pulumi-cloudflare 6.10.1__py3-none-any.whl → 6.11.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (96) hide show
  1. pulumi_cloudflare/__init__.py +31 -0
  2. pulumi_cloudflare/_inputs.py +2127 -309
  3. pulumi_cloudflare/access_application.py +7 -7
  4. pulumi_cloudflare/access_identity_provider.py +60 -0
  5. pulumi_cloudflare/access_mutual_tls_hostname_settings.py +26 -0
  6. pulumi_cloudflare/access_organization.py +56 -0
  7. pulumi_cloudflare/access_policy.py +96 -0
  8. pulumi_cloudflare/account.py +47 -0
  9. pulumi_cloudflare/account_dns_settings.py +62 -0
  10. pulumi_cloudflare/account_subscription.py +36 -0
  11. pulumi_cloudflare/account_token.py +90 -0
  12. pulumi_cloudflare/api_shield.py +0 -68
  13. pulumi_cloudflare/api_token.py +88 -0
  14. pulumi_cloudflare/authenticated_origin_pulls.py +26 -0
  15. pulumi_cloudflare/content_scanning.py +253 -0
  16. pulumi_cloudflare/custom_hostname.py +144 -0
  17. pulumi_cloudflare/custom_pages.py +7 -7
  18. pulumi_cloudflare/device_managed_networks.py +28 -0
  19. pulumi_cloudflare/device_posture_integration.py +34 -0
  20. pulumi_cloudflare/device_posture_rule.py +46 -0
  21. pulumi_cloudflare/dlp_custom_profile.py +57 -7
  22. pulumi_cloudflare/dns_firewall.py +50 -0
  23. pulumi_cloudflare/dns_record.py +38 -0
  24. pulumi_cloudflare/get_account.py +15 -1
  25. pulumi_cloudflare/get_api_shield.py +5 -27
  26. pulumi_cloudflare/get_content_scanning.py +136 -0
  27. pulumi_cloudflare/get_custom_pages.py +3 -3
  28. pulumi_cloudflare/get_list.py +2 -2
  29. pulumi_cloudflare/get_magic_transit_connector.py +12 -1
  30. pulumi_cloudflare/get_notification_policy.py +3 -3
  31. pulumi_cloudflare/get_notification_policy_webhooks.py +2 -2
  32. pulumi_cloudflare/get_organization.py +171 -0
  33. pulumi_cloudflare/get_organization_profile.py +154 -0
  34. pulumi_cloudflare/get_organizations.py +248 -0
  35. pulumi_cloudflare/get_pages_project.py +77 -7
  36. pulumi_cloudflare/get_worker.py +15 -1
  37. pulumi_cloudflare/get_zero_trust_access_application.py +1 -1
  38. pulumi_cloudflare/get_zero_trust_dex_test.py +7 -0
  39. pulumi_cloudflare/get_zero_trust_gateway_policy.py +1 -1
  40. pulumi_cloudflare/get_zero_trust_tunnel_cloudflared_config.py +18 -4
  41. pulumi_cloudflare/healthcheck.py +84 -0
  42. pulumi_cloudflare/hyperdrive_config.py +52 -0
  43. pulumi_cloudflare/keyless_certificate.py +34 -0
  44. pulumi_cloudflare/list_item.py +16 -0
  45. pulumi_cloudflare/load_balancer.py +282 -0
  46. pulumi_cloudflare/logpush_job.py +80 -0
  47. pulumi_cloudflare/magic_transit_site_acl.py +56 -0
  48. pulumi_cloudflare/magic_transit_site_lan.py +82 -0
  49. pulumi_cloudflare/magic_transit_site_wan.py +36 -0
  50. pulumi_cloudflare/magic_wan_static_route.py +34 -0
  51. pulumi_cloudflare/notification_policy.py +145 -7
  52. pulumi_cloudflare/organization.py +297 -0
  53. pulumi_cloudflare/organization_profile.py +340 -0
  54. pulumi_cloudflare/outputs.py +3322 -642
  55. pulumi_cloudflare/page_rule.py +34 -0
  56. pulumi_cloudflare/pages_project.py +571 -30
  57. pulumi_cloudflare/pulumi-plugin.json +1 -1
  58. pulumi_cloudflare/queue_consumer.py +38 -0
  59. pulumi_cloudflare/r2_bucket_cors.py +38 -0
  60. pulumi_cloudflare/r2_bucket_event_notification.py +19 -18
  61. pulumi_cloudflare/r2_bucket_lifecycle.py +70 -0
  62. pulumi_cloudflare/record.py +38 -0
  63. pulumi_cloudflare/snippet.py +42 -0
  64. pulumi_cloudflare/snippet_rules.py +28 -0
  65. pulumi_cloudflare/static_route.py +34 -0
  66. pulumi_cloudflare/teams_account.py +148 -0
  67. pulumi_cloudflare/teams_rule.py +259 -7
  68. pulumi_cloudflare/tunnel_config.py +50 -3
  69. pulumi_cloudflare/worker.py +88 -0
  70. pulumi_cloudflare/worker_script.py +158 -2
  71. pulumi_cloudflare/worker_version.py +112 -0
  72. pulumi_cloudflare/workers_deployment.py +34 -0
  73. pulumi_cloudflare/workers_script.py +158 -2
  74. pulumi_cloudflare/zero_trust_access_application.py +7 -7
  75. pulumi_cloudflare/zero_trust_access_identity_provider.py +60 -0
  76. pulumi_cloudflare/zero_trust_access_mtls_hostname_settings.py +26 -0
  77. pulumi_cloudflare/zero_trust_access_policy.py +96 -0
  78. pulumi_cloudflare/zero_trust_device_managed_networks.py +28 -0
  79. pulumi_cloudflare/zero_trust_device_posture_integration.py +34 -0
  80. pulumi_cloudflare/zero_trust_device_posture_rule.py +46 -0
  81. pulumi_cloudflare/zero_trust_dex_test.py +63 -3
  82. pulumi_cloudflare/zero_trust_dlp_custom_entry.py +6 -7
  83. pulumi_cloudflare/zero_trust_dlp_custom_profile.py +57 -7
  84. pulumi_cloudflare/zero_trust_dlp_entry.py +6 -7
  85. pulumi_cloudflare/zero_trust_dlp_predefined_entry.py +1 -1
  86. pulumi_cloudflare/zero_trust_gateway_policy.py +259 -7
  87. pulumi_cloudflare/zero_trust_gateway_settings.py +148 -0
  88. pulumi_cloudflare/zero_trust_organization.py +56 -0
  89. pulumi_cloudflare/zero_trust_tunnel_cloudflared_config.py +50 -3
  90. pulumi_cloudflare/zone_cache_variants.py +108 -0
  91. pulumi_cloudflare/zone_dns_settings.py +60 -0
  92. pulumi_cloudflare/zone_subscription.py +36 -0
  93. {pulumi_cloudflare-6.10.1.dist-info → pulumi_cloudflare-6.11.0.dist-info}/METADATA +1 -1
  94. {pulumi_cloudflare-6.10.1.dist-info → pulumi_cloudflare-6.11.0.dist-info}/RECORD +96 -89
  95. {pulumi_cloudflare-6.10.1.dist-info → pulumi_cloudflare-6.11.0.dist-info}/WHEEL +0 -0
  96. {pulumi_cloudflare-6.10.1.dist-info → pulumi_cloudflare-6.11.0.dist-info}/top_level.txt +0 -0
@@ -614,6 +614,46 @@ class LogpushJob(pulumi.CustomResource):
614
614
  """
615
615
  ## Example Usage
616
616
 
617
+ ```python
618
+ import pulumi
619
+ import pulumi_cloudflare as cloudflare
620
+
621
+ example_logpush_job = cloudflare.LogpushJob("example_logpush_job",
622
+ destination_conf="s3://mybucket/logs?region=us-west-2",
623
+ zone_id="zone_id",
624
+ dataset="gateway_dns",
625
+ enabled=False,
626
+ filter="{\\"where\\":{\\"and\\":[{\\"key\\":\\"ClientRequestPath\\",\\"operator\\":\\"contains\\",\\"value\\":\\"/static\\"},{\\"key\\":\\"ClientRequestHost\\",\\"operator\\":\\"eq\\",\\"value\\":\\"example.com\\"}]}}",
627
+ frequency="high",
628
+ kind="",
629
+ logpull_options="fields=RayID,ClientIP,EdgeStartTimestamp&timestamps=rfc3339",
630
+ max_upload_bytes=5000000,
631
+ max_upload_interval_seconds=30,
632
+ max_upload_records=1000,
633
+ name="example.com",
634
+ output_options={
635
+ "batch_prefix": "",
636
+ "batch_suffix": "",
637
+ "cve202144228": False,
638
+ "field_delimiter": ",",
639
+ "field_names": [
640
+ "Datetime",
641
+ "DstIP",
642
+ "SrcIP",
643
+ ],
644
+ "output_type": "ndjson",
645
+ "record_delimiter": "",
646
+ "record_prefix": "{",
647
+ "record_suffix": \"\"\" }
648
+
649
+ \"\"\",
650
+ "record_template": "record_template",
651
+ "sample_rate": 1,
652
+ "timestamp_format": "unixnano",
653
+ },
654
+ ownership_challenge="00000000000000000000")
655
+ ```
656
+
617
657
  ## Import
618
658
 
619
659
  ```sh
@@ -650,6 +690,46 @@ class LogpushJob(pulumi.CustomResource):
650
690
  """
651
691
  ## Example Usage
652
692
 
693
+ ```python
694
+ import pulumi
695
+ import pulumi_cloudflare as cloudflare
696
+
697
+ example_logpush_job = cloudflare.LogpushJob("example_logpush_job",
698
+ destination_conf="s3://mybucket/logs?region=us-west-2",
699
+ zone_id="zone_id",
700
+ dataset="gateway_dns",
701
+ enabled=False,
702
+ filter="{\\"where\\":{\\"and\\":[{\\"key\\":\\"ClientRequestPath\\",\\"operator\\":\\"contains\\",\\"value\\":\\"/static\\"},{\\"key\\":\\"ClientRequestHost\\",\\"operator\\":\\"eq\\",\\"value\\":\\"example.com\\"}]}}",
703
+ frequency="high",
704
+ kind="",
705
+ logpull_options="fields=RayID,ClientIP,EdgeStartTimestamp&timestamps=rfc3339",
706
+ max_upload_bytes=5000000,
707
+ max_upload_interval_seconds=30,
708
+ max_upload_records=1000,
709
+ name="example.com",
710
+ output_options={
711
+ "batch_prefix": "",
712
+ "batch_suffix": "",
713
+ "cve202144228": False,
714
+ "field_delimiter": ",",
715
+ "field_names": [
716
+ "Datetime",
717
+ "DstIP",
718
+ "SrcIP",
719
+ ],
720
+ "output_type": "ndjson",
721
+ "record_delimiter": "",
722
+ "record_prefix": "{",
723
+ "record_suffix": \"\"\" }
724
+
725
+ \"\"\",
726
+ "record_template": "record_template",
727
+ "sample_rate": 1,
728
+ "timestamp_format": "unixnano",
729
+ },
730
+ ownership_challenge="00000000000000000000")
731
+ ```
732
+
653
733
  ## Import
654
734
 
655
735
  ```sh
@@ -312,6 +312,34 @@ class MagicTransitSiteAcl(pulumi.CustomResource):
312
312
  """
313
313
  ## Example Usage
314
314
 
315
+ ```python
316
+ import pulumi
317
+ import pulumi_cloudflare as cloudflare
318
+
319
+ example_magic_transit_site_acl = cloudflare.MagicTransitSiteAcl("example_magic_transit_site_acl",
320
+ account_id="023e105f4ecef8ad9ca31a8372d0c353",
321
+ site_id="023e105f4ecef8ad9ca31a8372d0c353",
322
+ lan1={
323
+ "lan_id": "lan_id",
324
+ "lan_name": "lan_name",
325
+ "port_ranges": ["8080-9000"],
326
+ "ports": [1],
327
+ "subnets": ["192.0.2.1"],
328
+ },
329
+ lan2={
330
+ "lan_id": "lan_id",
331
+ "lan_name": "lan_name",
332
+ "port_ranges": ["8080-9000"],
333
+ "ports": [1],
334
+ "subnets": ["192.0.2.1"],
335
+ },
336
+ name="PIN Pad - Cash Register",
337
+ description="Allows local traffic between PIN pads and cash register.",
338
+ forward_locally=True,
339
+ protocols=["tcp"],
340
+ unidirectional=True)
341
+ ```
342
+
315
343
  ## Import
316
344
 
317
345
  ```sh
@@ -336,6 +364,34 @@ class MagicTransitSiteAcl(pulumi.CustomResource):
336
364
  """
337
365
  ## Example Usage
338
366
 
367
+ ```python
368
+ import pulumi
369
+ import pulumi_cloudflare as cloudflare
370
+
371
+ example_magic_transit_site_acl = cloudflare.MagicTransitSiteAcl("example_magic_transit_site_acl",
372
+ account_id="023e105f4ecef8ad9ca31a8372d0c353",
373
+ site_id="023e105f4ecef8ad9ca31a8372d0c353",
374
+ lan1={
375
+ "lan_id": "lan_id",
376
+ "lan_name": "lan_name",
377
+ "port_ranges": ["8080-9000"],
378
+ "ports": [1],
379
+ "subnets": ["192.0.2.1"],
380
+ },
381
+ lan2={
382
+ "lan_id": "lan_id",
383
+ "lan_name": "lan_name",
384
+ "port_ranges": ["8080-9000"],
385
+ "ports": [1],
386
+ "subnets": ["192.0.2.1"],
387
+ },
388
+ name="PIN Pad - Cash Register",
389
+ description="Allows local traffic between PIN pads and cash register.",
390
+ forward_locally=True,
391
+ protocols=["tcp"],
392
+ unidirectional=True)
393
+ ```
394
+
339
395
  ## Import
340
396
 
341
397
  ```sh
@@ -306,6 +306,47 @@ class MagicTransitSiteLan(pulumi.CustomResource):
306
306
  """
307
307
  ## Example Usage
308
308
 
309
+ ```python
310
+ import pulumi
311
+ import pulumi_cloudflare as cloudflare
312
+
313
+ example_magic_transit_site_lan = cloudflare.MagicTransitSiteLan("example_magic_transit_site_lan",
314
+ account_id="023e105f4ecef8ad9ca31a8372d0c353",
315
+ site_id="023e105f4ecef8ad9ca31a8372d0c353",
316
+ physport=1,
317
+ ha_link=True,
318
+ name="name",
319
+ nat={
320
+ "static_prefix": "192.0.2.0/24",
321
+ },
322
+ routed_subnets=[{
323
+ "next_hop": "192.0.2.1",
324
+ "prefix": "192.0.2.0/24",
325
+ "nat": {
326
+ "static_prefix": "192.0.2.0/24",
327
+ },
328
+ }],
329
+ static_addressing={
330
+ "address": "192.0.2.0/24",
331
+ "dhcp_relay": {
332
+ "server_addresses": ["192.0.2.1"],
333
+ },
334
+ "dhcp_server": {
335
+ "dhcp_pool_end": "192.0.2.1",
336
+ "dhcp_pool_start": "192.0.2.1",
337
+ "dns_server": "192.0.2.1",
338
+ "dns_servers": ["192.0.2.1"],
339
+ "reservations": {
340
+ "00:11:22:33:44:55": "192.0.2.100",
341
+ "AA:BB:CC:DD:EE:FF": "192.168.1.101",
342
+ },
343
+ },
344
+ "secondary_address": "192.0.2.0/24",
345
+ "virtual_address": "192.0.2.0/24",
346
+ },
347
+ vlan_tag=42)
348
+ ```
349
+
309
350
  ## Import
310
351
 
311
352
  ```sh
@@ -329,6 +370,47 @@ class MagicTransitSiteLan(pulumi.CustomResource):
329
370
  """
330
371
  ## Example Usage
331
372
 
373
+ ```python
374
+ import pulumi
375
+ import pulumi_cloudflare as cloudflare
376
+
377
+ example_magic_transit_site_lan = cloudflare.MagicTransitSiteLan("example_magic_transit_site_lan",
378
+ account_id="023e105f4ecef8ad9ca31a8372d0c353",
379
+ site_id="023e105f4ecef8ad9ca31a8372d0c353",
380
+ physport=1,
381
+ ha_link=True,
382
+ name="name",
383
+ nat={
384
+ "static_prefix": "192.0.2.0/24",
385
+ },
386
+ routed_subnets=[{
387
+ "next_hop": "192.0.2.1",
388
+ "prefix": "192.0.2.0/24",
389
+ "nat": {
390
+ "static_prefix": "192.0.2.0/24",
391
+ },
392
+ }],
393
+ static_addressing={
394
+ "address": "192.0.2.0/24",
395
+ "dhcp_relay": {
396
+ "server_addresses": ["192.0.2.1"],
397
+ },
398
+ "dhcp_server": {
399
+ "dhcp_pool_end": "192.0.2.1",
400
+ "dhcp_pool_start": "192.0.2.1",
401
+ "dns_server": "192.0.2.1",
402
+ "dns_servers": ["192.0.2.1"],
403
+ "reservations": {
404
+ "00:11:22:33:44:55": "192.0.2.100",
405
+ "AA:BB:CC:DD:EE:FF": "192.168.1.101",
406
+ },
407
+ },
408
+ "secondary_address": "192.0.2.0/24",
409
+ "virtual_address": "192.0.2.0/24",
410
+ },
411
+ vlan_tag=42)
412
+ ```
413
+
332
414
  ## Import
333
415
 
334
416
  ```sh
@@ -266,6 +266,24 @@ class MagicTransitSiteWan(pulumi.CustomResource):
266
266
  """
267
267
  ## Example Usage
268
268
 
269
+ ```python
270
+ import pulumi
271
+ import pulumi_cloudflare as cloudflare
272
+
273
+ example_magic_transit_site_wan = cloudflare.MagicTransitSiteWan("example_magic_transit_site_wan",
274
+ account_id="023e105f4ecef8ad9ca31a8372d0c353",
275
+ site_id="023e105f4ecef8ad9ca31a8372d0c353",
276
+ physport=1,
277
+ name="name",
278
+ priority=0,
279
+ static_addressing={
280
+ "address": "192.0.2.0/24",
281
+ "gateway_address": "192.0.2.1",
282
+ "secondary_address": "192.0.2.0/24",
283
+ },
284
+ vlan_tag=42)
285
+ ```
286
+
269
287
  ## Import
270
288
 
271
289
  ```sh
@@ -288,6 +306,24 @@ class MagicTransitSiteWan(pulumi.CustomResource):
288
306
  """
289
307
  ## Example Usage
290
308
 
309
+ ```python
310
+ import pulumi
311
+ import pulumi_cloudflare as cloudflare
312
+
313
+ example_magic_transit_site_wan = cloudflare.MagicTransitSiteWan("example_magic_transit_site_wan",
314
+ account_id="023e105f4ecef8ad9ca31a8372d0c353",
315
+ site_id="023e105f4ecef8ad9ca31a8372d0c353",
316
+ physport=1,
317
+ name="name",
318
+ priority=0,
319
+ static_addressing={
320
+ "address": "192.0.2.0/24",
321
+ "gateway_address": "192.0.2.1",
322
+ "secondary_address": "192.0.2.0/24",
323
+ },
324
+ vlan_tag=42)
325
+ ```
326
+
291
327
  ## Import
292
328
 
293
329
  ```sh
@@ -303,6 +303,23 @@ class MagicWanStaticRoute(pulumi.CustomResource):
303
303
  """
304
304
  ## Example Usage
305
305
 
306
+ ```python
307
+ import pulumi
308
+ import pulumi_cloudflare as cloudflare
309
+
310
+ example_magic_wan_static_route = cloudflare.MagicWanStaticRoute("example_magic_wan_static_route",
311
+ account_id="023e105f4ecef8ad9ca31a8372d0c353",
312
+ nexthop="203.0.113.1",
313
+ prefix="192.0.2.0/24",
314
+ priority=0,
315
+ description="New route for new prefix 203.0.113.1",
316
+ scope={
317
+ "colo_names": ["den01"],
318
+ "colo_regions": ["APAC"],
319
+ },
320
+ weight=0)
321
+ ```
322
+
306
323
  ## Import
307
324
 
308
325
  ```sh
@@ -328,6 +345,23 @@ class MagicWanStaticRoute(pulumi.CustomResource):
328
345
  """
329
346
  ## Example Usage
330
347
 
348
+ ```python
349
+ import pulumi
350
+ import pulumi_cloudflare as cloudflare
351
+
352
+ example_magic_wan_static_route = cloudflare.MagicWanStaticRoute("example_magic_wan_static_route",
353
+ account_id="023e105f4ecef8ad9ca31a8372d0c353",
354
+ nexthop="203.0.113.1",
355
+ prefix="192.0.2.0/24",
356
+ priority=0,
357
+ description="New route for new prefix 203.0.113.1",
358
+ scope={
359
+ "colo_names": ["den01"],
360
+ "colo_regions": ["APAC"],
361
+ },
362
+ weight=0)
363
+ ```
364
+
331
365
  ## Import
332
366
 
333
367
  ```sh
@@ -33,7 +33,7 @@ class NotificationPolicyArgs:
33
33
  The set of arguments for constructing a NotificationPolicy resource.
34
34
  :param pulumi.Input[_builtins.str] account_id: The account id
35
35
  :param pulumi.Input[_builtins.str] alert_type: Refers to which event will trigger a Notification dispatch. You can use the endpoint to get available alert types which then will give you a list of possible values.
36
- Available values: "access*custom*certificate*expiration*type", "advanced*ddos*attack*l4*alert", "advanced*ddos*attack*l7*alert", "advanced*http*alert*error", "bgp*hijack*notification", "billing*usage*alert", "block*notification*block*removed", "block*notification*new*block", "block*notification*review*rejected", "bot*traffic*basic*alert", "brand*protection*alert", "brand*protection*digest", "clickhouse*alert*fw*anomaly", "clickhouse*alert*fw*ent*anomaly", "cloudforce*one*request*notification", "custom*analytics", "custom*bot*detection*alert", "custom*ssl*certificate*event*type", "dedicated*ssl*certificate*event*type", "device*connectivity*anomaly*alert", "dos*attack*l4", "dos*attack*l7", "expiring*service*token*alert", "failing*logpush*job*disabled*alert", "fbm*auto*advertisement", "fbm*dosd*attack", "fbm*volumetric*attack", "health*check*status*notification", "hostname*aop*custom*certificate*expiration*type", "http*alert*edge*error", "http*alert*origin*error", "image*notification", "image*resizing*notification", "incident*alert", "load*balancing*health*alert", "load*balancing*pool*enablement*alert", "logo*match*alert", "magic*tunnel*health*check*event", "magic*wan*tunnel*health", "maintenance*event*notification", "mtls*certificate*store*certificate*expiration*type", "pages*event*alert", "radar*notification", "real*origin*monitoring", "scriptmonitor*alert*new*code*change*detections", "scriptmonitor*alert*new*hosts", "scriptmonitor*alert*new*malicious*hosts", "scriptmonitor*alert*new*malicious*scripts", "scriptmonitor*alert*new*malicious*url", "scriptmonitor*alert*new*max*length*resource*url", "scriptmonitor*alert*new*resources", "secondary*dns*all*primaries*failing", "secondary*dns*primaries*failing", "secondary*dns*warning", "secondary*dns*zone*successfully*updated", "secondary*dns*zone*validation*warning", "security*insights*alert", "sentinel*alert", "stream*live*notifications", "synthetic*test*latency*alert", "synthetic*test*low*availability*alert", "traffic*anomalies*alert", "tunnel*health*event", "tunnel*update*event", "universal*ssl*event*type", "web*analytics*metrics*update", "zone*aop*custom*certificate*expiration*type".
36
+ Available values: "abuse*report*alert", "access*custom*certificate*expiration*type", "advanced*ddos*attack*l4*alert", "advanced*ddos*attack*l7*alert", "advanced*http*alert*error", "bgp*hijack*notification", "billing*usage*alert", "block*notification*block*removed", "block*notification*new*block", "block*notification*review*rejected", "bot*traffic*basic*alert", "brand*protection*alert", "brand*protection*digest", "clickhouse*alert*fw*anomaly", "clickhouse*alert*fw*ent*anomaly", "cloudforce*one*request*notification", "custom*analytics", "custom*bot*detection*alert", "custom*ssl*certificate*event*type", "dedicated*ssl*certificate*event*type", "device*connectivity*anomaly*alert", "dos*attack*l4", "dos*attack*l7", "expiring*service*token*alert", "failing*logpush*job*disabled*alert", "fbm*auto*advertisement", "fbm*dosd*attack", "fbm*volumetric*attack", "health*check*status*notification", "hostname*aop*custom*certificate*expiration*type", "http*alert*edge*error", "http*alert*origin*error", "image*notification", "image*resizing*notification", "incident*alert", "load*balancing*health*alert", "load*balancing*pool*enablement*alert", "logo*match*alert", "magic*tunnel*health*check*event", "magic*wan*tunnel*health", "maintenance*event*notification", "mtls*certificate*store*certificate*expiration*type", "pages*event*alert", "radar*notification", "real*origin*monitoring", "scriptmonitor*alert*new*code*change*detections", "scriptmonitor*alert*new*hosts", "scriptmonitor*alert*new*malicious*hosts", "scriptmonitor*alert*new*malicious*scripts", "scriptmonitor*alert*new*malicious*url", "scriptmonitor*alert*new*max*length*resource*url", "scriptmonitor*alert*new*resources", "secondary*dns*all*primaries*failing", "secondary*dns*primaries*failing", "secondary*dns*warning", "secondary*dns*zone*successfully*updated", "secondary*dns*zone*validation*warning", "security*insights*alert", "sentinel*alert", "stream*live*notifications", "synthetic*test*latency*alert", "synthetic*test*low*availability*alert", "traffic*anomalies*alert", "tunnel*health*event", "tunnel*update*event", "universal*ssl*event*type", "web*analytics*metrics*update", "zone*aop*custom*certificate*expiration*type".
37
37
  :param pulumi.Input['NotificationPolicyMechanismsArgs'] mechanisms: List of IDs that will be used when dispatching a notification. IDs for email type will be the email address.
38
38
  :param pulumi.Input[_builtins.str] name: Name of the policy.
39
39
  :param pulumi.Input[_builtins.str] alert_interval: Optional specification of how often to re-alert from the same incident, not support on all alert types.
@@ -71,7 +71,7 @@ class NotificationPolicyArgs:
71
71
  def alert_type(self) -> pulumi.Input[_builtins.str]:
72
72
  """
73
73
  Refers to which event will trigger a Notification dispatch. You can use the endpoint to get available alert types which then will give you a list of possible values.
74
- Available values: "access*custom*certificate*expiration*type", "advanced*ddos*attack*l4*alert", "advanced*ddos*attack*l7*alert", "advanced*http*alert*error", "bgp*hijack*notification", "billing*usage*alert", "block*notification*block*removed", "block*notification*new*block", "block*notification*review*rejected", "bot*traffic*basic*alert", "brand*protection*alert", "brand*protection*digest", "clickhouse*alert*fw*anomaly", "clickhouse*alert*fw*ent*anomaly", "cloudforce*one*request*notification", "custom*analytics", "custom*bot*detection*alert", "custom*ssl*certificate*event*type", "dedicated*ssl*certificate*event*type", "device*connectivity*anomaly*alert", "dos*attack*l4", "dos*attack*l7", "expiring*service*token*alert", "failing*logpush*job*disabled*alert", "fbm*auto*advertisement", "fbm*dosd*attack", "fbm*volumetric*attack", "health*check*status*notification", "hostname*aop*custom*certificate*expiration*type", "http*alert*edge*error", "http*alert*origin*error", "image*notification", "image*resizing*notification", "incident*alert", "load*balancing*health*alert", "load*balancing*pool*enablement*alert", "logo*match*alert", "magic*tunnel*health*check*event", "magic*wan*tunnel*health", "maintenance*event*notification", "mtls*certificate*store*certificate*expiration*type", "pages*event*alert", "radar*notification", "real*origin*monitoring", "scriptmonitor*alert*new*code*change*detections", "scriptmonitor*alert*new*hosts", "scriptmonitor*alert*new*malicious*hosts", "scriptmonitor*alert*new*malicious*scripts", "scriptmonitor*alert*new*malicious*url", "scriptmonitor*alert*new*max*length*resource*url", "scriptmonitor*alert*new*resources", "secondary*dns*all*primaries*failing", "secondary*dns*primaries*failing", "secondary*dns*warning", "secondary*dns*zone*successfully*updated", "secondary*dns*zone*validation*warning", "security*insights*alert", "sentinel*alert", "stream*live*notifications", "synthetic*test*latency*alert", "synthetic*test*low*availability*alert", "traffic*anomalies*alert", "tunnel*health*event", "tunnel*update*event", "universal*ssl*event*type", "web*analytics*metrics*update", "zone*aop*custom*certificate*expiration*type".
74
+ Available values: "abuse*report*alert", "access*custom*certificate*expiration*type", "advanced*ddos*attack*l4*alert", "advanced*ddos*attack*l7*alert", "advanced*http*alert*error", "bgp*hijack*notification", "billing*usage*alert", "block*notification*block*removed", "block*notification*new*block", "block*notification*review*rejected", "bot*traffic*basic*alert", "brand*protection*alert", "brand*protection*digest", "clickhouse*alert*fw*anomaly", "clickhouse*alert*fw*ent*anomaly", "cloudforce*one*request*notification", "custom*analytics", "custom*bot*detection*alert", "custom*ssl*certificate*event*type", "dedicated*ssl*certificate*event*type", "device*connectivity*anomaly*alert", "dos*attack*l4", "dos*attack*l7", "expiring*service*token*alert", "failing*logpush*job*disabled*alert", "fbm*auto*advertisement", "fbm*dosd*attack", "fbm*volumetric*attack", "health*check*status*notification", "hostname*aop*custom*certificate*expiration*type", "http*alert*edge*error", "http*alert*origin*error", "image*notification", "image*resizing*notification", "incident*alert", "load*balancing*health*alert", "load*balancing*pool*enablement*alert", "logo*match*alert", "magic*tunnel*health*check*event", "magic*wan*tunnel*health", "maintenance*event*notification", "mtls*certificate*store*certificate*expiration*type", "pages*event*alert", "radar*notification", "real*origin*monitoring", "scriptmonitor*alert*new*code*change*detections", "scriptmonitor*alert*new*hosts", "scriptmonitor*alert*new*malicious*hosts", "scriptmonitor*alert*new*malicious*scripts", "scriptmonitor*alert*new*malicious*url", "scriptmonitor*alert*new*max*length*resource*url", "scriptmonitor*alert*new*resources", "secondary*dns*all*primaries*failing", "secondary*dns*primaries*failing", "secondary*dns*warning", "secondary*dns*zone*successfully*updated", "secondary*dns*zone*validation*warning", "security*insights*alert", "sentinel*alert", "stream*live*notifications", "synthetic*test*latency*alert", "synthetic*test*low*availability*alert", "traffic*anomalies*alert", "tunnel*health*event", "tunnel*update*event", "universal*ssl*event*type", "web*analytics*metrics*update", "zone*aop*custom*certificate*expiration*type".
75
75
  """
76
76
  return pulumi.get(self, "alert_type")
77
77
 
@@ -170,7 +170,7 @@ class _NotificationPolicyState:
170
170
  :param pulumi.Input[_builtins.str] account_id: The account id
171
171
  :param pulumi.Input[_builtins.str] alert_interval: Optional specification of how often to re-alert from the same incident, not support on all alert types.
172
172
  :param pulumi.Input[_builtins.str] alert_type: Refers to which event will trigger a Notification dispatch. You can use the endpoint to get available alert types which then will give you a list of possible values.
173
- Available values: "access*custom*certificate*expiration*type", "advanced*ddos*attack*l4*alert", "advanced*ddos*attack*l7*alert", "advanced*http*alert*error", "bgp*hijack*notification", "billing*usage*alert", "block*notification*block*removed", "block*notification*new*block", "block*notification*review*rejected", "bot*traffic*basic*alert", "brand*protection*alert", "brand*protection*digest", "clickhouse*alert*fw*anomaly", "clickhouse*alert*fw*ent*anomaly", "cloudforce*one*request*notification", "custom*analytics", "custom*bot*detection*alert", "custom*ssl*certificate*event*type", "dedicated*ssl*certificate*event*type", "device*connectivity*anomaly*alert", "dos*attack*l4", "dos*attack*l7", "expiring*service*token*alert", "failing*logpush*job*disabled*alert", "fbm*auto*advertisement", "fbm*dosd*attack", "fbm*volumetric*attack", "health*check*status*notification", "hostname*aop*custom*certificate*expiration*type", "http*alert*edge*error", "http*alert*origin*error", "image*notification", "image*resizing*notification", "incident*alert", "load*balancing*health*alert", "load*balancing*pool*enablement*alert", "logo*match*alert", "magic*tunnel*health*check*event", "magic*wan*tunnel*health", "maintenance*event*notification", "mtls*certificate*store*certificate*expiration*type", "pages*event*alert", "radar*notification", "real*origin*monitoring", "scriptmonitor*alert*new*code*change*detections", "scriptmonitor*alert*new*hosts", "scriptmonitor*alert*new*malicious*hosts", "scriptmonitor*alert*new*malicious*scripts", "scriptmonitor*alert*new*malicious*url", "scriptmonitor*alert*new*max*length*resource*url", "scriptmonitor*alert*new*resources", "secondary*dns*all*primaries*failing", "secondary*dns*primaries*failing", "secondary*dns*warning", "secondary*dns*zone*successfully*updated", "secondary*dns*zone*validation*warning", "security*insights*alert", "sentinel*alert", "stream*live*notifications", "synthetic*test*latency*alert", "synthetic*test*low*availability*alert", "traffic*anomalies*alert", "tunnel*health*event", "tunnel*update*event", "universal*ssl*event*type", "web*analytics*metrics*update", "zone*aop*custom*certificate*expiration*type".
173
+ Available values: "abuse*report*alert", "access*custom*certificate*expiration*type", "advanced*ddos*attack*l4*alert", "advanced*ddos*attack*l7*alert", "advanced*http*alert*error", "bgp*hijack*notification", "billing*usage*alert", "block*notification*block*removed", "block*notification*new*block", "block*notification*review*rejected", "bot*traffic*basic*alert", "brand*protection*alert", "brand*protection*digest", "clickhouse*alert*fw*anomaly", "clickhouse*alert*fw*ent*anomaly", "cloudforce*one*request*notification", "custom*analytics", "custom*bot*detection*alert", "custom*ssl*certificate*event*type", "dedicated*ssl*certificate*event*type", "device*connectivity*anomaly*alert", "dos*attack*l4", "dos*attack*l7", "expiring*service*token*alert", "failing*logpush*job*disabled*alert", "fbm*auto*advertisement", "fbm*dosd*attack", "fbm*volumetric*attack", "health*check*status*notification", "hostname*aop*custom*certificate*expiration*type", "http*alert*edge*error", "http*alert*origin*error", "image*notification", "image*resizing*notification", "incident*alert", "load*balancing*health*alert", "load*balancing*pool*enablement*alert", "logo*match*alert", "magic*tunnel*health*check*event", "magic*wan*tunnel*health", "maintenance*event*notification", "mtls*certificate*store*certificate*expiration*type", "pages*event*alert", "radar*notification", "real*origin*monitoring", "scriptmonitor*alert*new*code*change*detections", "scriptmonitor*alert*new*hosts", "scriptmonitor*alert*new*malicious*hosts", "scriptmonitor*alert*new*malicious*scripts", "scriptmonitor*alert*new*malicious*url", "scriptmonitor*alert*new*max*length*resource*url", "scriptmonitor*alert*new*resources", "secondary*dns*all*primaries*failing", "secondary*dns*primaries*failing", "secondary*dns*warning", "secondary*dns*zone*successfully*updated", "secondary*dns*zone*validation*warning", "security*insights*alert", "sentinel*alert", "stream*live*notifications", "synthetic*test*latency*alert", "synthetic*test*low*availability*alert", "traffic*anomalies*alert", "tunnel*health*event", "tunnel*update*event", "universal*ssl*event*type", "web*analytics*metrics*update", "zone*aop*custom*certificate*expiration*type".
174
174
  :param pulumi.Input[_builtins.str] description: Optional description for the Notification policy.
175
175
  :param pulumi.Input[_builtins.bool] enabled: Whether or not the Notification policy is enabled.
176
176
  :param pulumi.Input['NotificationPolicyFiltersArgs'] filters: Optional filters that allow you to be alerted only on a subset of events for that alert type based on some criteria. This is only available for select alert types. See alert type documentation for more details.
@@ -227,7 +227,7 @@ class _NotificationPolicyState:
227
227
  def alert_type(self) -> Optional[pulumi.Input[_builtins.str]]:
228
228
  """
229
229
  Refers to which event will trigger a Notification dispatch. You can use the endpoint to get available alert types which then will give you a list of possible values.
230
- Available values: "access*custom*certificate*expiration*type", "advanced*ddos*attack*l4*alert", "advanced*ddos*attack*l7*alert", "advanced*http*alert*error", "bgp*hijack*notification", "billing*usage*alert", "block*notification*block*removed", "block*notification*new*block", "block*notification*review*rejected", "bot*traffic*basic*alert", "brand*protection*alert", "brand*protection*digest", "clickhouse*alert*fw*anomaly", "clickhouse*alert*fw*ent*anomaly", "cloudforce*one*request*notification", "custom*analytics", "custom*bot*detection*alert", "custom*ssl*certificate*event*type", "dedicated*ssl*certificate*event*type", "device*connectivity*anomaly*alert", "dos*attack*l4", "dos*attack*l7", "expiring*service*token*alert", "failing*logpush*job*disabled*alert", "fbm*auto*advertisement", "fbm*dosd*attack", "fbm*volumetric*attack", "health*check*status*notification", "hostname*aop*custom*certificate*expiration*type", "http*alert*edge*error", "http*alert*origin*error", "image*notification", "image*resizing*notification", "incident*alert", "load*balancing*health*alert", "load*balancing*pool*enablement*alert", "logo*match*alert", "magic*tunnel*health*check*event", "magic*wan*tunnel*health", "maintenance*event*notification", "mtls*certificate*store*certificate*expiration*type", "pages*event*alert", "radar*notification", "real*origin*monitoring", "scriptmonitor*alert*new*code*change*detections", "scriptmonitor*alert*new*hosts", "scriptmonitor*alert*new*malicious*hosts", "scriptmonitor*alert*new*malicious*scripts", "scriptmonitor*alert*new*malicious*url", "scriptmonitor*alert*new*max*length*resource*url", "scriptmonitor*alert*new*resources", "secondary*dns*all*primaries*failing", "secondary*dns*primaries*failing", "secondary*dns*warning", "secondary*dns*zone*successfully*updated", "secondary*dns*zone*validation*warning", "security*insights*alert", "sentinel*alert", "stream*live*notifications", "synthetic*test*latency*alert", "synthetic*test*low*availability*alert", "traffic*anomalies*alert", "tunnel*health*event", "tunnel*update*event", "universal*ssl*event*type", "web*analytics*metrics*update", "zone*aop*custom*certificate*expiration*type".
230
+ Available values: "abuse*report*alert", "access*custom*certificate*expiration*type", "advanced*ddos*attack*l4*alert", "advanced*ddos*attack*l7*alert", "advanced*http*alert*error", "bgp*hijack*notification", "billing*usage*alert", "block*notification*block*removed", "block*notification*new*block", "block*notification*review*rejected", "bot*traffic*basic*alert", "brand*protection*alert", "brand*protection*digest", "clickhouse*alert*fw*anomaly", "clickhouse*alert*fw*ent*anomaly", "cloudforce*one*request*notification", "custom*analytics", "custom*bot*detection*alert", "custom*ssl*certificate*event*type", "dedicated*ssl*certificate*event*type", "device*connectivity*anomaly*alert", "dos*attack*l4", "dos*attack*l7", "expiring*service*token*alert", "failing*logpush*job*disabled*alert", "fbm*auto*advertisement", "fbm*dosd*attack", "fbm*volumetric*attack", "health*check*status*notification", "hostname*aop*custom*certificate*expiration*type", "http*alert*edge*error", "http*alert*origin*error", "image*notification", "image*resizing*notification", "incident*alert", "load*balancing*health*alert", "load*balancing*pool*enablement*alert", "logo*match*alert", "magic*tunnel*health*check*event", "magic*wan*tunnel*health", "maintenance*event*notification", "mtls*certificate*store*certificate*expiration*type", "pages*event*alert", "radar*notification", "real*origin*monitoring", "scriptmonitor*alert*new*code*change*detections", "scriptmonitor*alert*new*hosts", "scriptmonitor*alert*new*malicious*hosts", "scriptmonitor*alert*new*malicious*scripts", "scriptmonitor*alert*new*malicious*url", "scriptmonitor*alert*new*max*length*resource*url", "scriptmonitor*alert*new*resources", "secondary*dns*all*primaries*failing", "secondary*dns*primaries*failing", "secondary*dns*warning", "secondary*dns*zone*successfully*updated", "secondary*dns*zone*validation*warning", "security*insights*alert", "sentinel*alert", "stream*live*notifications", "synthetic*test*latency*alert", "synthetic*test*low*availability*alert", "traffic*anomalies*alert", "tunnel*health*event", "tunnel*update*event", "universal*ssl*event*type", "web*analytics*metrics*update", "zone*aop*custom*certificate*expiration*type".
231
231
  """
232
232
  return pulumi.get(self, "alert_type")
233
233
 
@@ -332,6 +332,75 @@ class NotificationPolicy(pulumi.CustomResource):
332
332
  """
333
333
  ## Example Usage
334
334
 
335
+ ```python
336
+ import pulumi
337
+ import pulumi_cloudflare as cloudflare
338
+
339
+ example_notification_policy = cloudflare.NotificationPolicy("example_notification_policy",
340
+ account_id="023e105f4ecef8ad9ca31a8372d0c353",
341
+ alert_type="universal_ssl_event_type",
342
+ enabled=True,
343
+ mechanisms={
344
+ "emails": [{
345
+ "id": "id",
346
+ }],
347
+ "pagerduties": [{
348
+ "id": "f174e90afafe4643bbbc4a0ed4fc8415",
349
+ }],
350
+ "webhooks": [{
351
+ "id": "f174e90afafe4643bbbc4a0ed4fc8415",
352
+ }],
353
+ },
354
+ name="SSL Notification Event Policy",
355
+ alert_interval="30m",
356
+ description="Something describing the policy.",
357
+ filters={
358
+ "actions": ["string"],
359
+ "affected_asns": ["string"],
360
+ "affected_components": ["string"],
361
+ "affected_locations": ["string"],
362
+ "airport_codes": ["string"],
363
+ "alert_trigger_preferences": ["string"],
364
+ "alert_trigger_preferences_values": ["string"],
365
+ "enableds": ["string"],
366
+ "environments": ["string"],
367
+ "events": ["string"],
368
+ "event_sources": ["string"],
369
+ "event_types": ["string"],
370
+ "group_bies": ["string"],
371
+ "health_check_ids": ["string"],
372
+ "incident_impacts": ["INCIDENT_IMPACT_NONE"],
373
+ "input_ids": ["string"],
374
+ "insight_classes": ["string"],
375
+ "limits": ["string"],
376
+ "logo_tags": ["string"],
377
+ "megabits_per_seconds": ["string"],
378
+ "new_healths": ["string"],
379
+ "new_statuses": ["string"],
380
+ "packets_per_seconds": ["string"],
381
+ "pool_ids": ["string"],
382
+ "pop_names": ["string"],
383
+ "products": ["string"],
384
+ "project_ids": ["string"],
385
+ "protocols": ["string"],
386
+ "query_tags": ["string"],
387
+ "requests_per_seconds": ["string"],
388
+ "selectors": ["string"],
389
+ "services": ["string"],
390
+ "slos": ["99.9"],
391
+ "statuses": ["string"],
392
+ "target_hostnames": ["string"],
393
+ "target_ips": ["string"],
394
+ "target_zone_names": ["string"],
395
+ "traffic_exclusions": ["security_events"],
396
+ "tunnel_ids": ["string"],
397
+ "tunnel_names": ["string"],
398
+ "types": ["string"],
399
+ "wheres": ["string"],
400
+ "zones": ["string"],
401
+ })
402
+ ```
403
+
335
404
  ## Import
336
405
 
337
406
  ```sh
@@ -343,7 +412,7 @@ class NotificationPolicy(pulumi.CustomResource):
343
412
  :param pulumi.Input[_builtins.str] account_id: The account id
344
413
  :param pulumi.Input[_builtins.str] alert_interval: Optional specification of how often to re-alert from the same incident, not support on all alert types.
345
414
  :param pulumi.Input[_builtins.str] alert_type: Refers to which event will trigger a Notification dispatch. You can use the endpoint to get available alert types which then will give you a list of possible values.
346
- Available values: "access*custom*certificate*expiration*type", "advanced*ddos*attack*l4*alert", "advanced*ddos*attack*l7*alert", "advanced*http*alert*error", "bgp*hijack*notification", "billing*usage*alert", "block*notification*block*removed", "block*notification*new*block", "block*notification*review*rejected", "bot*traffic*basic*alert", "brand*protection*alert", "brand*protection*digest", "clickhouse*alert*fw*anomaly", "clickhouse*alert*fw*ent*anomaly", "cloudforce*one*request*notification", "custom*analytics", "custom*bot*detection*alert", "custom*ssl*certificate*event*type", "dedicated*ssl*certificate*event*type", "device*connectivity*anomaly*alert", "dos*attack*l4", "dos*attack*l7", "expiring*service*token*alert", "failing*logpush*job*disabled*alert", "fbm*auto*advertisement", "fbm*dosd*attack", "fbm*volumetric*attack", "health*check*status*notification", "hostname*aop*custom*certificate*expiration*type", "http*alert*edge*error", "http*alert*origin*error", "image*notification", "image*resizing*notification", "incident*alert", "load*balancing*health*alert", "load*balancing*pool*enablement*alert", "logo*match*alert", "magic*tunnel*health*check*event", "magic*wan*tunnel*health", "maintenance*event*notification", "mtls*certificate*store*certificate*expiration*type", "pages*event*alert", "radar*notification", "real*origin*monitoring", "scriptmonitor*alert*new*code*change*detections", "scriptmonitor*alert*new*hosts", "scriptmonitor*alert*new*malicious*hosts", "scriptmonitor*alert*new*malicious*scripts", "scriptmonitor*alert*new*malicious*url", "scriptmonitor*alert*new*max*length*resource*url", "scriptmonitor*alert*new*resources", "secondary*dns*all*primaries*failing", "secondary*dns*primaries*failing", "secondary*dns*warning", "secondary*dns*zone*successfully*updated", "secondary*dns*zone*validation*warning", "security*insights*alert", "sentinel*alert", "stream*live*notifications", "synthetic*test*latency*alert", "synthetic*test*low*availability*alert", "traffic*anomalies*alert", "tunnel*health*event", "tunnel*update*event", "universal*ssl*event*type", "web*analytics*metrics*update", "zone*aop*custom*certificate*expiration*type".
415
+ Available values: "abuse*report*alert", "access*custom*certificate*expiration*type", "advanced*ddos*attack*l4*alert", "advanced*ddos*attack*l7*alert", "advanced*http*alert*error", "bgp*hijack*notification", "billing*usage*alert", "block*notification*block*removed", "block*notification*new*block", "block*notification*review*rejected", "bot*traffic*basic*alert", "brand*protection*alert", "brand*protection*digest", "clickhouse*alert*fw*anomaly", "clickhouse*alert*fw*ent*anomaly", "cloudforce*one*request*notification", "custom*analytics", "custom*bot*detection*alert", "custom*ssl*certificate*event*type", "dedicated*ssl*certificate*event*type", "device*connectivity*anomaly*alert", "dos*attack*l4", "dos*attack*l7", "expiring*service*token*alert", "failing*logpush*job*disabled*alert", "fbm*auto*advertisement", "fbm*dosd*attack", "fbm*volumetric*attack", "health*check*status*notification", "hostname*aop*custom*certificate*expiration*type", "http*alert*edge*error", "http*alert*origin*error", "image*notification", "image*resizing*notification", "incident*alert", "load*balancing*health*alert", "load*balancing*pool*enablement*alert", "logo*match*alert", "magic*tunnel*health*check*event", "magic*wan*tunnel*health", "maintenance*event*notification", "mtls*certificate*store*certificate*expiration*type", "pages*event*alert", "radar*notification", "real*origin*monitoring", "scriptmonitor*alert*new*code*change*detections", "scriptmonitor*alert*new*hosts", "scriptmonitor*alert*new*malicious*hosts", "scriptmonitor*alert*new*malicious*scripts", "scriptmonitor*alert*new*malicious*url", "scriptmonitor*alert*new*max*length*resource*url", "scriptmonitor*alert*new*resources", "secondary*dns*all*primaries*failing", "secondary*dns*primaries*failing", "secondary*dns*warning", "secondary*dns*zone*successfully*updated", "secondary*dns*zone*validation*warning", "security*insights*alert", "sentinel*alert", "stream*live*notifications", "synthetic*test*latency*alert", "synthetic*test*low*availability*alert", "traffic*anomalies*alert", "tunnel*health*event", "tunnel*update*event", "universal*ssl*event*type", "web*analytics*metrics*update", "zone*aop*custom*certificate*expiration*type".
347
416
  :param pulumi.Input[_builtins.str] description: Optional description for the Notification policy.
348
417
  :param pulumi.Input[_builtins.bool] enabled: Whether or not the Notification policy is enabled.
349
418
  :param pulumi.Input[Union['NotificationPolicyFiltersArgs', 'NotificationPolicyFiltersArgsDict']] filters: Optional filters that allow you to be alerted only on a subset of events for that alert type based on some criteria. This is only available for select alert types. See alert type documentation for more details.
@@ -359,6 +428,75 @@ class NotificationPolicy(pulumi.CustomResource):
359
428
  """
360
429
  ## Example Usage
361
430
 
431
+ ```python
432
+ import pulumi
433
+ import pulumi_cloudflare as cloudflare
434
+
435
+ example_notification_policy = cloudflare.NotificationPolicy("example_notification_policy",
436
+ account_id="023e105f4ecef8ad9ca31a8372d0c353",
437
+ alert_type="universal_ssl_event_type",
438
+ enabled=True,
439
+ mechanisms={
440
+ "emails": [{
441
+ "id": "id",
442
+ }],
443
+ "pagerduties": [{
444
+ "id": "f174e90afafe4643bbbc4a0ed4fc8415",
445
+ }],
446
+ "webhooks": [{
447
+ "id": "f174e90afafe4643bbbc4a0ed4fc8415",
448
+ }],
449
+ },
450
+ name="SSL Notification Event Policy",
451
+ alert_interval="30m",
452
+ description="Something describing the policy.",
453
+ filters={
454
+ "actions": ["string"],
455
+ "affected_asns": ["string"],
456
+ "affected_components": ["string"],
457
+ "affected_locations": ["string"],
458
+ "airport_codes": ["string"],
459
+ "alert_trigger_preferences": ["string"],
460
+ "alert_trigger_preferences_values": ["string"],
461
+ "enableds": ["string"],
462
+ "environments": ["string"],
463
+ "events": ["string"],
464
+ "event_sources": ["string"],
465
+ "event_types": ["string"],
466
+ "group_bies": ["string"],
467
+ "health_check_ids": ["string"],
468
+ "incident_impacts": ["INCIDENT_IMPACT_NONE"],
469
+ "input_ids": ["string"],
470
+ "insight_classes": ["string"],
471
+ "limits": ["string"],
472
+ "logo_tags": ["string"],
473
+ "megabits_per_seconds": ["string"],
474
+ "new_healths": ["string"],
475
+ "new_statuses": ["string"],
476
+ "packets_per_seconds": ["string"],
477
+ "pool_ids": ["string"],
478
+ "pop_names": ["string"],
479
+ "products": ["string"],
480
+ "project_ids": ["string"],
481
+ "protocols": ["string"],
482
+ "query_tags": ["string"],
483
+ "requests_per_seconds": ["string"],
484
+ "selectors": ["string"],
485
+ "services": ["string"],
486
+ "slos": ["99.9"],
487
+ "statuses": ["string"],
488
+ "target_hostnames": ["string"],
489
+ "target_ips": ["string"],
490
+ "target_zone_names": ["string"],
491
+ "traffic_exclusions": ["security_events"],
492
+ "tunnel_ids": ["string"],
493
+ "tunnel_names": ["string"],
494
+ "types": ["string"],
495
+ "wheres": ["string"],
496
+ "zones": ["string"],
497
+ })
498
+ ```
499
+
362
500
  ## Import
363
501
 
364
502
  ```sh
@@ -445,7 +583,7 @@ class NotificationPolicy(pulumi.CustomResource):
445
583
  :param pulumi.Input[_builtins.str] account_id: The account id
446
584
  :param pulumi.Input[_builtins.str] alert_interval: Optional specification of how often to re-alert from the same incident, not support on all alert types.
447
585
  :param pulumi.Input[_builtins.str] alert_type: Refers to which event will trigger a Notification dispatch. You can use the endpoint to get available alert types which then will give you a list of possible values.
448
- Available values: "access*custom*certificate*expiration*type", "advanced*ddos*attack*l4*alert", "advanced*ddos*attack*l7*alert", "advanced*http*alert*error", "bgp*hijack*notification", "billing*usage*alert", "block*notification*block*removed", "block*notification*new*block", "block*notification*review*rejected", "bot*traffic*basic*alert", "brand*protection*alert", "brand*protection*digest", "clickhouse*alert*fw*anomaly", "clickhouse*alert*fw*ent*anomaly", "cloudforce*one*request*notification", "custom*analytics", "custom*bot*detection*alert", "custom*ssl*certificate*event*type", "dedicated*ssl*certificate*event*type", "device*connectivity*anomaly*alert", "dos*attack*l4", "dos*attack*l7", "expiring*service*token*alert", "failing*logpush*job*disabled*alert", "fbm*auto*advertisement", "fbm*dosd*attack", "fbm*volumetric*attack", "health*check*status*notification", "hostname*aop*custom*certificate*expiration*type", "http*alert*edge*error", "http*alert*origin*error", "image*notification", "image*resizing*notification", "incident*alert", "load*balancing*health*alert", "load*balancing*pool*enablement*alert", "logo*match*alert", "magic*tunnel*health*check*event", "magic*wan*tunnel*health", "maintenance*event*notification", "mtls*certificate*store*certificate*expiration*type", "pages*event*alert", "radar*notification", "real*origin*monitoring", "scriptmonitor*alert*new*code*change*detections", "scriptmonitor*alert*new*hosts", "scriptmonitor*alert*new*malicious*hosts", "scriptmonitor*alert*new*malicious*scripts", "scriptmonitor*alert*new*malicious*url", "scriptmonitor*alert*new*max*length*resource*url", "scriptmonitor*alert*new*resources", "secondary*dns*all*primaries*failing", "secondary*dns*primaries*failing", "secondary*dns*warning", "secondary*dns*zone*successfully*updated", "secondary*dns*zone*validation*warning", "security*insights*alert", "sentinel*alert", "stream*live*notifications", "synthetic*test*latency*alert", "synthetic*test*low*availability*alert", "traffic*anomalies*alert", "tunnel*health*event", "tunnel*update*event", "universal*ssl*event*type", "web*analytics*metrics*update", "zone*aop*custom*certificate*expiration*type".
586
+ Available values: "abuse*report*alert", "access*custom*certificate*expiration*type", "advanced*ddos*attack*l4*alert", "advanced*ddos*attack*l7*alert", "advanced*http*alert*error", "bgp*hijack*notification", "billing*usage*alert", "block*notification*block*removed", "block*notification*new*block", "block*notification*review*rejected", "bot*traffic*basic*alert", "brand*protection*alert", "brand*protection*digest", "clickhouse*alert*fw*anomaly", "clickhouse*alert*fw*ent*anomaly", "cloudforce*one*request*notification", "custom*analytics", "custom*bot*detection*alert", "custom*ssl*certificate*event*type", "dedicated*ssl*certificate*event*type", "device*connectivity*anomaly*alert", "dos*attack*l4", "dos*attack*l7", "expiring*service*token*alert", "failing*logpush*job*disabled*alert", "fbm*auto*advertisement", "fbm*dosd*attack", "fbm*volumetric*attack", "health*check*status*notification", "hostname*aop*custom*certificate*expiration*type", "http*alert*edge*error", "http*alert*origin*error", "image*notification", "image*resizing*notification", "incident*alert", "load*balancing*health*alert", "load*balancing*pool*enablement*alert", "logo*match*alert", "magic*tunnel*health*check*event", "magic*wan*tunnel*health", "maintenance*event*notification", "mtls*certificate*store*certificate*expiration*type", "pages*event*alert", "radar*notification", "real*origin*monitoring", "scriptmonitor*alert*new*code*change*detections", "scriptmonitor*alert*new*hosts", "scriptmonitor*alert*new*malicious*hosts", "scriptmonitor*alert*new*malicious*scripts", "scriptmonitor*alert*new*malicious*url", "scriptmonitor*alert*new*max*length*resource*url", "scriptmonitor*alert*new*resources", "secondary*dns*all*primaries*failing", "secondary*dns*primaries*failing", "secondary*dns*warning", "secondary*dns*zone*successfully*updated", "secondary*dns*zone*validation*warning", "security*insights*alert", "sentinel*alert", "stream*live*notifications", "synthetic*test*latency*alert", "synthetic*test*low*availability*alert", "traffic*anomalies*alert", "tunnel*health*event", "tunnel*update*event", "universal*ssl*event*type", "web*analytics*metrics*update", "zone*aop*custom*certificate*expiration*type".
449
587
  :param pulumi.Input[_builtins.str] description: Optional description for the Notification policy.
450
588
  :param pulumi.Input[_builtins.bool] enabled: Whether or not the Notification policy is enabled.
451
589
  :param pulumi.Input[Union['NotificationPolicyFiltersArgs', 'NotificationPolicyFiltersArgsDict']] filters: Optional filters that allow you to be alerted only on a subset of events for that alert type based on some criteria. This is only available for select alert types. See alert type documentation for more details.
@@ -489,7 +627,7 @@ class NotificationPolicy(pulumi.CustomResource):
489
627
  def alert_type(self) -> pulumi.Output[_builtins.str]:
490
628
  """
491
629
  Refers to which event will trigger a Notification dispatch. You can use the endpoint to get available alert types which then will give you a list of possible values.
492
- Available values: "access*custom*certificate*expiration*type", "advanced*ddos*attack*l4*alert", "advanced*ddos*attack*l7*alert", "advanced*http*alert*error", "bgp*hijack*notification", "billing*usage*alert", "block*notification*block*removed", "block*notification*new*block", "block*notification*review*rejected", "bot*traffic*basic*alert", "brand*protection*alert", "brand*protection*digest", "clickhouse*alert*fw*anomaly", "clickhouse*alert*fw*ent*anomaly", "cloudforce*one*request*notification", "custom*analytics", "custom*bot*detection*alert", "custom*ssl*certificate*event*type", "dedicated*ssl*certificate*event*type", "device*connectivity*anomaly*alert", "dos*attack*l4", "dos*attack*l7", "expiring*service*token*alert", "failing*logpush*job*disabled*alert", "fbm*auto*advertisement", "fbm*dosd*attack", "fbm*volumetric*attack", "health*check*status*notification", "hostname*aop*custom*certificate*expiration*type", "http*alert*edge*error", "http*alert*origin*error", "image*notification", "image*resizing*notification", "incident*alert", "load*balancing*health*alert", "load*balancing*pool*enablement*alert", "logo*match*alert", "magic*tunnel*health*check*event", "magic*wan*tunnel*health", "maintenance*event*notification", "mtls*certificate*store*certificate*expiration*type", "pages*event*alert", "radar*notification", "real*origin*monitoring", "scriptmonitor*alert*new*code*change*detections", "scriptmonitor*alert*new*hosts", "scriptmonitor*alert*new*malicious*hosts", "scriptmonitor*alert*new*malicious*scripts", "scriptmonitor*alert*new*malicious*url", "scriptmonitor*alert*new*max*length*resource*url", "scriptmonitor*alert*new*resources", "secondary*dns*all*primaries*failing", "secondary*dns*primaries*failing", "secondary*dns*warning", "secondary*dns*zone*successfully*updated", "secondary*dns*zone*validation*warning", "security*insights*alert", "sentinel*alert", "stream*live*notifications", "synthetic*test*latency*alert", "synthetic*test*low*availability*alert", "traffic*anomalies*alert", "tunnel*health*event", "tunnel*update*event", "universal*ssl*event*type", "web*analytics*metrics*update", "zone*aop*custom*certificate*expiration*type".
630
+ Available values: "abuse*report*alert", "access*custom*certificate*expiration*type", "advanced*ddos*attack*l4*alert", "advanced*ddos*attack*l7*alert", "advanced*http*alert*error", "bgp*hijack*notification", "billing*usage*alert", "block*notification*block*removed", "block*notification*new*block", "block*notification*review*rejected", "bot*traffic*basic*alert", "brand*protection*alert", "brand*protection*digest", "clickhouse*alert*fw*anomaly", "clickhouse*alert*fw*ent*anomaly", "cloudforce*one*request*notification", "custom*analytics", "custom*bot*detection*alert", "custom*ssl*certificate*event*type", "dedicated*ssl*certificate*event*type", "device*connectivity*anomaly*alert", "dos*attack*l4", "dos*attack*l7", "expiring*service*token*alert", "failing*logpush*job*disabled*alert", "fbm*auto*advertisement", "fbm*dosd*attack", "fbm*volumetric*attack", "health*check*status*notification", "hostname*aop*custom*certificate*expiration*type", "http*alert*edge*error", "http*alert*origin*error", "image*notification", "image*resizing*notification", "incident*alert", "load*balancing*health*alert", "load*balancing*pool*enablement*alert", "logo*match*alert", "magic*tunnel*health*check*event", "magic*wan*tunnel*health", "maintenance*event*notification", "mtls*certificate*store*certificate*expiration*type", "pages*event*alert", "radar*notification", "real*origin*monitoring", "scriptmonitor*alert*new*code*change*detections", "scriptmonitor*alert*new*hosts", "scriptmonitor*alert*new*malicious*hosts", "scriptmonitor*alert*new*malicious*scripts", "scriptmonitor*alert*new*malicious*url", "scriptmonitor*alert*new*max*length*resource*url", "scriptmonitor*alert*new*resources", "secondary*dns*all*primaries*failing", "secondary*dns*primaries*failing", "secondary*dns*warning", "secondary*dns*zone*successfully*updated", "secondary*dns*zone*validation*warning", "security*insights*alert", "sentinel*alert", "stream*live*notifications", "synthetic*test*latency*alert", "synthetic*test*low*availability*alert", "traffic*anomalies*alert", "tunnel*health*event", "tunnel*update*event", "universal*ssl*event*type", "web*analytics*metrics*update", "zone*aop*custom*certificate*expiration*type".
493
631
  """
494
632
  return pulumi.get(self, "alert_type")
495
633