pulumi-cloudflare 6.10.1__py3-none-any.whl → 6.11.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_cloudflare/__init__.py +31 -0
- pulumi_cloudflare/_inputs.py +2127 -309
- pulumi_cloudflare/access_application.py +7 -7
- pulumi_cloudflare/access_identity_provider.py +60 -0
- pulumi_cloudflare/access_mutual_tls_hostname_settings.py +26 -0
- pulumi_cloudflare/access_organization.py +56 -0
- pulumi_cloudflare/access_policy.py +96 -0
- pulumi_cloudflare/account.py +47 -0
- pulumi_cloudflare/account_dns_settings.py +62 -0
- pulumi_cloudflare/account_subscription.py +36 -0
- pulumi_cloudflare/account_token.py +90 -0
- pulumi_cloudflare/api_shield.py +0 -68
- pulumi_cloudflare/api_token.py +88 -0
- pulumi_cloudflare/authenticated_origin_pulls.py +26 -0
- pulumi_cloudflare/content_scanning.py +253 -0
- pulumi_cloudflare/custom_hostname.py +144 -0
- pulumi_cloudflare/custom_pages.py +7 -7
- pulumi_cloudflare/device_managed_networks.py +28 -0
- pulumi_cloudflare/device_posture_integration.py +34 -0
- pulumi_cloudflare/device_posture_rule.py +46 -0
- pulumi_cloudflare/dlp_custom_profile.py +57 -7
- pulumi_cloudflare/dns_firewall.py +50 -0
- pulumi_cloudflare/dns_record.py +38 -0
- pulumi_cloudflare/get_account.py +15 -1
- pulumi_cloudflare/get_api_shield.py +5 -27
- pulumi_cloudflare/get_content_scanning.py +136 -0
- pulumi_cloudflare/get_custom_pages.py +3 -3
- pulumi_cloudflare/get_list.py +2 -2
- pulumi_cloudflare/get_magic_transit_connector.py +12 -1
- pulumi_cloudflare/get_notification_policy.py +3 -3
- pulumi_cloudflare/get_notification_policy_webhooks.py +2 -2
- pulumi_cloudflare/get_organization.py +171 -0
- pulumi_cloudflare/get_organization_profile.py +154 -0
- pulumi_cloudflare/get_organizations.py +248 -0
- pulumi_cloudflare/get_pages_project.py +77 -7
- pulumi_cloudflare/get_worker.py +15 -1
- pulumi_cloudflare/get_zero_trust_access_application.py +1 -1
- pulumi_cloudflare/get_zero_trust_dex_test.py +7 -0
- pulumi_cloudflare/get_zero_trust_gateway_policy.py +1 -1
- pulumi_cloudflare/get_zero_trust_tunnel_cloudflared_config.py +18 -4
- pulumi_cloudflare/healthcheck.py +84 -0
- pulumi_cloudflare/hyperdrive_config.py +52 -0
- pulumi_cloudflare/keyless_certificate.py +34 -0
- pulumi_cloudflare/list_item.py +16 -0
- pulumi_cloudflare/load_balancer.py +282 -0
- pulumi_cloudflare/logpush_job.py +80 -0
- pulumi_cloudflare/magic_transit_site_acl.py +56 -0
- pulumi_cloudflare/magic_transit_site_lan.py +82 -0
- pulumi_cloudflare/magic_transit_site_wan.py +36 -0
- pulumi_cloudflare/magic_wan_static_route.py +34 -0
- pulumi_cloudflare/notification_policy.py +145 -7
- pulumi_cloudflare/organization.py +297 -0
- pulumi_cloudflare/organization_profile.py +340 -0
- pulumi_cloudflare/outputs.py +3322 -642
- pulumi_cloudflare/page_rule.py +34 -0
- pulumi_cloudflare/pages_project.py +571 -30
- pulumi_cloudflare/pulumi-plugin.json +1 -1
- pulumi_cloudflare/queue_consumer.py +38 -0
- pulumi_cloudflare/r2_bucket_cors.py +38 -0
- pulumi_cloudflare/r2_bucket_event_notification.py +19 -18
- pulumi_cloudflare/r2_bucket_lifecycle.py +70 -0
- pulumi_cloudflare/record.py +38 -0
- pulumi_cloudflare/snippet.py +42 -0
- pulumi_cloudflare/snippet_rules.py +28 -0
- pulumi_cloudflare/static_route.py +34 -0
- pulumi_cloudflare/teams_account.py +148 -0
- pulumi_cloudflare/teams_rule.py +259 -7
- pulumi_cloudflare/tunnel_config.py +50 -3
- pulumi_cloudflare/worker.py +88 -0
- pulumi_cloudflare/worker_script.py +158 -2
- pulumi_cloudflare/worker_version.py +112 -0
- pulumi_cloudflare/workers_deployment.py +34 -0
- pulumi_cloudflare/workers_script.py +158 -2
- pulumi_cloudflare/zero_trust_access_application.py +7 -7
- pulumi_cloudflare/zero_trust_access_identity_provider.py +60 -0
- pulumi_cloudflare/zero_trust_access_mtls_hostname_settings.py +26 -0
- pulumi_cloudflare/zero_trust_access_policy.py +96 -0
- pulumi_cloudflare/zero_trust_device_managed_networks.py +28 -0
- pulumi_cloudflare/zero_trust_device_posture_integration.py +34 -0
- pulumi_cloudflare/zero_trust_device_posture_rule.py +46 -0
- pulumi_cloudflare/zero_trust_dex_test.py +63 -3
- pulumi_cloudflare/zero_trust_dlp_custom_entry.py +6 -7
- pulumi_cloudflare/zero_trust_dlp_custom_profile.py +57 -7
- pulumi_cloudflare/zero_trust_dlp_entry.py +6 -7
- pulumi_cloudflare/zero_trust_dlp_predefined_entry.py +1 -1
- pulumi_cloudflare/zero_trust_gateway_policy.py +259 -7
- pulumi_cloudflare/zero_trust_gateway_settings.py +148 -0
- pulumi_cloudflare/zero_trust_organization.py +56 -0
- pulumi_cloudflare/zero_trust_tunnel_cloudflared_config.py +50 -3
- pulumi_cloudflare/zone_cache_variants.py +108 -0
- pulumi_cloudflare/zone_dns_settings.py +60 -0
- pulumi_cloudflare/zone_subscription.py +36 -0
- {pulumi_cloudflare-6.10.1.dist-info → pulumi_cloudflare-6.11.0.dist-info}/METADATA +1 -1
- {pulumi_cloudflare-6.10.1.dist-info → pulumi_cloudflare-6.11.0.dist-info}/RECORD +96 -89
- {pulumi_cloudflare-6.10.1.dist-info → pulumi_cloudflare-6.11.0.dist-info}/WHEEL +0 -0
- {pulumi_cloudflare-6.10.1.dist-info → pulumi_cloudflare-6.11.0.dist-info}/top_level.txt +0 -0
pulumi_cloudflare/logpush_job.py
CHANGED
|
@@ -614,6 +614,46 @@ class LogpushJob(pulumi.CustomResource):
|
|
|
614
614
|
"""
|
|
615
615
|
## Example Usage
|
|
616
616
|
|
|
617
|
+
```python
|
|
618
|
+
import pulumi
|
|
619
|
+
import pulumi_cloudflare as cloudflare
|
|
620
|
+
|
|
621
|
+
example_logpush_job = cloudflare.LogpushJob("example_logpush_job",
|
|
622
|
+
destination_conf="s3://mybucket/logs?region=us-west-2",
|
|
623
|
+
zone_id="zone_id",
|
|
624
|
+
dataset="gateway_dns",
|
|
625
|
+
enabled=False,
|
|
626
|
+
filter="{\\"where\\":{\\"and\\":[{\\"key\\":\\"ClientRequestPath\\",\\"operator\\":\\"contains\\",\\"value\\":\\"/static\\"},{\\"key\\":\\"ClientRequestHost\\",\\"operator\\":\\"eq\\",\\"value\\":\\"example.com\\"}]}}",
|
|
627
|
+
frequency="high",
|
|
628
|
+
kind="",
|
|
629
|
+
logpull_options="fields=RayID,ClientIP,EdgeStartTimestamp×tamps=rfc3339",
|
|
630
|
+
max_upload_bytes=5000000,
|
|
631
|
+
max_upload_interval_seconds=30,
|
|
632
|
+
max_upload_records=1000,
|
|
633
|
+
name="example.com",
|
|
634
|
+
output_options={
|
|
635
|
+
"batch_prefix": "",
|
|
636
|
+
"batch_suffix": "",
|
|
637
|
+
"cve202144228": False,
|
|
638
|
+
"field_delimiter": ",",
|
|
639
|
+
"field_names": [
|
|
640
|
+
"Datetime",
|
|
641
|
+
"DstIP",
|
|
642
|
+
"SrcIP",
|
|
643
|
+
],
|
|
644
|
+
"output_type": "ndjson",
|
|
645
|
+
"record_delimiter": "",
|
|
646
|
+
"record_prefix": "{",
|
|
647
|
+
"record_suffix": \"\"\" }
|
|
648
|
+
|
|
649
|
+
\"\"\",
|
|
650
|
+
"record_template": "record_template",
|
|
651
|
+
"sample_rate": 1,
|
|
652
|
+
"timestamp_format": "unixnano",
|
|
653
|
+
},
|
|
654
|
+
ownership_challenge="00000000000000000000")
|
|
655
|
+
```
|
|
656
|
+
|
|
617
657
|
## Import
|
|
618
658
|
|
|
619
659
|
```sh
|
|
@@ -650,6 +690,46 @@ class LogpushJob(pulumi.CustomResource):
|
|
|
650
690
|
"""
|
|
651
691
|
## Example Usage
|
|
652
692
|
|
|
693
|
+
```python
|
|
694
|
+
import pulumi
|
|
695
|
+
import pulumi_cloudflare as cloudflare
|
|
696
|
+
|
|
697
|
+
example_logpush_job = cloudflare.LogpushJob("example_logpush_job",
|
|
698
|
+
destination_conf="s3://mybucket/logs?region=us-west-2",
|
|
699
|
+
zone_id="zone_id",
|
|
700
|
+
dataset="gateway_dns",
|
|
701
|
+
enabled=False,
|
|
702
|
+
filter="{\\"where\\":{\\"and\\":[{\\"key\\":\\"ClientRequestPath\\",\\"operator\\":\\"contains\\",\\"value\\":\\"/static\\"},{\\"key\\":\\"ClientRequestHost\\",\\"operator\\":\\"eq\\",\\"value\\":\\"example.com\\"}]}}",
|
|
703
|
+
frequency="high",
|
|
704
|
+
kind="",
|
|
705
|
+
logpull_options="fields=RayID,ClientIP,EdgeStartTimestamp×tamps=rfc3339",
|
|
706
|
+
max_upload_bytes=5000000,
|
|
707
|
+
max_upload_interval_seconds=30,
|
|
708
|
+
max_upload_records=1000,
|
|
709
|
+
name="example.com",
|
|
710
|
+
output_options={
|
|
711
|
+
"batch_prefix": "",
|
|
712
|
+
"batch_suffix": "",
|
|
713
|
+
"cve202144228": False,
|
|
714
|
+
"field_delimiter": ",",
|
|
715
|
+
"field_names": [
|
|
716
|
+
"Datetime",
|
|
717
|
+
"DstIP",
|
|
718
|
+
"SrcIP",
|
|
719
|
+
],
|
|
720
|
+
"output_type": "ndjson",
|
|
721
|
+
"record_delimiter": "",
|
|
722
|
+
"record_prefix": "{",
|
|
723
|
+
"record_suffix": \"\"\" }
|
|
724
|
+
|
|
725
|
+
\"\"\",
|
|
726
|
+
"record_template": "record_template",
|
|
727
|
+
"sample_rate": 1,
|
|
728
|
+
"timestamp_format": "unixnano",
|
|
729
|
+
},
|
|
730
|
+
ownership_challenge="00000000000000000000")
|
|
731
|
+
```
|
|
732
|
+
|
|
653
733
|
## Import
|
|
654
734
|
|
|
655
735
|
```sh
|
|
@@ -312,6 +312,34 @@ class MagicTransitSiteAcl(pulumi.CustomResource):
|
|
|
312
312
|
"""
|
|
313
313
|
## Example Usage
|
|
314
314
|
|
|
315
|
+
```python
|
|
316
|
+
import pulumi
|
|
317
|
+
import pulumi_cloudflare as cloudflare
|
|
318
|
+
|
|
319
|
+
example_magic_transit_site_acl = cloudflare.MagicTransitSiteAcl("example_magic_transit_site_acl",
|
|
320
|
+
account_id="023e105f4ecef8ad9ca31a8372d0c353",
|
|
321
|
+
site_id="023e105f4ecef8ad9ca31a8372d0c353",
|
|
322
|
+
lan1={
|
|
323
|
+
"lan_id": "lan_id",
|
|
324
|
+
"lan_name": "lan_name",
|
|
325
|
+
"port_ranges": ["8080-9000"],
|
|
326
|
+
"ports": [1],
|
|
327
|
+
"subnets": ["192.0.2.1"],
|
|
328
|
+
},
|
|
329
|
+
lan2={
|
|
330
|
+
"lan_id": "lan_id",
|
|
331
|
+
"lan_name": "lan_name",
|
|
332
|
+
"port_ranges": ["8080-9000"],
|
|
333
|
+
"ports": [1],
|
|
334
|
+
"subnets": ["192.0.2.1"],
|
|
335
|
+
},
|
|
336
|
+
name="PIN Pad - Cash Register",
|
|
337
|
+
description="Allows local traffic between PIN pads and cash register.",
|
|
338
|
+
forward_locally=True,
|
|
339
|
+
protocols=["tcp"],
|
|
340
|
+
unidirectional=True)
|
|
341
|
+
```
|
|
342
|
+
|
|
315
343
|
## Import
|
|
316
344
|
|
|
317
345
|
```sh
|
|
@@ -336,6 +364,34 @@ class MagicTransitSiteAcl(pulumi.CustomResource):
|
|
|
336
364
|
"""
|
|
337
365
|
## Example Usage
|
|
338
366
|
|
|
367
|
+
```python
|
|
368
|
+
import pulumi
|
|
369
|
+
import pulumi_cloudflare as cloudflare
|
|
370
|
+
|
|
371
|
+
example_magic_transit_site_acl = cloudflare.MagicTransitSiteAcl("example_magic_transit_site_acl",
|
|
372
|
+
account_id="023e105f4ecef8ad9ca31a8372d0c353",
|
|
373
|
+
site_id="023e105f4ecef8ad9ca31a8372d0c353",
|
|
374
|
+
lan1={
|
|
375
|
+
"lan_id": "lan_id",
|
|
376
|
+
"lan_name": "lan_name",
|
|
377
|
+
"port_ranges": ["8080-9000"],
|
|
378
|
+
"ports": [1],
|
|
379
|
+
"subnets": ["192.0.2.1"],
|
|
380
|
+
},
|
|
381
|
+
lan2={
|
|
382
|
+
"lan_id": "lan_id",
|
|
383
|
+
"lan_name": "lan_name",
|
|
384
|
+
"port_ranges": ["8080-9000"],
|
|
385
|
+
"ports": [1],
|
|
386
|
+
"subnets": ["192.0.2.1"],
|
|
387
|
+
},
|
|
388
|
+
name="PIN Pad - Cash Register",
|
|
389
|
+
description="Allows local traffic between PIN pads and cash register.",
|
|
390
|
+
forward_locally=True,
|
|
391
|
+
protocols=["tcp"],
|
|
392
|
+
unidirectional=True)
|
|
393
|
+
```
|
|
394
|
+
|
|
339
395
|
## Import
|
|
340
396
|
|
|
341
397
|
```sh
|
|
@@ -306,6 +306,47 @@ class MagicTransitSiteLan(pulumi.CustomResource):
|
|
|
306
306
|
"""
|
|
307
307
|
## Example Usage
|
|
308
308
|
|
|
309
|
+
```python
|
|
310
|
+
import pulumi
|
|
311
|
+
import pulumi_cloudflare as cloudflare
|
|
312
|
+
|
|
313
|
+
example_magic_transit_site_lan = cloudflare.MagicTransitSiteLan("example_magic_transit_site_lan",
|
|
314
|
+
account_id="023e105f4ecef8ad9ca31a8372d0c353",
|
|
315
|
+
site_id="023e105f4ecef8ad9ca31a8372d0c353",
|
|
316
|
+
physport=1,
|
|
317
|
+
ha_link=True,
|
|
318
|
+
name="name",
|
|
319
|
+
nat={
|
|
320
|
+
"static_prefix": "192.0.2.0/24",
|
|
321
|
+
},
|
|
322
|
+
routed_subnets=[{
|
|
323
|
+
"next_hop": "192.0.2.1",
|
|
324
|
+
"prefix": "192.0.2.0/24",
|
|
325
|
+
"nat": {
|
|
326
|
+
"static_prefix": "192.0.2.0/24",
|
|
327
|
+
},
|
|
328
|
+
}],
|
|
329
|
+
static_addressing={
|
|
330
|
+
"address": "192.0.2.0/24",
|
|
331
|
+
"dhcp_relay": {
|
|
332
|
+
"server_addresses": ["192.0.2.1"],
|
|
333
|
+
},
|
|
334
|
+
"dhcp_server": {
|
|
335
|
+
"dhcp_pool_end": "192.0.2.1",
|
|
336
|
+
"dhcp_pool_start": "192.0.2.1",
|
|
337
|
+
"dns_server": "192.0.2.1",
|
|
338
|
+
"dns_servers": ["192.0.2.1"],
|
|
339
|
+
"reservations": {
|
|
340
|
+
"00:11:22:33:44:55": "192.0.2.100",
|
|
341
|
+
"AA:BB:CC:DD:EE:FF": "192.168.1.101",
|
|
342
|
+
},
|
|
343
|
+
},
|
|
344
|
+
"secondary_address": "192.0.2.0/24",
|
|
345
|
+
"virtual_address": "192.0.2.0/24",
|
|
346
|
+
},
|
|
347
|
+
vlan_tag=42)
|
|
348
|
+
```
|
|
349
|
+
|
|
309
350
|
## Import
|
|
310
351
|
|
|
311
352
|
```sh
|
|
@@ -329,6 +370,47 @@ class MagicTransitSiteLan(pulumi.CustomResource):
|
|
|
329
370
|
"""
|
|
330
371
|
## Example Usage
|
|
331
372
|
|
|
373
|
+
```python
|
|
374
|
+
import pulumi
|
|
375
|
+
import pulumi_cloudflare as cloudflare
|
|
376
|
+
|
|
377
|
+
example_magic_transit_site_lan = cloudflare.MagicTransitSiteLan("example_magic_transit_site_lan",
|
|
378
|
+
account_id="023e105f4ecef8ad9ca31a8372d0c353",
|
|
379
|
+
site_id="023e105f4ecef8ad9ca31a8372d0c353",
|
|
380
|
+
physport=1,
|
|
381
|
+
ha_link=True,
|
|
382
|
+
name="name",
|
|
383
|
+
nat={
|
|
384
|
+
"static_prefix": "192.0.2.0/24",
|
|
385
|
+
},
|
|
386
|
+
routed_subnets=[{
|
|
387
|
+
"next_hop": "192.0.2.1",
|
|
388
|
+
"prefix": "192.0.2.0/24",
|
|
389
|
+
"nat": {
|
|
390
|
+
"static_prefix": "192.0.2.0/24",
|
|
391
|
+
},
|
|
392
|
+
}],
|
|
393
|
+
static_addressing={
|
|
394
|
+
"address": "192.0.2.0/24",
|
|
395
|
+
"dhcp_relay": {
|
|
396
|
+
"server_addresses": ["192.0.2.1"],
|
|
397
|
+
},
|
|
398
|
+
"dhcp_server": {
|
|
399
|
+
"dhcp_pool_end": "192.0.2.1",
|
|
400
|
+
"dhcp_pool_start": "192.0.2.1",
|
|
401
|
+
"dns_server": "192.0.2.1",
|
|
402
|
+
"dns_servers": ["192.0.2.1"],
|
|
403
|
+
"reservations": {
|
|
404
|
+
"00:11:22:33:44:55": "192.0.2.100",
|
|
405
|
+
"AA:BB:CC:DD:EE:FF": "192.168.1.101",
|
|
406
|
+
},
|
|
407
|
+
},
|
|
408
|
+
"secondary_address": "192.0.2.0/24",
|
|
409
|
+
"virtual_address": "192.0.2.0/24",
|
|
410
|
+
},
|
|
411
|
+
vlan_tag=42)
|
|
412
|
+
```
|
|
413
|
+
|
|
332
414
|
## Import
|
|
333
415
|
|
|
334
416
|
```sh
|
|
@@ -266,6 +266,24 @@ class MagicTransitSiteWan(pulumi.CustomResource):
|
|
|
266
266
|
"""
|
|
267
267
|
## Example Usage
|
|
268
268
|
|
|
269
|
+
```python
|
|
270
|
+
import pulumi
|
|
271
|
+
import pulumi_cloudflare as cloudflare
|
|
272
|
+
|
|
273
|
+
example_magic_transit_site_wan = cloudflare.MagicTransitSiteWan("example_magic_transit_site_wan",
|
|
274
|
+
account_id="023e105f4ecef8ad9ca31a8372d0c353",
|
|
275
|
+
site_id="023e105f4ecef8ad9ca31a8372d0c353",
|
|
276
|
+
physport=1,
|
|
277
|
+
name="name",
|
|
278
|
+
priority=0,
|
|
279
|
+
static_addressing={
|
|
280
|
+
"address": "192.0.2.0/24",
|
|
281
|
+
"gateway_address": "192.0.2.1",
|
|
282
|
+
"secondary_address": "192.0.2.0/24",
|
|
283
|
+
},
|
|
284
|
+
vlan_tag=42)
|
|
285
|
+
```
|
|
286
|
+
|
|
269
287
|
## Import
|
|
270
288
|
|
|
271
289
|
```sh
|
|
@@ -288,6 +306,24 @@ class MagicTransitSiteWan(pulumi.CustomResource):
|
|
|
288
306
|
"""
|
|
289
307
|
## Example Usage
|
|
290
308
|
|
|
309
|
+
```python
|
|
310
|
+
import pulumi
|
|
311
|
+
import pulumi_cloudflare as cloudflare
|
|
312
|
+
|
|
313
|
+
example_magic_transit_site_wan = cloudflare.MagicTransitSiteWan("example_magic_transit_site_wan",
|
|
314
|
+
account_id="023e105f4ecef8ad9ca31a8372d0c353",
|
|
315
|
+
site_id="023e105f4ecef8ad9ca31a8372d0c353",
|
|
316
|
+
physport=1,
|
|
317
|
+
name="name",
|
|
318
|
+
priority=0,
|
|
319
|
+
static_addressing={
|
|
320
|
+
"address": "192.0.2.0/24",
|
|
321
|
+
"gateway_address": "192.0.2.1",
|
|
322
|
+
"secondary_address": "192.0.2.0/24",
|
|
323
|
+
},
|
|
324
|
+
vlan_tag=42)
|
|
325
|
+
```
|
|
326
|
+
|
|
291
327
|
## Import
|
|
292
328
|
|
|
293
329
|
```sh
|
|
@@ -303,6 +303,23 @@ class MagicWanStaticRoute(pulumi.CustomResource):
|
|
|
303
303
|
"""
|
|
304
304
|
## Example Usage
|
|
305
305
|
|
|
306
|
+
```python
|
|
307
|
+
import pulumi
|
|
308
|
+
import pulumi_cloudflare as cloudflare
|
|
309
|
+
|
|
310
|
+
example_magic_wan_static_route = cloudflare.MagicWanStaticRoute("example_magic_wan_static_route",
|
|
311
|
+
account_id="023e105f4ecef8ad9ca31a8372d0c353",
|
|
312
|
+
nexthop="203.0.113.1",
|
|
313
|
+
prefix="192.0.2.0/24",
|
|
314
|
+
priority=0,
|
|
315
|
+
description="New route for new prefix 203.0.113.1",
|
|
316
|
+
scope={
|
|
317
|
+
"colo_names": ["den01"],
|
|
318
|
+
"colo_regions": ["APAC"],
|
|
319
|
+
},
|
|
320
|
+
weight=0)
|
|
321
|
+
```
|
|
322
|
+
|
|
306
323
|
## Import
|
|
307
324
|
|
|
308
325
|
```sh
|
|
@@ -328,6 +345,23 @@ class MagicWanStaticRoute(pulumi.CustomResource):
|
|
|
328
345
|
"""
|
|
329
346
|
## Example Usage
|
|
330
347
|
|
|
348
|
+
```python
|
|
349
|
+
import pulumi
|
|
350
|
+
import pulumi_cloudflare as cloudflare
|
|
351
|
+
|
|
352
|
+
example_magic_wan_static_route = cloudflare.MagicWanStaticRoute("example_magic_wan_static_route",
|
|
353
|
+
account_id="023e105f4ecef8ad9ca31a8372d0c353",
|
|
354
|
+
nexthop="203.0.113.1",
|
|
355
|
+
prefix="192.0.2.0/24",
|
|
356
|
+
priority=0,
|
|
357
|
+
description="New route for new prefix 203.0.113.1",
|
|
358
|
+
scope={
|
|
359
|
+
"colo_names": ["den01"],
|
|
360
|
+
"colo_regions": ["APAC"],
|
|
361
|
+
},
|
|
362
|
+
weight=0)
|
|
363
|
+
```
|
|
364
|
+
|
|
331
365
|
## Import
|
|
332
366
|
|
|
333
367
|
```sh
|
|
@@ -33,7 +33,7 @@ class NotificationPolicyArgs:
|
|
|
33
33
|
The set of arguments for constructing a NotificationPolicy resource.
|
|
34
34
|
:param pulumi.Input[_builtins.str] account_id: The account id
|
|
35
35
|
:param pulumi.Input[_builtins.str] alert_type: Refers to which event will trigger a Notification dispatch. You can use the endpoint to get available alert types which then will give you a list of possible values.
|
|
36
|
-
Available values: "access*custom*certificate*expiration*type", "advanced*ddos*attack*l4*alert", "advanced*ddos*attack*l7*alert", "advanced*http*alert*error", "bgp*hijack*notification", "billing*usage*alert", "block*notification*block*removed", "block*notification*new*block", "block*notification*review*rejected", "bot*traffic*basic*alert", "brand*protection*alert", "brand*protection*digest", "clickhouse*alert*fw*anomaly", "clickhouse*alert*fw*ent*anomaly", "cloudforce*one*request*notification", "custom*analytics", "custom*bot*detection*alert", "custom*ssl*certificate*event*type", "dedicated*ssl*certificate*event*type", "device*connectivity*anomaly*alert", "dos*attack*l4", "dos*attack*l7", "expiring*service*token*alert", "failing*logpush*job*disabled*alert", "fbm*auto*advertisement", "fbm*dosd*attack", "fbm*volumetric*attack", "health*check*status*notification", "hostname*aop*custom*certificate*expiration*type", "http*alert*edge*error", "http*alert*origin*error", "image*notification", "image*resizing*notification", "incident*alert", "load*balancing*health*alert", "load*balancing*pool*enablement*alert", "logo*match*alert", "magic*tunnel*health*check*event", "magic*wan*tunnel*health", "maintenance*event*notification", "mtls*certificate*store*certificate*expiration*type", "pages*event*alert", "radar*notification", "real*origin*monitoring", "scriptmonitor*alert*new*code*change*detections", "scriptmonitor*alert*new*hosts", "scriptmonitor*alert*new*malicious*hosts", "scriptmonitor*alert*new*malicious*scripts", "scriptmonitor*alert*new*malicious*url", "scriptmonitor*alert*new*max*length*resource*url", "scriptmonitor*alert*new*resources", "secondary*dns*all*primaries*failing", "secondary*dns*primaries*failing", "secondary*dns*warning", "secondary*dns*zone*successfully*updated", "secondary*dns*zone*validation*warning", "security*insights*alert", "sentinel*alert", "stream*live*notifications", "synthetic*test*latency*alert", "synthetic*test*low*availability*alert", "traffic*anomalies*alert", "tunnel*health*event", "tunnel*update*event", "universal*ssl*event*type", "web*analytics*metrics*update", "zone*aop*custom*certificate*expiration*type".
|
|
36
|
+
Available values: "abuse*report*alert", "access*custom*certificate*expiration*type", "advanced*ddos*attack*l4*alert", "advanced*ddos*attack*l7*alert", "advanced*http*alert*error", "bgp*hijack*notification", "billing*usage*alert", "block*notification*block*removed", "block*notification*new*block", "block*notification*review*rejected", "bot*traffic*basic*alert", "brand*protection*alert", "brand*protection*digest", "clickhouse*alert*fw*anomaly", "clickhouse*alert*fw*ent*anomaly", "cloudforce*one*request*notification", "custom*analytics", "custom*bot*detection*alert", "custom*ssl*certificate*event*type", "dedicated*ssl*certificate*event*type", "device*connectivity*anomaly*alert", "dos*attack*l4", "dos*attack*l7", "expiring*service*token*alert", "failing*logpush*job*disabled*alert", "fbm*auto*advertisement", "fbm*dosd*attack", "fbm*volumetric*attack", "health*check*status*notification", "hostname*aop*custom*certificate*expiration*type", "http*alert*edge*error", "http*alert*origin*error", "image*notification", "image*resizing*notification", "incident*alert", "load*balancing*health*alert", "load*balancing*pool*enablement*alert", "logo*match*alert", "magic*tunnel*health*check*event", "magic*wan*tunnel*health", "maintenance*event*notification", "mtls*certificate*store*certificate*expiration*type", "pages*event*alert", "radar*notification", "real*origin*monitoring", "scriptmonitor*alert*new*code*change*detections", "scriptmonitor*alert*new*hosts", "scriptmonitor*alert*new*malicious*hosts", "scriptmonitor*alert*new*malicious*scripts", "scriptmonitor*alert*new*malicious*url", "scriptmonitor*alert*new*max*length*resource*url", "scriptmonitor*alert*new*resources", "secondary*dns*all*primaries*failing", "secondary*dns*primaries*failing", "secondary*dns*warning", "secondary*dns*zone*successfully*updated", "secondary*dns*zone*validation*warning", "security*insights*alert", "sentinel*alert", "stream*live*notifications", "synthetic*test*latency*alert", "synthetic*test*low*availability*alert", "traffic*anomalies*alert", "tunnel*health*event", "tunnel*update*event", "universal*ssl*event*type", "web*analytics*metrics*update", "zone*aop*custom*certificate*expiration*type".
|
|
37
37
|
:param pulumi.Input['NotificationPolicyMechanismsArgs'] mechanisms: List of IDs that will be used when dispatching a notification. IDs for email type will be the email address.
|
|
38
38
|
:param pulumi.Input[_builtins.str] name: Name of the policy.
|
|
39
39
|
:param pulumi.Input[_builtins.str] alert_interval: Optional specification of how often to re-alert from the same incident, not support on all alert types.
|
|
@@ -71,7 +71,7 @@ class NotificationPolicyArgs:
|
|
|
71
71
|
def alert_type(self) -> pulumi.Input[_builtins.str]:
|
|
72
72
|
"""
|
|
73
73
|
Refers to which event will trigger a Notification dispatch. You can use the endpoint to get available alert types which then will give you a list of possible values.
|
|
74
|
-
Available values: "access*custom*certificate*expiration*type", "advanced*ddos*attack*l4*alert", "advanced*ddos*attack*l7*alert", "advanced*http*alert*error", "bgp*hijack*notification", "billing*usage*alert", "block*notification*block*removed", "block*notification*new*block", "block*notification*review*rejected", "bot*traffic*basic*alert", "brand*protection*alert", "brand*protection*digest", "clickhouse*alert*fw*anomaly", "clickhouse*alert*fw*ent*anomaly", "cloudforce*one*request*notification", "custom*analytics", "custom*bot*detection*alert", "custom*ssl*certificate*event*type", "dedicated*ssl*certificate*event*type", "device*connectivity*anomaly*alert", "dos*attack*l4", "dos*attack*l7", "expiring*service*token*alert", "failing*logpush*job*disabled*alert", "fbm*auto*advertisement", "fbm*dosd*attack", "fbm*volumetric*attack", "health*check*status*notification", "hostname*aop*custom*certificate*expiration*type", "http*alert*edge*error", "http*alert*origin*error", "image*notification", "image*resizing*notification", "incident*alert", "load*balancing*health*alert", "load*balancing*pool*enablement*alert", "logo*match*alert", "magic*tunnel*health*check*event", "magic*wan*tunnel*health", "maintenance*event*notification", "mtls*certificate*store*certificate*expiration*type", "pages*event*alert", "radar*notification", "real*origin*monitoring", "scriptmonitor*alert*new*code*change*detections", "scriptmonitor*alert*new*hosts", "scriptmonitor*alert*new*malicious*hosts", "scriptmonitor*alert*new*malicious*scripts", "scriptmonitor*alert*new*malicious*url", "scriptmonitor*alert*new*max*length*resource*url", "scriptmonitor*alert*new*resources", "secondary*dns*all*primaries*failing", "secondary*dns*primaries*failing", "secondary*dns*warning", "secondary*dns*zone*successfully*updated", "secondary*dns*zone*validation*warning", "security*insights*alert", "sentinel*alert", "stream*live*notifications", "synthetic*test*latency*alert", "synthetic*test*low*availability*alert", "traffic*anomalies*alert", "tunnel*health*event", "tunnel*update*event", "universal*ssl*event*type", "web*analytics*metrics*update", "zone*aop*custom*certificate*expiration*type".
|
|
74
|
+
Available values: "abuse*report*alert", "access*custom*certificate*expiration*type", "advanced*ddos*attack*l4*alert", "advanced*ddos*attack*l7*alert", "advanced*http*alert*error", "bgp*hijack*notification", "billing*usage*alert", "block*notification*block*removed", "block*notification*new*block", "block*notification*review*rejected", "bot*traffic*basic*alert", "brand*protection*alert", "brand*protection*digest", "clickhouse*alert*fw*anomaly", "clickhouse*alert*fw*ent*anomaly", "cloudforce*one*request*notification", "custom*analytics", "custom*bot*detection*alert", "custom*ssl*certificate*event*type", "dedicated*ssl*certificate*event*type", "device*connectivity*anomaly*alert", "dos*attack*l4", "dos*attack*l7", "expiring*service*token*alert", "failing*logpush*job*disabled*alert", "fbm*auto*advertisement", "fbm*dosd*attack", "fbm*volumetric*attack", "health*check*status*notification", "hostname*aop*custom*certificate*expiration*type", "http*alert*edge*error", "http*alert*origin*error", "image*notification", "image*resizing*notification", "incident*alert", "load*balancing*health*alert", "load*balancing*pool*enablement*alert", "logo*match*alert", "magic*tunnel*health*check*event", "magic*wan*tunnel*health", "maintenance*event*notification", "mtls*certificate*store*certificate*expiration*type", "pages*event*alert", "radar*notification", "real*origin*monitoring", "scriptmonitor*alert*new*code*change*detections", "scriptmonitor*alert*new*hosts", "scriptmonitor*alert*new*malicious*hosts", "scriptmonitor*alert*new*malicious*scripts", "scriptmonitor*alert*new*malicious*url", "scriptmonitor*alert*new*max*length*resource*url", "scriptmonitor*alert*new*resources", "secondary*dns*all*primaries*failing", "secondary*dns*primaries*failing", "secondary*dns*warning", "secondary*dns*zone*successfully*updated", "secondary*dns*zone*validation*warning", "security*insights*alert", "sentinel*alert", "stream*live*notifications", "synthetic*test*latency*alert", "synthetic*test*low*availability*alert", "traffic*anomalies*alert", "tunnel*health*event", "tunnel*update*event", "universal*ssl*event*type", "web*analytics*metrics*update", "zone*aop*custom*certificate*expiration*type".
|
|
75
75
|
"""
|
|
76
76
|
return pulumi.get(self, "alert_type")
|
|
77
77
|
|
|
@@ -170,7 +170,7 @@ class _NotificationPolicyState:
|
|
|
170
170
|
:param pulumi.Input[_builtins.str] account_id: The account id
|
|
171
171
|
:param pulumi.Input[_builtins.str] alert_interval: Optional specification of how often to re-alert from the same incident, not support on all alert types.
|
|
172
172
|
:param pulumi.Input[_builtins.str] alert_type: Refers to which event will trigger a Notification dispatch. You can use the endpoint to get available alert types which then will give you a list of possible values.
|
|
173
|
-
Available values: "access*custom*certificate*expiration*type", "advanced*ddos*attack*l4*alert", "advanced*ddos*attack*l7*alert", "advanced*http*alert*error", "bgp*hijack*notification", "billing*usage*alert", "block*notification*block*removed", "block*notification*new*block", "block*notification*review*rejected", "bot*traffic*basic*alert", "brand*protection*alert", "brand*protection*digest", "clickhouse*alert*fw*anomaly", "clickhouse*alert*fw*ent*anomaly", "cloudforce*one*request*notification", "custom*analytics", "custom*bot*detection*alert", "custom*ssl*certificate*event*type", "dedicated*ssl*certificate*event*type", "device*connectivity*anomaly*alert", "dos*attack*l4", "dos*attack*l7", "expiring*service*token*alert", "failing*logpush*job*disabled*alert", "fbm*auto*advertisement", "fbm*dosd*attack", "fbm*volumetric*attack", "health*check*status*notification", "hostname*aop*custom*certificate*expiration*type", "http*alert*edge*error", "http*alert*origin*error", "image*notification", "image*resizing*notification", "incident*alert", "load*balancing*health*alert", "load*balancing*pool*enablement*alert", "logo*match*alert", "magic*tunnel*health*check*event", "magic*wan*tunnel*health", "maintenance*event*notification", "mtls*certificate*store*certificate*expiration*type", "pages*event*alert", "radar*notification", "real*origin*monitoring", "scriptmonitor*alert*new*code*change*detections", "scriptmonitor*alert*new*hosts", "scriptmonitor*alert*new*malicious*hosts", "scriptmonitor*alert*new*malicious*scripts", "scriptmonitor*alert*new*malicious*url", "scriptmonitor*alert*new*max*length*resource*url", "scriptmonitor*alert*new*resources", "secondary*dns*all*primaries*failing", "secondary*dns*primaries*failing", "secondary*dns*warning", "secondary*dns*zone*successfully*updated", "secondary*dns*zone*validation*warning", "security*insights*alert", "sentinel*alert", "stream*live*notifications", "synthetic*test*latency*alert", "synthetic*test*low*availability*alert", "traffic*anomalies*alert", "tunnel*health*event", "tunnel*update*event", "universal*ssl*event*type", "web*analytics*metrics*update", "zone*aop*custom*certificate*expiration*type".
|
|
173
|
+
Available values: "abuse*report*alert", "access*custom*certificate*expiration*type", "advanced*ddos*attack*l4*alert", "advanced*ddos*attack*l7*alert", "advanced*http*alert*error", "bgp*hijack*notification", "billing*usage*alert", "block*notification*block*removed", "block*notification*new*block", "block*notification*review*rejected", "bot*traffic*basic*alert", "brand*protection*alert", "brand*protection*digest", "clickhouse*alert*fw*anomaly", "clickhouse*alert*fw*ent*anomaly", "cloudforce*one*request*notification", "custom*analytics", "custom*bot*detection*alert", "custom*ssl*certificate*event*type", "dedicated*ssl*certificate*event*type", "device*connectivity*anomaly*alert", "dos*attack*l4", "dos*attack*l7", "expiring*service*token*alert", "failing*logpush*job*disabled*alert", "fbm*auto*advertisement", "fbm*dosd*attack", "fbm*volumetric*attack", "health*check*status*notification", "hostname*aop*custom*certificate*expiration*type", "http*alert*edge*error", "http*alert*origin*error", "image*notification", "image*resizing*notification", "incident*alert", "load*balancing*health*alert", "load*balancing*pool*enablement*alert", "logo*match*alert", "magic*tunnel*health*check*event", "magic*wan*tunnel*health", "maintenance*event*notification", "mtls*certificate*store*certificate*expiration*type", "pages*event*alert", "radar*notification", "real*origin*monitoring", "scriptmonitor*alert*new*code*change*detections", "scriptmonitor*alert*new*hosts", "scriptmonitor*alert*new*malicious*hosts", "scriptmonitor*alert*new*malicious*scripts", "scriptmonitor*alert*new*malicious*url", "scriptmonitor*alert*new*max*length*resource*url", "scriptmonitor*alert*new*resources", "secondary*dns*all*primaries*failing", "secondary*dns*primaries*failing", "secondary*dns*warning", "secondary*dns*zone*successfully*updated", "secondary*dns*zone*validation*warning", "security*insights*alert", "sentinel*alert", "stream*live*notifications", "synthetic*test*latency*alert", "synthetic*test*low*availability*alert", "traffic*anomalies*alert", "tunnel*health*event", "tunnel*update*event", "universal*ssl*event*type", "web*analytics*metrics*update", "zone*aop*custom*certificate*expiration*type".
|
|
174
174
|
:param pulumi.Input[_builtins.str] description: Optional description for the Notification policy.
|
|
175
175
|
:param pulumi.Input[_builtins.bool] enabled: Whether or not the Notification policy is enabled.
|
|
176
176
|
:param pulumi.Input['NotificationPolicyFiltersArgs'] filters: Optional filters that allow you to be alerted only on a subset of events for that alert type based on some criteria. This is only available for select alert types. See alert type documentation for more details.
|
|
@@ -227,7 +227,7 @@ class _NotificationPolicyState:
|
|
|
227
227
|
def alert_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
228
228
|
"""
|
|
229
229
|
Refers to which event will trigger a Notification dispatch. You can use the endpoint to get available alert types which then will give you a list of possible values.
|
|
230
|
-
Available values: "access*custom*certificate*expiration*type", "advanced*ddos*attack*l4*alert", "advanced*ddos*attack*l7*alert", "advanced*http*alert*error", "bgp*hijack*notification", "billing*usage*alert", "block*notification*block*removed", "block*notification*new*block", "block*notification*review*rejected", "bot*traffic*basic*alert", "brand*protection*alert", "brand*protection*digest", "clickhouse*alert*fw*anomaly", "clickhouse*alert*fw*ent*anomaly", "cloudforce*one*request*notification", "custom*analytics", "custom*bot*detection*alert", "custom*ssl*certificate*event*type", "dedicated*ssl*certificate*event*type", "device*connectivity*anomaly*alert", "dos*attack*l4", "dos*attack*l7", "expiring*service*token*alert", "failing*logpush*job*disabled*alert", "fbm*auto*advertisement", "fbm*dosd*attack", "fbm*volumetric*attack", "health*check*status*notification", "hostname*aop*custom*certificate*expiration*type", "http*alert*edge*error", "http*alert*origin*error", "image*notification", "image*resizing*notification", "incident*alert", "load*balancing*health*alert", "load*balancing*pool*enablement*alert", "logo*match*alert", "magic*tunnel*health*check*event", "magic*wan*tunnel*health", "maintenance*event*notification", "mtls*certificate*store*certificate*expiration*type", "pages*event*alert", "radar*notification", "real*origin*monitoring", "scriptmonitor*alert*new*code*change*detections", "scriptmonitor*alert*new*hosts", "scriptmonitor*alert*new*malicious*hosts", "scriptmonitor*alert*new*malicious*scripts", "scriptmonitor*alert*new*malicious*url", "scriptmonitor*alert*new*max*length*resource*url", "scriptmonitor*alert*new*resources", "secondary*dns*all*primaries*failing", "secondary*dns*primaries*failing", "secondary*dns*warning", "secondary*dns*zone*successfully*updated", "secondary*dns*zone*validation*warning", "security*insights*alert", "sentinel*alert", "stream*live*notifications", "synthetic*test*latency*alert", "synthetic*test*low*availability*alert", "traffic*anomalies*alert", "tunnel*health*event", "tunnel*update*event", "universal*ssl*event*type", "web*analytics*metrics*update", "zone*aop*custom*certificate*expiration*type".
|
|
230
|
+
Available values: "abuse*report*alert", "access*custom*certificate*expiration*type", "advanced*ddos*attack*l4*alert", "advanced*ddos*attack*l7*alert", "advanced*http*alert*error", "bgp*hijack*notification", "billing*usage*alert", "block*notification*block*removed", "block*notification*new*block", "block*notification*review*rejected", "bot*traffic*basic*alert", "brand*protection*alert", "brand*protection*digest", "clickhouse*alert*fw*anomaly", "clickhouse*alert*fw*ent*anomaly", "cloudforce*one*request*notification", "custom*analytics", "custom*bot*detection*alert", "custom*ssl*certificate*event*type", "dedicated*ssl*certificate*event*type", "device*connectivity*anomaly*alert", "dos*attack*l4", "dos*attack*l7", "expiring*service*token*alert", "failing*logpush*job*disabled*alert", "fbm*auto*advertisement", "fbm*dosd*attack", "fbm*volumetric*attack", "health*check*status*notification", "hostname*aop*custom*certificate*expiration*type", "http*alert*edge*error", "http*alert*origin*error", "image*notification", "image*resizing*notification", "incident*alert", "load*balancing*health*alert", "load*balancing*pool*enablement*alert", "logo*match*alert", "magic*tunnel*health*check*event", "magic*wan*tunnel*health", "maintenance*event*notification", "mtls*certificate*store*certificate*expiration*type", "pages*event*alert", "radar*notification", "real*origin*monitoring", "scriptmonitor*alert*new*code*change*detections", "scriptmonitor*alert*new*hosts", "scriptmonitor*alert*new*malicious*hosts", "scriptmonitor*alert*new*malicious*scripts", "scriptmonitor*alert*new*malicious*url", "scriptmonitor*alert*new*max*length*resource*url", "scriptmonitor*alert*new*resources", "secondary*dns*all*primaries*failing", "secondary*dns*primaries*failing", "secondary*dns*warning", "secondary*dns*zone*successfully*updated", "secondary*dns*zone*validation*warning", "security*insights*alert", "sentinel*alert", "stream*live*notifications", "synthetic*test*latency*alert", "synthetic*test*low*availability*alert", "traffic*anomalies*alert", "tunnel*health*event", "tunnel*update*event", "universal*ssl*event*type", "web*analytics*metrics*update", "zone*aop*custom*certificate*expiration*type".
|
|
231
231
|
"""
|
|
232
232
|
return pulumi.get(self, "alert_type")
|
|
233
233
|
|
|
@@ -332,6 +332,75 @@ class NotificationPolicy(pulumi.CustomResource):
|
|
|
332
332
|
"""
|
|
333
333
|
## Example Usage
|
|
334
334
|
|
|
335
|
+
```python
|
|
336
|
+
import pulumi
|
|
337
|
+
import pulumi_cloudflare as cloudflare
|
|
338
|
+
|
|
339
|
+
example_notification_policy = cloudflare.NotificationPolicy("example_notification_policy",
|
|
340
|
+
account_id="023e105f4ecef8ad9ca31a8372d0c353",
|
|
341
|
+
alert_type="universal_ssl_event_type",
|
|
342
|
+
enabled=True,
|
|
343
|
+
mechanisms={
|
|
344
|
+
"emails": [{
|
|
345
|
+
"id": "id",
|
|
346
|
+
}],
|
|
347
|
+
"pagerduties": [{
|
|
348
|
+
"id": "f174e90afafe4643bbbc4a0ed4fc8415",
|
|
349
|
+
}],
|
|
350
|
+
"webhooks": [{
|
|
351
|
+
"id": "f174e90afafe4643bbbc4a0ed4fc8415",
|
|
352
|
+
}],
|
|
353
|
+
},
|
|
354
|
+
name="SSL Notification Event Policy",
|
|
355
|
+
alert_interval="30m",
|
|
356
|
+
description="Something describing the policy.",
|
|
357
|
+
filters={
|
|
358
|
+
"actions": ["string"],
|
|
359
|
+
"affected_asns": ["string"],
|
|
360
|
+
"affected_components": ["string"],
|
|
361
|
+
"affected_locations": ["string"],
|
|
362
|
+
"airport_codes": ["string"],
|
|
363
|
+
"alert_trigger_preferences": ["string"],
|
|
364
|
+
"alert_trigger_preferences_values": ["string"],
|
|
365
|
+
"enableds": ["string"],
|
|
366
|
+
"environments": ["string"],
|
|
367
|
+
"events": ["string"],
|
|
368
|
+
"event_sources": ["string"],
|
|
369
|
+
"event_types": ["string"],
|
|
370
|
+
"group_bies": ["string"],
|
|
371
|
+
"health_check_ids": ["string"],
|
|
372
|
+
"incident_impacts": ["INCIDENT_IMPACT_NONE"],
|
|
373
|
+
"input_ids": ["string"],
|
|
374
|
+
"insight_classes": ["string"],
|
|
375
|
+
"limits": ["string"],
|
|
376
|
+
"logo_tags": ["string"],
|
|
377
|
+
"megabits_per_seconds": ["string"],
|
|
378
|
+
"new_healths": ["string"],
|
|
379
|
+
"new_statuses": ["string"],
|
|
380
|
+
"packets_per_seconds": ["string"],
|
|
381
|
+
"pool_ids": ["string"],
|
|
382
|
+
"pop_names": ["string"],
|
|
383
|
+
"products": ["string"],
|
|
384
|
+
"project_ids": ["string"],
|
|
385
|
+
"protocols": ["string"],
|
|
386
|
+
"query_tags": ["string"],
|
|
387
|
+
"requests_per_seconds": ["string"],
|
|
388
|
+
"selectors": ["string"],
|
|
389
|
+
"services": ["string"],
|
|
390
|
+
"slos": ["99.9"],
|
|
391
|
+
"statuses": ["string"],
|
|
392
|
+
"target_hostnames": ["string"],
|
|
393
|
+
"target_ips": ["string"],
|
|
394
|
+
"target_zone_names": ["string"],
|
|
395
|
+
"traffic_exclusions": ["security_events"],
|
|
396
|
+
"tunnel_ids": ["string"],
|
|
397
|
+
"tunnel_names": ["string"],
|
|
398
|
+
"types": ["string"],
|
|
399
|
+
"wheres": ["string"],
|
|
400
|
+
"zones": ["string"],
|
|
401
|
+
})
|
|
402
|
+
```
|
|
403
|
+
|
|
335
404
|
## Import
|
|
336
405
|
|
|
337
406
|
```sh
|
|
@@ -343,7 +412,7 @@ class NotificationPolicy(pulumi.CustomResource):
|
|
|
343
412
|
:param pulumi.Input[_builtins.str] account_id: The account id
|
|
344
413
|
:param pulumi.Input[_builtins.str] alert_interval: Optional specification of how often to re-alert from the same incident, not support on all alert types.
|
|
345
414
|
:param pulumi.Input[_builtins.str] alert_type: Refers to which event will trigger a Notification dispatch. You can use the endpoint to get available alert types which then will give you a list of possible values.
|
|
346
|
-
Available values: "access*custom*certificate*expiration*type", "advanced*ddos*attack*l4*alert", "advanced*ddos*attack*l7*alert", "advanced*http*alert*error", "bgp*hijack*notification", "billing*usage*alert", "block*notification*block*removed", "block*notification*new*block", "block*notification*review*rejected", "bot*traffic*basic*alert", "brand*protection*alert", "brand*protection*digest", "clickhouse*alert*fw*anomaly", "clickhouse*alert*fw*ent*anomaly", "cloudforce*one*request*notification", "custom*analytics", "custom*bot*detection*alert", "custom*ssl*certificate*event*type", "dedicated*ssl*certificate*event*type", "device*connectivity*anomaly*alert", "dos*attack*l4", "dos*attack*l7", "expiring*service*token*alert", "failing*logpush*job*disabled*alert", "fbm*auto*advertisement", "fbm*dosd*attack", "fbm*volumetric*attack", "health*check*status*notification", "hostname*aop*custom*certificate*expiration*type", "http*alert*edge*error", "http*alert*origin*error", "image*notification", "image*resizing*notification", "incident*alert", "load*balancing*health*alert", "load*balancing*pool*enablement*alert", "logo*match*alert", "magic*tunnel*health*check*event", "magic*wan*tunnel*health", "maintenance*event*notification", "mtls*certificate*store*certificate*expiration*type", "pages*event*alert", "radar*notification", "real*origin*monitoring", "scriptmonitor*alert*new*code*change*detections", "scriptmonitor*alert*new*hosts", "scriptmonitor*alert*new*malicious*hosts", "scriptmonitor*alert*new*malicious*scripts", "scriptmonitor*alert*new*malicious*url", "scriptmonitor*alert*new*max*length*resource*url", "scriptmonitor*alert*new*resources", "secondary*dns*all*primaries*failing", "secondary*dns*primaries*failing", "secondary*dns*warning", "secondary*dns*zone*successfully*updated", "secondary*dns*zone*validation*warning", "security*insights*alert", "sentinel*alert", "stream*live*notifications", "synthetic*test*latency*alert", "synthetic*test*low*availability*alert", "traffic*anomalies*alert", "tunnel*health*event", "tunnel*update*event", "universal*ssl*event*type", "web*analytics*metrics*update", "zone*aop*custom*certificate*expiration*type".
|
|
415
|
+
Available values: "abuse*report*alert", "access*custom*certificate*expiration*type", "advanced*ddos*attack*l4*alert", "advanced*ddos*attack*l7*alert", "advanced*http*alert*error", "bgp*hijack*notification", "billing*usage*alert", "block*notification*block*removed", "block*notification*new*block", "block*notification*review*rejected", "bot*traffic*basic*alert", "brand*protection*alert", "brand*protection*digest", "clickhouse*alert*fw*anomaly", "clickhouse*alert*fw*ent*anomaly", "cloudforce*one*request*notification", "custom*analytics", "custom*bot*detection*alert", "custom*ssl*certificate*event*type", "dedicated*ssl*certificate*event*type", "device*connectivity*anomaly*alert", "dos*attack*l4", "dos*attack*l7", "expiring*service*token*alert", "failing*logpush*job*disabled*alert", "fbm*auto*advertisement", "fbm*dosd*attack", "fbm*volumetric*attack", "health*check*status*notification", "hostname*aop*custom*certificate*expiration*type", "http*alert*edge*error", "http*alert*origin*error", "image*notification", "image*resizing*notification", "incident*alert", "load*balancing*health*alert", "load*balancing*pool*enablement*alert", "logo*match*alert", "magic*tunnel*health*check*event", "magic*wan*tunnel*health", "maintenance*event*notification", "mtls*certificate*store*certificate*expiration*type", "pages*event*alert", "radar*notification", "real*origin*monitoring", "scriptmonitor*alert*new*code*change*detections", "scriptmonitor*alert*new*hosts", "scriptmonitor*alert*new*malicious*hosts", "scriptmonitor*alert*new*malicious*scripts", "scriptmonitor*alert*new*malicious*url", "scriptmonitor*alert*new*max*length*resource*url", "scriptmonitor*alert*new*resources", "secondary*dns*all*primaries*failing", "secondary*dns*primaries*failing", "secondary*dns*warning", "secondary*dns*zone*successfully*updated", "secondary*dns*zone*validation*warning", "security*insights*alert", "sentinel*alert", "stream*live*notifications", "synthetic*test*latency*alert", "synthetic*test*low*availability*alert", "traffic*anomalies*alert", "tunnel*health*event", "tunnel*update*event", "universal*ssl*event*type", "web*analytics*metrics*update", "zone*aop*custom*certificate*expiration*type".
|
|
347
416
|
:param pulumi.Input[_builtins.str] description: Optional description for the Notification policy.
|
|
348
417
|
:param pulumi.Input[_builtins.bool] enabled: Whether or not the Notification policy is enabled.
|
|
349
418
|
:param pulumi.Input[Union['NotificationPolicyFiltersArgs', 'NotificationPolicyFiltersArgsDict']] filters: Optional filters that allow you to be alerted only on a subset of events for that alert type based on some criteria. This is only available for select alert types. See alert type documentation for more details.
|
|
@@ -359,6 +428,75 @@ class NotificationPolicy(pulumi.CustomResource):
|
|
|
359
428
|
"""
|
|
360
429
|
## Example Usage
|
|
361
430
|
|
|
431
|
+
```python
|
|
432
|
+
import pulumi
|
|
433
|
+
import pulumi_cloudflare as cloudflare
|
|
434
|
+
|
|
435
|
+
example_notification_policy = cloudflare.NotificationPolicy("example_notification_policy",
|
|
436
|
+
account_id="023e105f4ecef8ad9ca31a8372d0c353",
|
|
437
|
+
alert_type="universal_ssl_event_type",
|
|
438
|
+
enabled=True,
|
|
439
|
+
mechanisms={
|
|
440
|
+
"emails": [{
|
|
441
|
+
"id": "id",
|
|
442
|
+
}],
|
|
443
|
+
"pagerduties": [{
|
|
444
|
+
"id": "f174e90afafe4643bbbc4a0ed4fc8415",
|
|
445
|
+
}],
|
|
446
|
+
"webhooks": [{
|
|
447
|
+
"id": "f174e90afafe4643bbbc4a0ed4fc8415",
|
|
448
|
+
}],
|
|
449
|
+
},
|
|
450
|
+
name="SSL Notification Event Policy",
|
|
451
|
+
alert_interval="30m",
|
|
452
|
+
description="Something describing the policy.",
|
|
453
|
+
filters={
|
|
454
|
+
"actions": ["string"],
|
|
455
|
+
"affected_asns": ["string"],
|
|
456
|
+
"affected_components": ["string"],
|
|
457
|
+
"affected_locations": ["string"],
|
|
458
|
+
"airport_codes": ["string"],
|
|
459
|
+
"alert_trigger_preferences": ["string"],
|
|
460
|
+
"alert_trigger_preferences_values": ["string"],
|
|
461
|
+
"enableds": ["string"],
|
|
462
|
+
"environments": ["string"],
|
|
463
|
+
"events": ["string"],
|
|
464
|
+
"event_sources": ["string"],
|
|
465
|
+
"event_types": ["string"],
|
|
466
|
+
"group_bies": ["string"],
|
|
467
|
+
"health_check_ids": ["string"],
|
|
468
|
+
"incident_impacts": ["INCIDENT_IMPACT_NONE"],
|
|
469
|
+
"input_ids": ["string"],
|
|
470
|
+
"insight_classes": ["string"],
|
|
471
|
+
"limits": ["string"],
|
|
472
|
+
"logo_tags": ["string"],
|
|
473
|
+
"megabits_per_seconds": ["string"],
|
|
474
|
+
"new_healths": ["string"],
|
|
475
|
+
"new_statuses": ["string"],
|
|
476
|
+
"packets_per_seconds": ["string"],
|
|
477
|
+
"pool_ids": ["string"],
|
|
478
|
+
"pop_names": ["string"],
|
|
479
|
+
"products": ["string"],
|
|
480
|
+
"project_ids": ["string"],
|
|
481
|
+
"protocols": ["string"],
|
|
482
|
+
"query_tags": ["string"],
|
|
483
|
+
"requests_per_seconds": ["string"],
|
|
484
|
+
"selectors": ["string"],
|
|
485
|
+
"services": ["string"],
|
|
486
|
+
"slos": ["99.9"],
|
|
487
|
+
"statuses": ["string"],
|
|
488
|
+
"target_hostnames": ["string"],
|
|
489
|
+
"target_ips": ["string"],
|
|
490
|
+
"target_zone_names": ["string"],
|
|
491
|
+
"traffic_exclusions": ["security_events"],
|
|
492
|
+
"tunnel_ids": ["string"],
|
|
493
|
+
"tunnel_names": ["string"],
|
|
494
|
+
"types": ["string"],
|
|
495
|
+
"wheres": ["string"],
|
|
496
|
+
"zones": ["string"],
|
|
497
|
+
})
|
|
498
|
+
```
|
|
499
|
+
|
|
362
500
|
## Import
|
|
363
501
|
|
|
364
502
|
```sh
|
|
@@ -445,7 +583,7 @@ class NotificationPolicy(pulumi.CustomResource):
|
|
|
445
583
|
:param pulumi.Input[_builtins.str] account_id: The account id
|
|
446
584
|
:param pulumi.Input[_builtins.str] alert_interval: Optional specification of how often to re-alert from the same incident, not support on all alert types.
|
|
447
585
|
:param pulumi.Input[_builtins.str] alert_type: Refers to which event will trigger a Notification dispatch. You can use the endpoint to get available alert types which then will give you a list of possible values.
|
|
448
|
-
Available values: "access*custom*certificate*expiration*type", "advanced*ddos*attack*l4*alert", "advanced*ddos*attack*l7*alert", "advanced*http*alert*error", "bgp*hijack*notification", "billing*usage*alert", "block*notification*block*removed", "block*notification*new*block", "block*notification*review*rejected", "bot*traffic*basic*alert", "brand*protection*alert", "brand*protection*digest", "clickhouse*alert*fw*anomaly", "clickhouse*alert*fw*ent*anomaly", "cloudforce*one*request*notification", "custom*analytics", "custom*bot*detection*alert", "custom*ssl*certificate*event*type", "dedicated*ssl*certificate*event*type", "device*connectivity*anomaly*alert", "dos*attack*l4", "dos*attack*l7", "expiring*service*token*alert", "failing*logpush*job*disabled*alert", "fbm*auto*advertisement", "fbm*dosd*attack", "fbm*volumetric*attack", "health*check*status*notification", "hostname*aop*custom*certificate*expiration*type", "http*alert*edge*error", "http*alert*origin*error", "image*notification", "image*resizing*notification", "incident*alert", "load*balancing*health*alert", "load*balancing*pool*enablement*alert", "logo*match*alert", "magic*tunnel*health*check*event", "magic*wan*tunnel*health", "maintenance*event*notification", "mtls*certificate*store*certificate*expiration*type", "pages*event*alert", "radar*notification", "real*origin*monitoring", "scriptmonitor*alert*new*code*change*detections", "scriptmonitor*alert*new*hosts", "scriptmonitor*alert*new*malicious*hosts", "scriptmonitor*alert*new*malicious*scripts", "scriptmonitor*alert*new*malicious*url", "scriptmonitor*alert*new*max*length*resource*url", "scriptmonitor*alert*new*resources", "secondary*dns*all*primaries*failing", "secondary*dns*primaries*failing", "secondary*dns*warning", "secondary*dns*zone*successfully*updated", "secondary*dns*zone*validation*warning", "security*insights*alert", "sentinel*alert", "stream*live*notifications", "synthetic*test*latency*alert", "synthetic*test*low*availability*alert", "traffic*anomalies*alert", "tunnel*health*event", "tunnel*update*event", "universal*ssl*event*type", "web*analytics*metrics*update", "zone*aop*custom*certificate*expiration*type".
|
|
586
|
+
Available values: "abuse*report*alert", "access*custom*certificate*expiration*type", "advanced*ddos*attack*l4*alert", "advanced*ddos*attack*l7*alert", "advanced*http*alert*error", "bgp*hijack*notification", "billing*usage*alert", "block*notification*block*removed", "block*notification*new*block", "block*notification*review*rejected", "bot*traffic*basic*alert", "brand*protection*alert", "brand*protection*digest", "clickhouse*alert*fw*anomaly", "clickhouse*alert*fw*ent*anomaly", "cloudforce*one*request*notification", "custom*analytics", "custom*bot*detection*alert", "custom*ssl*certificate*event*type", "dedicated*ssl*certificate*event*type", "device*connectivity*anomaly*alert", "dos*attack*l4", "dos*attack*l7", "expiring*service*token*alert", "failing*logpush*job*disabled*alert", "fbm*auto*advertisement", "fbm*dosd*attack", "fbm*volumetric*attack", "health*check*status*notification", "hostname*aop*custom*certificate*expiration*type", "http*alert*edge*error", "http*alert*origin*error", "image*notification", "image*resizing*notification", "incident*alert", "load*balancing*health*alert", "load*balancing*pool*enablement*alert", "logo*match*alert", "magic*tunnel*health*check*event", "magic*wan*tunnel*health", "maintenance*event*notification", "mtls*certificate*store*certificate*expiration*type", "pages*event*alert", "radar*notification", "real*origin*monitoring", "scriptmonitor*alert*new*code*change*detections", "scriptmonitor*alert*new*hosts", "scriptmonitor*alert*new*malicious*hosts", "scriptmonitor*alert*new*malicious*scripts", "scriptmonitor*alert*new*malicious*url", "scriptmonitor*alert*new*max*length*resource*url", "scriptmonitor*alert*new*resources", "secondary*dns*all*primaries*failing", "secondary*dns*primaries*failing", "secondary*dns*warning", "secondary*dns*zone*successfully*updated", "secondary*dns*zone*validation*warning", "security*insights*alert", "sentinel*alert", "stream*live*notifications", "synthetic*test*latency*alert", "synthetic*test*low*availability*alert", "traffic*anomalies*alert", "tunnel*health*event", "tunnel*update*event", "universal*ssl*event*type", "web*analytics*metrics*update", "zone*aop*custom*certificate*expiration*type".
|
|
449
587
|
:param pulumi.Input[_builtins.str] description: Optional description for the Notification policy.
|
|
450
588
|
:param pulumi.Input[_builtins.bool] enabled: Whether or not the Notification policy is enabled.
|
|
451
589
|
:param pulumi.Input[Union['NotificationPolicyFiltersArgs', 'NotificationPolicyFiltersArgsDict']] filters: Optional filters that allow you to be alerted only on a subset of events for that alert type based on some criteria. This is only available for select alert types. See alert type documentation for more details.
|
|
@@ -489,7 +627,7 @@ class NotificationPolicy(pulumi.CustomResource):
|
|
|
489
627
|
def alert_type(self) -> pulumi.Output[_builtins.str]:
|
|
490
628
|
"""
|
|
491
629
|
Refers to which event will trigger a Notification dispatch. You can use the endpoint to get available alert types which then will give you a list of possible values.
|
|
492
|
-
Available values: "access*custom*certificate*expiration*type", "advanced*ddos*attack*l4*alert", "advanced*ddos*attack*l7*alert", "advanced*http*alert*error", "bgp*hijack*notification", "billing*usage*alert", "block*notification*block*removed", "block*notification*new*block", "block*notification*review*rejected", "bot*traffic*basic*alert", "brand*protection*alert", "brand*protection*digest", "clickhouse*alert*fw*anomaly", "clickhouse*alert*fw*ent*anomaly", "cloudforce*one*request*notification", "custom*analytics", "custom*bot*detection*alert", "custom*ssl*certificate*event*type", "dedicated*ssl*certificate*event*type", "device*connectivity*anomaly*alert", "dos*attack*l4", "dos*attack*l7", "expiring*service*token*alert", "failing*logpush*job*disabled*alert", "fbm*auto*advertisement", "fbm*dosd*attack", "fbm*volumetric*attack", "health*check*status*notification", "hostname*aop*custom*certificate*expiration*type", "http*alert*edge*error", "http*alert*origin*error", "image*notification", "image*resizing*notification", "incident*alert", "load*balancing*health*alert", "load*balancing*pool*enablement*alert", "logo*match*alert", "magic*tunnel*health*check*event", "magic*wan*tunnel*health", "maintenance*event*notification", "mtls*certificate*store*certificate*expiration*type", "pages*event*alert", "radar*notification", "real*origin*monitoring", "scriptmonitor*alert*new*code*change*detections", "scriptmonitor*alert*new*hosts", "scriptmonitor*alert*new*malicious*hosts", "scriptmonitor*alert*new*malicious*scripts", "scriptmonitor*alert*new*malicious*url", "scriptmonitor*alert*new*max*length*resource*url", "scriptmonitor*alert*new*resources", "secondary*dns*all*primaries*failing", "secondary*dns*primaries*failing", "secondary*dns*warning", "secondary*dns*zone*successfully*updated", "secondary*dns*zone*validation*warning", "security*insights*alert", "sentinel*alert", "stream*live*notifications", "synthetic*test*latency*alert", "synthetic*test*low*availability*alert", "traffic*anomalies*alert", "tunnel*health*event", "tunnel*update*event", "universal*ssl*event*type", "web*analytics*metrics*update", "zone*aop*custom*certificate*expiration*type".
|
|
630
|
+
Available values: "abuse*report*alert", "access*custom*certificate*expiration*type", "advanced*ddos*attack*l4*alert", "advanced*ddos*attack*l7*alert", "advanced*http*alert*error", "bgp*hijack*notification", "billing*usage*alert", "block*notification*block*removed", "block*notification*new*block", "block*notification*review*rejected", "bot*traffic*basic*alert", "brand*protection*alert", "brand*protection*digest", "clickhouse*alert*fw*anomaly", "clickhouse*alert*fw*ent*anomaly", "cloudforce*one*request*notification", "custom*analytics", "custom*bot*detection*alert", "custom*ssl*certificate*event*type", "dedicated*ssl*certificate*event*type", "device*connectivity*anomaly*alert", "dos*attack*l4", "dos*attack*l7", "expiring*service*token*alert", "failing*logpush*job*disabled*alert", "fbm*auto*advertisement", "fbm*dosd*attack", "fbm*volumetric*attack", "health*check*status*notification", "hostname*aop*custom*certificate*expiration*type", "http*alert*edge*error", "http*alert*origin*error", "image*notification", "image*resizing*notification", "incident*alert", "load*balancing*health*alert", "load*balancing*pool*enablement*alert", "logo*match*alert", "magic*tunnel*health*check*event", "magic*wan*tunnel*health", "maintenance*event*notification", "mtls*certificate*store*certificate*expiration*type", "pages*event*alert", "radar*notification", "real*origin*monitoring", "scriptmonitor*alert*new*code*change*detections", "scriptmonitor*alert*new*hosts", "scriptmonitor*alert*new*malicious*hosts", "scriptmonitor*alert*new*malicious*scripts", "scriptmonitor*alert*new*malicious*url", "scriptmonitor*alert*new*max*length*resource*url", "scriptmonitor*alert*new*resources", "secondary*dns*all*primaries*failing", "secondary*dns*primaries*failing", "secondary*dns*warning", "secondary*dns*zone*successfully*updated", "secondary*dns*zone*validation*warning", "security*insights*alert", "sentinel*alert", "stream*live*notifications", "synthetic*test*latency*alert", "synthetic*test*low*availability*alert", "traffic*anomalies*alert", "tunnel*health*event", "tunnel*update*event", "universal*ssl*event*type", "web*analytics*metrics*update", "zone*aop*custom*certificate*expiration*type".
|
|
493
631
|
"""
|
|
494
632
|
return pulumi.get(self, "alert_type")
|
|
495
633
|
|