1. Packages
  2. Alibaba Cloud
  3. API Docs
  4. threatdetection
  5. MaliciousFileWhitelistConfig
Alibaba Cloud v3.55.0 published on Tuesday, Apr 30, 2024 by Pulumi

alicloud.threatdetection.MaliciousFileWhitelistConfig

Explore with Pulumi AI

alicloud logo
Alibaba Cloud v3.55.0 published on Tuesday, Apr 30, 2024 by Pulumi

    Provides a Threat Detection Malicious File Whitelist Config resource. malicious file add whitelist config.

    For information about Threat Detection Malicious File Whitelist Config and how to use it, see What is Malicious File Whitelist Config.

    NOTE: Available since v1.214.0.

    Example Usage

    Basic Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as alicloud from "@pulumi/alicloud";
    
    const config = new pulumi.Config();
    const name = config.get("name") || "terraform-example";
    const _default = new alicloud.threatdetection.MaliciousFileWhitelistConfig("default", {
        operator: "strEquals",
        field: "fileMd6",
        targetValue: "123",
        targetType: "SELECTION_KEY",
        eventName: "123",
        source: "agentless",
        fieldValue: "sadfas",
    });
    
    import pulumi
    import pulumi_alicloud as alicloud
    
    config = pulumi.Config()
    name = config.get("name")
    if name is None:
        name = "terraform-example"
    default = alicloud.threatdetection.MaliciousFileWhitelistConfig("default",
        operator="strEquals",
        field="fileMd6",
        target_value="123",
        target_type="SELECTION_KEY",
        event_name="123",
        source="agentless",
        field_value="sadfas")
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-alicloud/sdk/v3/go/alicloud/threatdetection"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi/config"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		cfg := config.New(ctx, "")
    		name := "terraform-example"
    		if param := cfg.Get("name"); param != "" {
    			name = param
    		}
    		_, err := threatdetection.NewMaliciousFileWhitelistConfig(ctx, "default", &threatdetection.MaliciousFileWhitelistConfigArgs{
    			Operator:    pulumi.String("strEquals"),
    			Field:       pulumi.String("fileMd6"),
    			TargetValue: pulumi.String("123"),
    			TargetType:  pulumi.String("SELECTION_KEY"),
    			EventName:   pulumi.String("123"),
    			Source:      pulumi.String("agentless"),
    			FieldValue:  pulumi.String("sadfas"),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using AliCloud = Pulumi.AliCloud;
    
    return await Deployment.RunAsync(() => 
    {
        var config = new Config();
        var name = config.Get("name") ?? "terraform-example";
        var @default = new AliCloud.ThreatDetection.MaliciousFileWhitelistConfig("default", new()
        {
            Operator = "strEquals",
            Field = "fileMd6",
            TargetValue = "123",
            TargetType = "SELECTION_KEY",
            EventName = "123",
            Source = "agentless",
            FieldValue = "sadfas",
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.alicloud.threatdetection.MaliciousFileWhitelistConfig;
    import com.pulumi.alicloud.threatdetection.MaliciousFileWhitelistConfigArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            final var config = ctx.config();
            final var name = config.get("name").orElse("terraform-example");
            var default_ = new MaliciousFileWhitelistConfig("default", MaliciousFileWhitelistConfigArgs.builder()        
                .operator("strEquals")
                .field("fileMd6")
                .targetValue("123")
                .targetType("SELECTION_KEY")
                .eventName("123")
                .source("agentless")
                .fieldValue("sadfas")
                .build());
    
        }
    }
    
    configuration:
      name:
        type: string
        default: terraform-example
    resources:
      default:
        type: alicloud:threatdetection:MaliciousFileWhitelistConfig
        properties:
          operator: strEquals
          field: fileMd6
          targetValue: '123'
          targetType: SELECTION_KEY
          eventName: '123'
          source: agentless
          fieldValue: sadfas
    

    Create MaliciousFileWhitelistConfig Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new MaliciousFileWhitelistConfig(name: string, args?: MaliciousFileWhitelistConfigArgs, opts?: CustomResourceOptions);
    @overload
    def MaliciousFileWhitelistConfig(resource_name: str,
                                     args: Optional[MaliciousFileWhitelistConfigArgs] = None,
                                     opts: Optional[ResourceOptions] = None)
    
    @overload
    def MaliciousFileWhitelistConfig(resource_name: str,
                                     opts: Optional[ResourceOptions] = None,
                                     event_name: Optional[str] = None,
                                     field: Optional[str] = None,
                                     field_value: Optional[str] = None,
                                     operator: Optional[str] = None,
                                     source: Optional[str] = None,
                                     target_type: Optional[str] = None,
                                     target_value: Optional[str] = None)
    func NewMaliciousFileWhitelistConfig(ctx *Context, name string, args *MaliciousFileWhitelistConfigArgs, opts ...ResourceOption) (*MaliciousFileWhitelistConfig, error)
    public MaliciousFileWhitelistConfig(string name, MaliciousFileWhitelistConfigArgs? args = null, CustomResourceOptions? opts = null)
    public MaliciousFileWhitelistConfig(String name, MaliciousFileWhitelistConfigArgs args)
    public MaliciousFileWhitelistConfig(String name, MaliciousFileWhitelistConfigArgs args, CustomResourceOptions options)
    
    type: alicloud:threatdetection:MaliciousFileWhitelistConfig
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args MaliciousFileWhitelistConfigArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args MaliciousFileWhitelistConfigArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args MaliciousFileWhitelistConfigArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args MaliciousFileWhitelistConfigArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args MaliciousFileWhitelistConfigArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Example

    The following reference example uses placeholder values for all input properties.

    var maliciousFileWhitelistConfigResource = new AliCloud.ThreatDetection.MaliciousFileWhitelistConfig("maliciousFileWhitelistConfigResource", new()
    {
        EventName = "string",
        Field = "string",
        FieldValue = "string",
        Operator = "string",
        Source = "string",
        TargetType = "string",
        TargetValue = "string",
    });
    
    example, err := threatdetection.NewMaliciousFileWhitelistConfig(ctx, "maliciousFileWhitelistConfigResource", &threatdetection.MaliciousFileWhitelistConfigArgs{
    	EventName:   pulumi.String("string"),
    	Field:       pulumi.String("string"),
    	FieldValue:  pulumi.String("string"),
    	Operator:    pulumi.String("string"),
    	Source:      pulumi.String("string"),
    	TargetType:  pulumi.String("string"),
    	TargetValue: pulumi.String("string"),
    })
    
    var maliciousFileWhitelistConfigResource = new MaliciousFileWhitelistConfig("maliciousFileWhitelistConfigResource", MaliciousFileWhitelistConfigArgs.builder()        
        .eventName("string")
        .field("string")
        .fieldValue("string")
        .operator("string")
        .source("string")
        .targetType("string")
        .targetValue("string")
        .build());
    
    malicious_file_whitelist_config_resource = alicloud.threatdetection.MaliciousFileWhitelistConfig("maliciousFileWhitelistConfigResource",
        event_name="string",
        field="string",
        field_value="string",
        operator="string",
        source="string",
        target_type="string",
        target_value="string")
    
    const maliciousFileWhitelistConfigResource = new alicloud.threatdetection.MaliciousFileWhitelistConfig("maliciousFileWhitelistConfigResource", {
        eventName: "string",
        field: "string",
        fieldValue: "string",
        operator: "string",
        source: "string",
        targetType: "string",
        targetValue: "string",
    });
    
    type: alicloud:threatdetection:MaliciousFileWhitelistConfig
    properties:
        eventName: string
        field: string
        fieldValue: string
        operator: string
        source: string
        targetType: string
        targetValue: string
    

    MaliciousFileWhitelistConfig Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    The MaliciousFileWhitelistConfig resource accepts the following input properties:

    EventName string
    The name of the security alert associated with the representative rule.
    Field string
    Represents the alarm associated with the resource and the white field.
    FieldValue string
    Represents the whiteout target value in effect for the resource.
    Operator string
    The decision operator in effect on behalf of the resource.
    Source string
    Business Source:

    • agentless: agentless detection.
    TargetType string
    The type of target in effect on behalf of the resource.
    TargetValue string
    Represents the specific value of the target type in effect for the resource.
    EventName string
    The name of the security alert associated with the representative rule.
    Field string
    Represents the alarm associated with the resource and the white field.
    FieldValue string
    Represents the whiteout target value in effect for the resource.
    Operator string
    The decision operator in effect on behalf of the resource.
    Source string
    Business Source:

    • agentless: agentless detection.
    TargetType string
    The type of target in effect on behalf of the resource.
    TargetValue string
    Represents the specific value of the target type in effect for the resource.
    eventName String
    The name of the security alert associated with the representative rule.
    field String
    Represents the alarm associated with the resource and the white field.
    fieldValue String
    Represents the whiteout target value in effect for the resource.
    operator String
    The decision operator in effect on behalf of the resource.
    source String
    Business Source:

    • agentless: agentless detection.
    targetType String
    The type of target in effect on behalf of the resource.
    targetValue String
    Represents the specific value of the target type in effect for the resource.
    eventName string
    The name of the security alert associated with the representative rule.
    field string
    Represents the alarm associated with the resource and the white field.
    fieldValue string
    Represents the whiteout target value in effect for the resource.
    operator string
    The decision operator in effect on behalf of the resource.
    source string
    Business Source:

    • agentless: agentless detection.
    targetType string
    The type of target in effect on behalf of the resource.
    targetValue string
    Represents the specific value of the target type in effect for the resource.
    event_name str
    The name of the security alert associated with the representative rule.
    field str
    Represents the alarm associated with the resource and the white field.
    field_value str
    Represents the whiteout target value in effect for the resource.
    operator str
    The decision operator in effect on behalf of the resource.
    source str
    Business Source:

    • agentless: agentless detection.
    target_type str
    The type of target in effect on behalf of the resource.
    target_value str
    Represents the specific value of the target type in effect for the resource.
    eventName String
    The name of the security alert associated with the representative rule.
    field String
    Represents the alarm associated with the resource and the white field.
    fieldValue String
    Represents the whiteout target value in effect for the resource.
    operator String
    The decision operator in effect on behalf of the resource.
    source String
    Business Source:

    • agentless: agentless detection.
    targetType String
    The type of target in effect on behalf of the resource.
    targetValue String
    Represents the specific value of the target type in effect for the resource.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the MaliciousFileWhitelistConfig resource produces the following output properties:

    CreateTime string
    The creation time of the resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    CreateTime string
    The creation time of the resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    createTime String
    The creation time of the resource.
    id String
    The provider-assigned unique ID for this managed resource.
    createTime string
    The creation time of the resource.
    id string
    The provider-assigned unique ID for this managed resource.
    create_time str
    The creation time of the resource.
    id str
    The provider-assigned unique ID for this managed resource.
    createTime String
    The creation time of the resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing MaliciousFileWhitelistConfig Resource

    Get an existing MaliciousFileWhitelistConfig resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: MaliciousFileWhitelistConfigState, opts?: CustomResourceOptions): MaliciousFileWhitelistConfig
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            create_time: Optional[str] = None,
            event_name: Optional[str] = None,
            field: Optional[str] = None,
            field_value: Optional[str] = None,
            operator: Optional[str] = None,
            source: Optional[str] = None,
            target_type: Optional[str] = None,
            target_value: Optional[str] = None) -> MaliciousFileWhitelistConfig
    func GetMaliciousFileWhitelistConfig(ctx *Context, name string, id IDInput, state *MaliciousFileWhitelistConfigState, opts ...ResourceOption) (*MaliciousFileWhitelistConfig, error)
    public static MaliciousFileWhitelistConfig Get(string name, Input<string> id, MaliciousFileWhitelistConfigState? state, CustomResourceOptions? opts = null)
    public static MaliciousFileWhitelistConfig get(String name, Output<String> id, MaliciousFileWhitelistConfigState state, CustomResourceOptions options)
    Resource lookup is not supported in YAML
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    CreateTime string
    The creation time of the resource.
    EventName string
    The name of the security alert associated with the representative rule.
    Field string
    Represents the alarm associated with the resource and the white field.
    FieldValue string
    Represents the whiteout target value in effect for the resource.
    Operator string
    The decision operator in effect on behalf of the resource.
    Source string
    Business Source:

    • agentless: agentless detection.
    TargetType string
    The type of target in effect on behalf of the resource.
    TargetValue string
    Represents the specific value of the target type in effect for the resource.
    CreateTime string
    The creation time of the resource.
    EventName string
    The name of the security alert associated with the representative rule.
    Field string
    Represents the alarm associated with the resource and the white field.
    FieldValue string
    Represents the whiteout target value in effect for the resource.
    Operator string
    The decision operator in effect on behalf of the resource.
    Source string
    Business Source:

    • agentless: agentless detection.
    TargetType string
    The type of target in effect on behalf of the resource.
    TargetValue string
    Represents the specific value of the target type in effect for the resource.
    createTime String
    The creation time of the resource.
    eventName String
    The name of the security alert associated with the representative rule.
    field String
    Represents the alarm associated with the resource and the white field.
    fieldValue String
    Represents the whiteout target value in effect for the resource.
    operator String
    The decision operator in effect on behalf of the resource.
    source String
    Business Source:

    • agentless: agentless detection.
    targetType String
    The type of target in effect on behalf of the resource.
    targetValue String
    Represents the specific value of the target type in effect for the resource.
    createTime string
    The creation time of the resource.
    eventName string
    The name of the security alert associated with the representative rule.
    field string
    Represents the alarm associated with the resource and the white field.
    fieldValue string
    Represents the whiteout target value in effect for the resource.
    operator string
    The decision operator in effect on behalf of the resource.
    source string
    Business Source:

    • agentless: agentless detection.
    targetType string
    The type of target in effect on behalf of the resource.
    targetValue string
    Represents the specific value of the target type in effect for the resource.
    create_time str
    The creation time of the resource.
    event_name str
    The name of the security alert associated with the representative rule.
    field str
    Represents the alarm associated with the resource and the white field.
    field_value str
    Represents the whiteout target value in effect for the resource.
    operator str
    The decision operator in effect on behalf of the resource.
    source str
    Business Source:

    • agentless: agentless detection.
    target_type str
    The type of target in effect on behalf of the resource.
    target_value str
    Represents the specific value of the target type in effect for the resource.
    createTime String
    The creation time of the resource.
    eventName String
    The name of the security alert associated with the representative rule.
    field String
    Represents the alarm associated with the resource and the white field.
    fieldValue String
    Represents the whiteout target value in effect for the resource.
    operator String
    The decision operator in effect on behalf of the resource.
    source String
    Business Source:

    • agentless: agentless detection.
    targetType String
    The type of target in effect on behalf of the resource.
    targetValue String
    Represents the specific value of the target type in effect for the resource.

    Import

    Threat Detection Malicious File Whitelist Config can be imported using the id, e.g.

    $ pulumi import alicloud:threatdetection/maliciousFileWhitelistConfig:MaliciousFileWhitelistConfig example <id>
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    Alibaba Cloud pulumi/pulumi-alicloud
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the alicloud Terraform Provider.
    alicloud logo
    Alibaba Cloud v3.55.0 published on Tuesday, Apr 30, 2024 by Pulumi