubernetes inventory, identity and network exposure detection, attack path analysis and risk hunting as part of the cloud security explorer.
59
- Available for CloudPosture plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.
60
- Available for StorageAccounts plan.<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.
61
- Available for StorageAccounts and CloudPosture plans.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.
62
- Available for CloudPosture and Containers plans.
54
+ :param pulumi.Input[str] name: The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - Provides zero footprint, API-based discovery of Kubernetes clusters, their configurations and deployments. The collected data is used to create a contextualized security graph for Kubernetes clusters, provide risk hunting capabilities, and visualize risks and threats to Kubernetes environments and workloads.<br>Available for CloudPosture plan and Containers plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plans).<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plan) and CloudPosture plan.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.<br>Available for CloudPosture plan and Containers plan.<br><br>**MdeDesignatedSubscription** - Direct onboarding is a seamless integration between Defender for Endpoint and Defender for Cloud that doesn’t require extra software deployment on your servers. The onboarded resources will be presented under a designated Azure Subscription you configure<br>Available for VirtualMachines plan (P1 and P2 sub plans).<br><br>**AgentlessVmScanning** - Scans your machines for installed software, vulnerabilities, malware and secret scanning without relying on agents or impacting machine performance. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-agentless-data-collection.<br>Available for CloudPosture plan, VirtualMachines plan (P2 sub plan) and Containers plan.<br><br>**EntraPermissionsManagement** - Permissions Management provides Cloud Infrastructure Entitlement Management (CIEM) capabilities that helps organizations to manage and control user access and entitlements in their cloud infrastructure - important attack vector for cloud environments.<br>Permissions Management analyzes all permissions and active usage, and suggests recommendations to reduce permissions to enforce the principle of least privilege. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/permissions-management.<br>Available for CloudPosture plan. <br><br>**FileIntegrityMonitoring** - File integrity monitoring (FIM), examines operating system files.<br>Windows registries, Linux system files, in real time, for changes that might indicate an attack.<br>Available for VirtualMachines plan (P2 sub plan). <br><br>**ContainerSensor** - The sensor is based on IG and provides a rich threat detection suite for Kubernetes clusters, nodes, and workloads, powered by Microsoft leading threat intelligence, provides mapping to MITRE ATT&CK framework.<br>Available for Containers plan. <br><br>**AIPromptEvidence** - Exposes the prompts passed between the user and the AI model as alert evidence. This helps classify and triage the alerts with relevant user context. The prompt snippets will include only segments of the user prompt or model response that were deemed suspicious and relevant for security classifications. The prompt evidence will be available through Defender portal as part of each alert.<br>Available for AI plan. <br><br>
63
55
  :param Any additional_extension_properties: Property values associated with the extension.
64
56
  """
65
57
  pulumi.set(__self__, "is_enabled", is_enabled)
@@ -83,11 +75,7 @@ class ExtensionArgs:
83
75
  @pulumi.getter
84
76
  def name(self) -> pulumi.Input[str]:
85
77
  """
86
- The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - API-based discovery of information about Kubernetes cluster architecture, workload objects, and setup. Required for Kubernetes inventory, identity and network exposure detection, attack path analysis and risk hunting as part of the cloud security explorer.
87
- Available for CloudPosture plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.
88
- Available for StorageAccounts plan.<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.
89
- Available for StorageAccounts and CloudPosture plans.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.
90
- Available for CloudPosture and Containers plans.
78
+ The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - Provides zero footprint, API-based discovery of Kubernetes clusters, their configurations and deployments. The collected data is used to create a contextualized security graph for Kubernetes clusters, provide risk hunting capabilities, and visualize risks and threats to Kubernetes environments and workloads.<br>Available for CloudPosture plan and Containers plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plans).<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plan) and CloudPosture plan.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.<br>Available for CloudPosture plan and Containers plan.<br><br>**MdeDesignatedSubscription** - Direct onboarding is a seamless integration between Defender for Endpoint and Defender for Cloud that doesn’t require extra software deployment on your servers. The onboarded resources will be presented under a designated Azure Subscription you configure<br>Available for VirtualMachines plan (P1 and P2 sub plans).<br><br>**AgentlessVmScanning** - Scans your machines for installed software, vulnerabilities, malware and secret scanning without relying on agents or impacting machine performance. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-agentless-data-collection.<br>Available for CloudPosture plan, VirtualMachines plan (P2 sub plan) and Containers plan.<br><br>**EntraPermissionsManagement** - Permissions Management provides Cloud Infrastructure Entitlement Management (CIEM) capabilities that helps organizations to manage and control user access and entitlements in their cloud infrastructure - important attack vector for cloud environments.<br>Permissions Management analyzes all permissions and active usage, and suggests recommendations to reduce permissions to enforce the principle of least privilege. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/permissions-management.<br>Available for CloudPosture plan. <br><br>**FileIntegrityMonitoring** - File integrity monitoring (FIM), examines operating system files.<br>Windows registries, Linux system files, in real time, for changes that might indicate an attack.<br>Available for VirtualMachines plan (P2 sub plan). <br><br>**ContainerSensor** - The sensor is based on IG and provides a rich threat detection suite for Kubernetes clusters, nodes, and workloads, powered by Microsoft leading threat intelligence, provides mapping to MITRE ATT&CK framework.<br>Available for Containers plan. <br><br>**AIPromptEvidence** - Exposes the prompts passed between the user and the AI model as alert evidence. This helps classify and triage the alerts with relevant user context. The prompt snippets will include only segments of the user prompt or model response that were deemed suspicious and relevant for security classifications. The prompt evidence will be available through Defender portal as part of each alert.<br>Available for AI plan. <br><br>
91
79
  """
92
80
  return pulumi.get(self, "name")
93
81