1. Packages
  2. Dynatrace
  3. API Docs
  4. AppsecNotification
Dynatrace v0.10.0 published on Friday, Jun 7, 2024 by Pulumiverse

dynatrace.AppsecNotification

Explore with Pulumi AI

dynatrace logo
Dynatrace v0.10.0 published on Friday, Jun 7, 2024 by Pulumiverse

    Create AppsecNotification Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new AppsecNotification(name: string, args: AppsecNotificationArgs, opts?: CustomResourceOptions);
    @overload
    def AppsecNotification(resource_name: str,
                           args: AppsecNotificationArgs,
                           opts: Optional[ResourceOptions] = None)
    
    @overload
    def AppsecNotification(resource_name: str,
                           opts: Optional[ResourceOptions] = None,
                           display_name: Optional[str] = None,
                           type: Optional[str] = None,
                           trigger: Optional[str] = None,
                           enabled: Optional[bool] = None,
                           attack_candidate_based_webhook_payload: Optional[AppsecNotificationAttackCandidateBasedWebhookPayloadArgs] = None,
                           email_configuration: Optional[AppsecNotificationEmailConfigurationArgs] = None,
                           attack_candidate_based_alerting_profile: Optional[str] = None,
                           jira_configuration: Optional[AppsecNotificationJiraConfigurationArgs] = None,
                           security_problem_based_alerting_profile: Optional[str] = None,
                           security_problem_based_email_payload: Optional[AppsecNotificationSecurityProblemBasedEmailPayloadArgs] = None,
                           security_problem_based_jira_payload: Optional[AppsecNotificationSecurityProblemBasedJiraPayloadArgs] = None,
                           security_problem_based_webhook_payload: Optional[AppsecNotificationSecurityProblemBasedWebhookPayloadArgs] = None,
                           attack_candidate_based_jira_payload: Optional[AppsecNotificationAttackCandidateBasedJiraPayloadArgs] = None,
                           attack_candidate_based_email_payload: Optional[AppsecNotificationAttackCandidateBasedEmailPayloadArgs] = None,
                           webhook_configuration: Optional[AppsecNotificationWebhookConfigurationArgs] = None)
    func NewAppsecNotification(ctx *Context, name string, args AppsecNotificationArgs, opts ...ResourceOption) (*AppsecNotification, error)
    public AppsecNotification(string name, AppsecNotificationArgs args, CustomResourceOptions? opts = null)
    public AppsecNotification(String name, AppsecNotificationArgs args)
    public AppsecNotification(String name, AppsecNotificationArgs args, CustomResourceOptions options)
    
    type: dynatrace:AppsecNotification
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args AppsecNotificationArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args AppsecNotificationArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args AppsecNotificationArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args AppsecNotificationArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args AppsecNotificationArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Example

    The following reference example uses placeholder values for all input properties.

    var appsecNotificationResource = new Dynatrace.AppsecNotification("appsecNotificationResource", new()
    {
        DisplayName = "string",
        Type = "string",
        Trigger = "string",
        Enabled = false,
        AttackCandidateBasedWebhookPayload = new Dynatrace.Inputs.AppsecNotificationAttackCandidateBasedWebhookPayloadArgs
        {
            Payload = "string",
        },
        EmailConfiguration = new Dynatrace.Inputs.AppsecNotificationEmailConfigurationArgs
        {
            Recipients = new[]
            {
                "string",
            },
            BccRecipients = new[]
            {
                "string",
            },
            CcRecipients = new[]
            {
                "string",
            },
        },
        AttackCandidateBasedAlertingProfile = "string",
        JiraConfiguration = new Dynatrace.Inputs.AppsecNotificationJiraConfigurationArgs
        {
            ApiToken = "string",
            IssueType = "string",
            ProjectKey = "string",
            Url = "string",
            Username = "string",
        },
        SecurityProblemBasedAlertingProfile = "string",
        SecurityProblemBasedEmailPayload = new Dynatrace.Inputs.AppsecNotificationSecurityProblemBasedEmailPayloadArgs
        {
            Body = "string",
            Subject = "string",
        },
        SecurityProblemBasedJiraPayload = new Dynatrace.Inputs.AppsecNotificationSecurityProblemBasedJiraPayloadArgs
        {
            Description = "string",
            Summary = "string",
        },
        SecurityProblemBasedWebhookPayload = new Dynatrace.Inputs.AppsecNotificationSecurityProblemBasedWebhookPayloadArgs
        {
            Payload = "string",
        },
        AttackCandidateBasedJiraPayload = new Dynatrace.Inputs.AppsecNotificationAttackCandidateBasedJiraPayloadArgs
        {
            Description = "string",
            Summary = "string",
        },
        AttackCandidateBasedEmailPayload = new Dynatrace.Inputs.AppsecNotificationAttackCandidateBasedEmailPayloadArgs
        {
            Body = "string",
            Subject = "string",
        },
        WebhookConfiguration = new Dynatrace.Inputs.AppsecNotificationWebhookConfigurationArgs
        {
            AcceptAnyCertificate = false,
            Url = "string",
            Headers = new Dynatrace.Inputs.AppsecNotificationWebhookConfigurationHeadersArgs
            {
                Headers = new[]
                {
                    new Dynatrace.Inputs.AppsecNotificationWebhookConfigurationHeadersHeaderArgs
                    {
                        Name = "string",
                        Secret = false,
                        SecretValue = "string",
                        Value = "string",
                    },
                },
            },
        },
    });
    
    example, err := dynatrace.NewAppsecNotification(ctx, "appsecNotificationResource", &dynatrace.AppsecNotificationArgs{
    	DisplayName: pulumi.String("string"),
    	Type:        pulumi.String("string"),
    	Trigger:     pulumi.String("string"),
    	Enabled:     pulumi.Bool(false),
    	AttackCandidateBasedWebhookPayload: &dynatrace.AppsecNotificationAttackCandidateBasedWebhookPayloadArgs{
    		Payload: pulumi.String("string"),
    	},
    	EmailConfiguration: &dynatrace.AppsecNotificationEmailConfigurationArgs{
    		Recipients: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		BccRecipients: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		CcRecipients: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    	},
    	AttackCandidateBasedAlertingProfile: pulumi.String("string"),
    	JiraConfiguration: &dynatrace.AppsecNotificationJiraConfigurationArgs{
    		ApiToken:   pulumi.String("string"),
    		IssueType:  pulumi.String("string"),
    		ProjectKey: pulumi.String("string"),
    		Url:        pulumi.String("string"),
    		Username:   pulumi.String("string"),
    	},
    	SecurityProblemBasedAlertingProfile: pulumi.String("string"),
    	SecurityProblemBasedEmailPayload: &dynatrace.AppsecNotificationSecurityProblemBasedEmailPayloadArgs{
    		Body:    pulumi.String("string"),
    		Subject: pulumi.String("string"),
    	},
    	SecurityProblemBasedJiraPayload: &dynatrace.AppsecNotificationSecurityProblemBasedJiraPayloadArgs{
    		Description: pulumi.String("string"),
    		Summary:     pulumi.String("string"),
    	},
    	SecurityProblemBasedWebhookPayload: &dynatrace.AppsecNotificationSecurityProblemBasedWebhookPayloadArgs{
    		Payload: pulumi.String("string"),
    	},
    	AttackCandidateBasedJiraPayload: &dynatrace.AppsecNotificationAttackCandidateBasedJiraPayloadArgs{
    		Description: pulumi.String("string"),
    		Summary:     pulumi.String("string"),
    	},
    	AttackCandidateBasedEmailPayload: &dynatrace.AppsecNotificationAttackCandidateBasedEmailPayloadArgs{
    		Body:    pulumi.String("string"),
    		Subject: pulumi.String("string"),
    	},
    	WebhookConfiguration: &dynatrace.AppsecNotificationWebhookConfigurationArgs{
    		AcceptAnyCertificate: pulumi.Bool(false),
    		Url:                  pulumi.String("string"),
    		Headers: &dynatrace.AppsecNotificationWebhookConfigurationHeadersArgs{
    			Headers: dynatrace.AppsecNotificationWebhookConfigurationHeadersHeaderArray{
    				&dynatrace.AppsecNotificationWebhookConfigurationHeadersHeaderArgs{
    					Name:        pulumi.String("string"),
    					Secret:      pulumi.Bool(false),
    					SecretValue: pulumi.String("string"),
    					Value:       pulumi.String("string"),
    				},
    			},
    		},
    	},
    })
    
    var appsecNotificationResource = new AppsecNotification("appsecNotificationResource", AppsecNotificationArgs.builder()
        .displayName("string")
        .type("string")
        .trigger("string")
        .enabled(false)
        .attackCandidateBasedWebhookPayload(AppsecNotificationAttackCandidateBasedWebhookPayloadArgs.builder()
            .payload("string")
            .build())
        .emailConfiguration(AppsecNotificationEmailConfigurationArgs.builder()
            .recipients("string")
            .bccRecipients("string")
            .ccRecipients("string")
            .build())
        .attackCandidateBasedAlertingProfile("string")
        .jiraConfiguration(AppsecNotificationJiraConfigurationArgs.builder()
            .apiToken("string")
            .issueType("string")
            .projectKey("string")
            .url("string")
            .username("string")
            .build())
        .securityProblemBasedAlertingProfile("string")
        .securityProblemBasedEmailPayload(AppsecNotificationSecurityProblemBasedEmailPayloadArgs.builder()
            .body("string")
            .subject("string")
            .build())
        .securityProblemBasedJiraPayload(AppsecNotificationSecurityProblemBasedJiraPayloadArgs.builder()
            .description("string")
            .summary("string")
            .build())
        .securityProblemBasedWebhookPayload(AppsecNotificationSecurityProblemBasedWebhookPayloadArgs.builder()
            .payload("string")
            .build())
        .attackCandidateBasedJiraPayload(AppsecNotificationAttackCandidateBasedJiraPayloadArgs.builder()
            .description("string")
            .summary("string")
            .build())
        .attackCandidateBasedEmailPayload(AppsecNotificationAttackCandidateBasedEmailPayloadArgs.builder()
            .body("string")
            .subject("string")
            .build())
        .webhookConfiguration(AppsecNotificationWebhookConfigurationArgs.builder()
            .acceptAnyCertificate(false)
            .url("string")
            .headers(AppsecNotificationWebhookConfigurationHeadersArgs.builder()
                .headers(AppsecNotificationWebhookConfigurationHeadersHeaderArgs.builder()
                    .name("string")
                    .secret(false)
                    .secretValue("string")
                    .value("string")
                    .build())
                .build())
            .build())
        .build());
    
    appsec_notification_resource = dynatrace.AppsecNotification("appsecNotificationResource",
        display_name="string",
        type="string",
        trigger="string",
        enabled=False,
        attack_candidate_based_webhook_payload=dynatrace.AppsecNotificationAttackCandidateBasedWebhookPayloadArgs(
            payload="string",
        ),
        email_configuration=dynatrace.AppsecNotificationEmailConfigurationArgs(
            recipients=["string"],
            bcc_recipients=["string"],
            cc_recipients=["string"],
        ),
        attack_candidate_based_alerting_profile="string",
        jira_configuration=dynatrace.AppsecNotificationJiraConfigurationArgs(
            api_token="string",
            issue_type="string",
            project_key="string",
            url="string",
            username="string",
        ),
        security_problem_based_alerting_profile="string",
        security_problem_based_email_payload=dynatrace.AppsecNotificationSecurityProblemBasedEmailPayloadArgs(
            body="string",
            subject="string",
        ),
        security_problem_based_jira_payload=dynatrace.AppsecNotificationSecurityProblemBasedJiraPayloadArgs(
            description="string",
            summary="string",
        ),
        security_problem_based_webhook_payload=dynatrace.AppsecNotificationSecurityProblemBasedWebhookPayloadArgs(
            payload="string",
        ),
        attack_candidate_based_jira_payload=dynatrace.AppsecNotificationAttackCandidateBasedJiraPayloadArgs(
            description="string",
            summary="string",
        ),
        attack_candidate_based_email_payload=dynatrace.AppsecNotificationAttackCandidateBasedEmailPayloadArgs(
            body="string",
            subject="string",
        ),
        webhook_configuration=dynatrace.AppsecNotificationWebhookConfigurationArgs(
            accept_any_certificate=False,
            url="string",
            headers=dynatrace.AppsecNotificationWebhookConfigurationHeadersArgs(
                headers=[dynatrace.AppsecNotificationWebhookConfigurationHeadersHeaderArgs(
                    name="string",
                    secret=False,
                    secret_value="string",
                    value="string",
                )],
            ),
        ))
    
    const appsecNotificationResource = new dynatrace.AppsecNotification("appsecNotificationResource", {
        displayName: "string",
        type: "string",
        trigger: "string",
        enabled: false,
        attackCandidateBasedWebhookPayload: {
            payload: "string",
        },
        emailConfiguration: {
            recipients: ["string"],
            bccRecipients: ["string"],
            ccRecipients: ["string"],
        },
        attackCandidateBasedAlertingProfile: "string",
        jiraConfiguration: {
            apiToken: "string",
            issueType: "string",
            projectKey: "string",
            url: "string",
            username: "string",
        },
        securityProblemBasedAlertingProfile: "string",
        securityProblemBasedEmailPayload: {
            body: "string",
            subject: "string",
        },
        securityProblemBasedJiraPayload: {
            description: "string",
            summary: "string",
        },
        securityProblemBasedWebhookPayload: {
            payload: "string",
        },
        attackCandidateBasedJiraPayload: {
            description: "string",
            summary: "string",
        },
        attackCandidateBasedEmailPayload: {
            body: "string",
            subject: "string",
        },
        webhookConfiguration: {
            acceptAnyCertificate: false,
            url: "string",
            headers: {
                headers: [{
                    name: "string",
                    secret: false,
                    secretValue: "string",
                    value: "string",
                }],
            },
        },
    });
    
    type: dynatrace:AppsecNotification
    properties:
        attackCandidateBasedAlertingProfile: string
        attackCandidateBasedEmailPayload:
            body: string
            subject: string
        attackCandidateBasedJiraPayload:
            description: string
            summary: string
        attackCandidateBasedWebhookPayload:
            payload: string
        displayName: string
        emailConfiguration:
            bccRecipients:
                - string
            ccRecipients:
                - string
            recipients:
                - string
        enabled: false
        jiraConfiguration:
            apiToken: string
            issueType: string
            projectKey: string
            url: string
            username: string
        securityProblemBasedAlertingProfile: string
        securityProblemBasedEmailPayload:
            body: string
            subject: string
        securityProblemBasedJiraPayload:
            description: string
            summary: string
        securityProblemBasedWebhookPayload:
            payload: string
        trigger: string
        type: string
        webhookConfiguration:
            acceptAnyCertificate: false
            headers:
                headers:
                    - name: string
                      secret: false
                      secretValue: string
                      value: string
            url: string
    

    AppsecNotification Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    The AppsecNotification resource accepts the following input properties:

    DisplayName string
    Display name of the security notification
    Enabled bool
    Enable/Disable the security notification, enabled (true) or disabled (false)
    Trigger string
    Security alert type, possible Values: ATTACK_CANDIDATE, SECURITY_PROBLEM
    Type string
    Notification type, possible Values: EMAIL, JIRA, WEBHOOK
    AttackCandidateBasedAlertingProfile string
    For attack candidate alerts, select an alerting profile to control the delivery of security notifications related to this integration.
    AttackCandidateBasedEmailPayload Pulumiverse.Dynatrace.Inputs.AppsecNotificationAttackCandidateBasedEmailPayload
    Attack candidate based email payload, required when trigger equals ATTACK_CANDIDATE and type equals EMAIL
    AttackCandidateBasedJiraPayload Pulumiverse.Dynatrace.Inputs.AppsecNotificationAttackCandidateBasedJiraPayload
    Attack candidate based Jira payload, required when trigger equals ATTACK_CANDIDATE and type equals JIRA
    AttackCandidateBasedWebhookPayload Pulumiverse.Dynatrace.Inputs.AppsecNotificationAttackCandidateBasedWebhookPayload
    Attack candidate based webhook payload, required when trigger equals ATTACK_CANDIDATE and type equals WEBHOOK
    EmailConfiguration Pulumiverse.Dynatrace.Inputs.AppsecNotificationEmailConfiguration
    Email configuration, required when type equals EMAIL
    JiraConfiguration Pulumiverse.Dynatrace.Inputs.AppsecNotificationJiraConfiguration
    Jira configuration, required when type equals JIRA
    SecurityProblemBasedAlertingProfile string
    For security problem alerts, select an alerting profile to control the delivery of security notifications related to this integration.
    SecurityProblemBasedEmailPayload Pulumiverse.Dynatrace.Inputs.AppsecNotificationSecurityProblemBasedEmailPayload
    Security problem based email payload, required when trigger equals SECURITY_PROBLEM and type equals EMAIL
    SecurityProblemBasedJiraPayload Pulumiverse.Dynatrace.Inputs.AppsecNotificationSecurityProblemBasedJiraPayload
    Security problem based Jira payload, required when trigger equals SECURITY_PROBLEM and type equals JIRA
    SecurityProblemBasedWebhookPayload Pulumiverse.Dynatrace.Inputs.AppsecNotificationSecurityProblemBasedWebhookPayload
    Security problem based webhook payload, required when trigger equals SECURITY_PROBLEM and type equals WEBHOOK
    WebhookConfiguration Pulumiverse.Dynatrace.Inputs.AppsecNotificationWebhookConfiguration
    Webhook configuration, required when type equals WEBHOOK
    DisplayName string
    Display name of the security notification
    Enabled bool
    Enable/Disable the security notification, enabled (true) or disabled (false)
    Trigger string
    Security alert type, possible Values: ATTACK_CANDIDATE, SECURITY_PROBLEM
    Type string
    Notification type, possible Values: EMAIL, JIRA, WEBHOOK
    AttackCandidateBasedAlertingProfile string
    For attack candidate alerts, select an alerting profile to control the delivery of security notifications related to this integration.
    AttackCandidateBasedEmailPayload AppsecNotificationAttackCandidateBasedEmailPayloadArgs
    Attack candidate based email payload, required when trigger equals ATTACK_CANDIDATE and type equals EMAIL
    AttackCandidateBasedJiraPayload AppsecNotificationAttackCandidateBasedJiraPayloadArgs
    Attack candidate based Jira payload, required when trigger equals ATTACK_CANDIDATE and type equals JIRA
    AttackCandidateBasedWebhookPayload AppsecNotificationAttackCandidateBasedWebhookPayloadArgs
    Attack candidate based webhook payload, required when trigger equals ATTACK_CANDIDATE and type equals WEBHOOK
    EmailConfiguration AppsecNotificationEmailConfigurationArgs
    Email configuration, required when type equals EMAIL
    JiraConfiguration AppsecNotificationJiraConfigurationArgs
    Jira configuration, required when type equals JIRA
    SecurityProblemBasedAlertingProfile string
    For security problem alerts, select an alerting profile to control the delivery of security notifications related to this integration.
    SecurityProblemBasedEmailPayload AppsecNotificationSecurityProblemBasedEmailPayloadArgs
    Security problem based email payload, required when trigger equals SECURITY_PROBLEM and type equals EMAIL
    SecurityProblemBasedJiraPayload AppsecNotificationSecurityProblemBasedJiraPayloadArgs
    Security problem based Jira payload, required when trigger equals SECURITY_PROBLEM and type equals JIRA
    SecurityProblemBasedWebhookPayload AppsecNotificationSecurityProblemBasedWebhookPayloadArgs
    Security problem based webhook payload, required when trigger equals SECURITY_PROBLEM and type equals WEBHOOK
    WebhookConfiguration AppsecNotificationWebhookConfigurationArgs
    Webhook configuration, required when type equals WEBHOOK
    displayName String
    Display name of the security notification
    enabled Boolean
    Enable/Disable the security notification, enabled (true) or disabled (false)
    trigger String
    Security alert type, possible Values: ATTACK_CANDIDATE, SECURITY_PROBLEM
    type String
    Notification type, possible Values: EMAIL, JIRA, WEBHOOK
    attackCandidateBasedAlertingProfile String
    For attack candidate alerts, select an alerting profile to control the delivery of security notifications related to this integration.
    attackCandidateBasedEmailPayload AppsecNotificationAttackCandidateBasedEmailPayload
    Attack candidate based email payload, required when trigger equals ATTACK_CANDIDATE and type equals EMAIL
    attackCandidateBasedJiraPayload AppsecNotificationAttackCandidateBasedJiraPayload
    Attack candidate based Jira payload, required when trigger equals ATTACK_CANDIDATE and type equals JIRA
    attackCandidateBasedWebhookPayload AppsecNotificationAttackCandidateBasedWebhookPayload
    Attack candidate based webhook payload, required when trigger equals ATTACK_CANDIDATE and type equals WEBHOOK
    emailConfiguration AppsecNotificationEmailConfiguration
    Email configuration, required when type equals EMAIL
    jiraConfiguration AppsecNotificationJiraConfiguration
    Jira configuration, required when type equals JIRA
    securityProblemBasedAlertingProfile String
    For security problem alerts, select an alerting profile to control the delivery of security notifications related to this integration.
    securityProblemBasedEmailPayload AppsecNotificationSecurityProblemBasedEmailPayload
    Security problem based email payload, required when trigger equals SECURITY_PROBLEM and type equals EMAIL
    securityProblemBasedJiraPayload AppsecNotificationSecurityProblemBasedJiraPayload
    Security problem based Jira payload, required when trigger equals SECURITY_PROBLEM and type equals JIRA
    securityProblemBasedWebhookPayload AppsecNotificationSecurityProblemBasedWebhookPayload
    Security problem based webhook payload, required when trigger equals SECURITY_PROBLEM and type equals WEBHOOK
    webhookConfiguration AppsecNotificationWebhookConfiguration
    Webhook configuration, required when type equals WEBHOOK
    displayName string
    Display name of the security notification
    enabled boolean
    Enable/Disable the security notification, enabled (true) or disabled (false)
    trigger string
    Security alert type, possible Values: ATTACK_CANDIDATE, SECURITY_PROBLEM
    type string
    Notification type, possible Values: EMAIL, JIRA, WEBHOOK
    attackCandidateBasedAlertingProfile string
    For attack candidate alerts, select an alerting profile to control the delivery of security notifications related to this integration.
    attackCandidateBasedEmailPayload AppsecNotificationAttackCandidateBasedEmailPayload
    Attack candidate based email payload, required when trigger equals ATTACK_CANDIDATE and type equals EMAIL
    attackCandidateBasedJiraPayload AppsecNotificationAttackCandidateBasedJiraPayload
    Attack candidate based Jira payload, required when trigger equals ATTACK_CANDIDATE and type equals JIRA
    attackCandidateBasedWebhookPayload AppsecNotificationAttackCandidateBasedWebhookPayload
    Attack candidate based webhook payload, required when trigger equals ATTACK_CANDIDATE and type equals WEBHOOK
    emailConfiguration AppsecNotificationEmailConfiguration
    Email configuration, required when type equals EMAIL
    jiraConfiguration AppsecNotificationJiraConfiguration
    Jira configuration, required when type equals JIRA
    securityProblemBasedAlertingProfile string
    For security problem alerts, select an alerting profile to control the delivery of security notifications related to this integration.
    securityProblemBasedEmailPayload AppsecNotificationSecurityProblemBasedEmailPayload
    Security problem based email payload, required when trigger equals SECURITY_PROBLEM and type equals EMAIL
    securityProblemBasedJiraPayload AppsecNotificationSecurityProblemBasedJiraPayload
    Security problem based Jira payload, required when trigger equals SECURITY_PROBLEM and type equals JIRA
    securityProblemBasedWebhookPayload AppsecNotificationSecurityProblemBasedWebhookPayload
    Security problem based webhook payload, required when trigger equals SECURITY_PROBLEM and type equals WEBHOOK
    webhookConfiguration AppsecNotificationWebhookConfiguration
    Webhook configuration, required when type equals WEBHOOK
    display_name str
    Display name of the security notification
    enabled bool
    Enable/Disable the security notification, enabled (true) or disabled (false)
    trigger str
    Security alert type, possible Values: ATTACK_CANDIDATE, SECURITY_PROBLEM
    type str
    Notification type, possible Values: EMAIL, JIRA, WEBHOOK
    attack_candidate_based_alerting_profile str
    For attack candidate alerts, select an alerting profile to control the delivery of security notifications related to this integration.
    attack_candidate_based_email_payload AppsecNotificationAttackCandidateBasedEmailPayloadArgs
    Attack candidate based email payload, required when trigger equals ATTACK_CANDIDATE and type equals EMAIL
    attack_candidate_based_jira_payload AppsecNotificationAttackCandidateBasedJiraPayloadArgs
    Attack candidate based Jira payload, required when trigger equals ATTACK_CANDIDATE and type equals JIRA
    attack_candidate_based_webhook_payload AppsecNotificationAttackCandidateBasedWebhookPayloadArgs
    Attack candidate based webhook payload, required when trigger equals ATTACK_CANDIDATE and type equals WEBHOOK
    email_configuration AppsecNotificationEmailConfigurationArgs
    Email configuration, required when type equals EMAIL
    jira_configuration AppsecNotificationJiraConfigurationArgs
    Jira configuration, required when type equals JIRA
    security_problem_based_alerting_profile str
    For security problem alerts, select an alerting profile to control the delivery of security notifications related to this integration.
    security_problem_based_email_payload AppsecNotificationSecurityProblemBasedEmailPayloadArgs
    Security problem based email payload, required when trigger equals SECURITY_PROBLEM and type equals EMAIL
    security_problem_based_jira_payload AppsecNotificationSecurityProblemBasedJiraPayloadArgs
    Security problem based Jira payload, required when trigger equals SECURITY_PROBLEM and type equals JIRA
    security_problem_based_webhook_payload AppsecNotificationSecurityProblemBasedWebhookPayloadArgs
    Security problem based webhook payload, required when trigger equals SECURITY_PROBLEM and type equals WEBHOOK
    webhook_configuration AppsecNotificationWebhookConfigurationArgs
    Webhook configuration, required when type equals WEBHOOK
    displayName String
    Display name of the security notification
    enabled Boolean
    Enable/Disable the security notification, enabled (true) or disabled (false)
    trigger String
    Security alert type, possible Values: ATTACK_CANDIDATE, SECURITY_PROBLEM
    type String
    Notification type, possible Values: EMAIL, JIRA, WEBHOOK
    attackCandidateBasedAlertingProfile String
    For attack candidate alerts, select an alerting profile to control the delivery of security notifications related to this integration.
    attackCandidateBasedEmailPayload Property Map
    Attack candidate based email payload, required when trigger equals ATTACK_CANDIDATE and type equals EMAIL
    attackCandidateBasedJiraPayload Property Map
    Attack candidate based Jira payload, required when trigger equals ATTACK_CANDIDATE and type equals JIRA
    attackCandidateBasedWebhookPayload Property Map
    Attack candidate based webhook payload, required when trigger equals ATTACK_CANDIDATE and type equals WEBHOOK
    emailConfiguration Property Map
    Email configuration, required when type equals EMAIL
    jiraConfiguration Property Map
    Jira configuration, required when type equals JIRA
    securityProblemBasedAlertingProfile String
    For security problem alerts, select an alerting profile to control the delivery of security notifications related to this integration.
    securityProblemBasedEmailPayload Property Map
    Security problem based email payload, required when trigger equals SECURITY_PROBLEM and type equals EMAIL
    securityProblemBasedJiraPayload Property Map
    Security problem based Jira payload, required when trigger equals SECURITY_PROBLEM and type equals JIRA
    securityProblemBasedWebhookPayload Property Map
    Security problem based webhook payload, required when trigger equals SECURITY_PROBLEM and type equals WEBHOOK
    webhookConfiguration Property Map
    Webhook configuration, required when type equals WEBHOOK

    Outputs

    All input properties are implicitly available as output properties. Additionally, the AppsecNotification resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing AppsecNotification Resource

    Get an existing AppsecNotification resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: AppsecNotificationState, opts?: CustomResourceOptions): AppsecNotification
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            attack_candidate_based_alerting_profile: Optional[str] = None,
            attack_candidate_based_email_payload: Optional[AppsecNotificationAttackCandidateBasedEmailPayloadArgs] = None,
            attack_candidate_based_jira_payload: Optional[AppsecNotificationAttackCandidateBasedJiraPayloadArgs] = None,
            attack_candidate_based_webhook_payload: Optional[AppsecNotificationAttackCandidateBasedWebhookPayloadArgs] = None,
            display_name: Optional[str] = None,
            email_configuration: Optional[AppsecNotificationEmailConfigurationArgs] = None,
            enabled: Optional[bool] = None,
            jira_configuration: Optional[AppsecNotificationJiraConfigurationArgs] = None,
            security_problem_based_alerting_profile: Optional[str] = None,
            security_problem_based_email_payload: Optional[AppsecNotificationSecurityProblemBasedEmailPayloadArgs] = None,
            security_problem_based_jira_payload: Optional[AppsecNotificationSecurityProblemBasedJiraPayloadArgs] = None,
            security_problem_based_webhook_payload: Optional[AppsecNotificationSecurityProblemBasedWebhookPayloadArgs] = None,
            trigger: Optional[str] = None,
            type: Optional[str] = None,
            webhook_configuration: Optional[AppsecNotificationWebhookConfigurationArgs] = None) -> AppsecNotification
    func GetAppsecNotification(ctx *Context, name string, id IDInput, state *AppsecNotificationState, opts ...ResourceOption) (*AppsecNotification, error)
    public static AppsecNotification Get(string name, Input<string> id, AppsecNotificationState? state, CustomResourceOptions? opts = null)
    public static AppsecNotification get(String name, Output<String> id, AppsecNotificationState state, CustomResourceOptions options)
    Resource lookup is not supported in YAML
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    AttackCandidateBasedAlertingProfile string
    For attack candidate alerts, select an alerting profile to control the delivery of security notifications related to this integration.
    AttackCandidateBasedEmailPayload Pulumiverse.Dynatrace.Inputs.AppsecNotificationAttackCandidateBasedEmailPayload
    Attack candidate based email payload, required when trigger equals ATTACK_CANDIDATE and type equals EMAIL
    AttackCandidateBasedJiraPayload Pulumiverse.Dynatrace.Inputs.AppsecNotificationAttackCandidateBasedJiraPayload
    Attack candidate based Jira payload, required when trigger equals ATTACK_CANDIDATE and type equals JIRA
    AttackCandidateBasedWebhookPayload Pulumiverse.Dynatrace.Inputs.AppsecNotificationAttackCandidateBasedWebhookPayload
    Attack candidate based webhook payload, required when trigger equals ATTACK_CANDIDATE and type equals WEBHOOK
    DisplayName string
    Display name of the security notification
    EmailConfiguration Pulumiverse.Dynatrace.Inputs.AppsecNotificationEmailConfiguration
    Email configuration, required when type equals EMAIL
    Enabled bool
    Enable/Disable the security notification, enabled (true) or disabled (false)
    JiraConfiguration Pulumiverse.Dynatrace.Inputs.AppsecNotificationJiraConfiguration
    Jira configuration, required when type equals JIRA
    SecurityProblemBasedAlertingProfile string
    For security problem alerts, select an alerting profile to control the delivery of security notifications related to this integration.
    SecurityProblemBasedEmailPayload Pulumiverse.Dynatrace.Inputs.AppsecNotificationSecurityProblemBasedEmailPayload
    Security problem based email payload, required when trigger equals SECURITY_PROBLEM and type equals EMAIL
    SecurityProblemBasedJiraPayload Pulumiverse.Dynatrace.Inputs.AppsecNotificationSecurityProblemBasedJiraPayload
    Security problem based Jira payload, required when trigger equals SECURITY_PROBLEM and type equals JIRA
    SecurityProblemBasedWebhookPayload Pulumiverse.Dynatrace.Inputs.AppsecNotificationSecurityProblemBasedWebhookPayload
    Security problem based webhook payload, required when trigger equals SECURITY_PROBLEM and type equals WEBHOOK
    Trigger string
    Security alert type, possible Values: ATTACK_CANDIDATE, SECURITY_PROBLEM
    Type string
    Notification type, possible Values: EMAIL, JIRA, WEBHOOK
    WebhookConfiguration Pulumiverse.Dynatrace.Inputs.AppsecNotificationWebhookConfiguration
    Webhook configuration, required when type equals WEBHOOK
    AttackCandidateBasedAlertingProfile string
    For attack candidate alerts, select an alerting profile to control the delivery of security notifications related to this integration.
    AttackCandidateBasedEmailPayload AppsecNotificationAttackCandidateBasedEmailPayloadArgs
    Attack candidate based email payload, required when trigger equals ATTACK_CANDIDATE and type equals EMAIL
    AttackCandidateBasedJiraPayload AppsecNotificationAttackCandidateBasedJiraPayloadArgs
    Attack candidate based Jira payload, required when trigger equals ATTACK_CANDIDATE and type equals JIRA
    AttackCandidateBasedWebhookPayload AppsecNotificationAttackCandidateBasedWebhookPayloadArgs
    Attack candidate based webhook payload, required when trigger equals ATTACK_CANDIDATE and type equals WEBHOOK
    DisplayName string
    Display name of the security notification
    EmailConfiguration AppsecNotificationEmailConfigurationArgs
    Email configuration, required when type equals EMAIL
    Enabled bool
    Enable/Disable the security notification, enabled (true) or disabled (false)
    JiraConfiguration AppsecNotificationJiraConfigurationArgs
    Jira configuration, required when type equals JIRA
    SecurityProblemBasedAlertingProfile string
    For security problem alerts, select an alerting profile to control the delivery of security notifications related to this integration.
    SecurityProblemBasedEmailPayload AppsecNotificationSecurityProblemBasedEmailPayloadArgs
    Security problem based email payload, required when trigger equals SECURITY_PROBLEM and type equals EMAIL
    SecurityProblemBasedJiraPayload AppsecNotificationSecurityProblemBasedJiraPayloadArgs
    Security problem based Jira payload, required when trigger equals SECURITY_PROBLEM and type equals JIRA
    SecurityProblemBasedWebhookPayload AppsecNotificationSecurityProblemBasedWebhookPayloadArgs
    Security problem based webhook payload, required when trigger equals SECURITY_PROBLEM and type equals WEBHOOK
    Trigger string
    Security alert type, possible Values: ATTACK_CANDIDATE, SECURITY_PROBLEM
    Type string
    Notification type, possible Values: EMAIL, JIRA, WEBHOOK
    WebhookConfiguration AppsecNotificationWebhookConfigurationArgs
    Webhook configuration, required when type equals WEBHOOK
    attackCandidateBasedAlertingProfile String
    For attack candidate alerts, select an alerting profile to control the delivery of security notifications related to this integration.
    attackCandidateBasedEmailPayload AppsecNotificationAttackCandidateBasedEmailPayload
    Attack candidate based email payload, required when trigger equals ATTACK_CANDIDATE and type equals EMAIL
    attackCandidateBasedJiraPayload AppsecNotificationAttackCandidateBasedJiraPayload
    Attack candidate based Jira payload, required when trigger equals ATTACK_CANDIDATE and type equals JIRA
    attackCandidateBasedWebhookPayload AppsecNotificationAttackCandidateBasedWebhookPayload
    Attack candidate based webhook payload, required when trigger equals ATTACK_CANDIDATE and type equals WEBHOOK
    displayName String
    Display name of the security notification
    emailConfiguration AppsecNotificationEmailConfiguration
    Email configuration, required when type equals EMAIL
    enabled Boolean
    Enable/Disable the security notification, enabled (true) or disabled (false)
    jiraConfiguration AppsecNotificationJiraConfiguration
    Jira configuration, required when type equals JIRA
    securityProblemBasedAlertingProfile String
    For security problem alerts, select an alerting profile to control the delivery of security notifications related to this integration.
    securityProblemBasedEmailPayload AppsecNotificationSecurityProblemBasedEmailPayload
    Security problem based email payload, required when trigger equals SECURITY_PROBLEM and type equals EMAIL
    securityProblemBasedJiraPayload AppsecNotificationSecurityProblemBasedJiraPayload
    Security problem based Jira payload, required when trigger equals SECURITY_PROBLEM and type equals JIRA
    securityProblemBasedWebhookPayload AppsecNotificationSecurityProblemBasedWebhookPayload
    Security problem based webhook payload, required when trigger equals SECURITY_PROBLEM and type equals WEBHOOK
    trigger String
    Security alert type, possible Values: ATTACK_CANDIDATE, SECURITY_PROBLEM
    type String
    Notification type, possible Values: EMAIL, JIRA, WEBHOOK
    webhookConfiguration AppsecNotificationWebhookConfiguration
    Webhook configuration, required when type equals WEBHOOK
    attackCandidateBasedAlertingProfile string
    For attack candidate alerts, select an alerting profile to control the delivery of security notifications related to this integration.
    attackCandidateBasedEmailPayload AppsecNotificationAttackCandidateBasedEmailPayload
    Attack candidate based email payload, required when trigger equals ATTACK_CANDIDATE and type equals EMAIL
    attackCandidateBasedJiraPayload AppsecNotificationAttackCandidateBasedJiraPayload
    Attack candidate based Jira payload, required when trigger equals ATTACK_CANDIDATE and type equals JIRA
    attackCandidateBasedWebhookPayload AppsecNotificationAttackCandidateBasedWebhookPayload
    Attack candidate based webhook payload, required when trigger equals ATTACK_CANDIDATE and type equals WEBHOOK
    displayName string
    Display name of the security notification
    emailConfiguration AppsecNotificationEmailConfiguration
    Email configuration, required when type equals EMAIL
    enabled boolean
    Enable/Disable the security notification, enabled (true) or disabled (false)
    jiraConfiguration AppsecNotificationJiraConfiguration
    Jira configuration, required when type equals JIRA
    securityProblemBasedAlertingProfile string
    For security problem alerts, select an alerting profile to control the delivery of security notifications related to this integration.
    securityProblemBasedEmailPayload AppsecNotificationSecurityProblemBasedEmailPayload
    Security problem based email payload, required when trigger equals SECURITY_PROBLEM and type equals EMAIL
    securityProblemBasedJiraPayload AppsecNotificationSecurityProblemBasedJiraPayload
    Security problem based Jira payload, required when trigger equals SECURITY_PROBLEM and type equals JIRA
    securityProblemBasedWebhookPayload AppsecNotificationSecurityProblemBasedWebhookPayload
    Security problem based webhook payload, required when trigger equals SECURITY_PROBLEM and type equals WEBHOOK
    trigger string
    Security alert type, possible Values: ATTACK_CANDIDATE, SECURITY_PROBLEM
    type string
    Notification type, possible Values: EMAIL, JIRA, WEBHOOK
    webhookConfiguration AppsecNotificationWebhookConfiguration
    Webhook configuration, required when type equals WEBHOOK
    attack_candidate_based_alerting_profile str
    For attack candidate alerts, select an alerting profile to control the delivery of security notifications related to this integration.
    attack_candidate_based_email_payload AppsecNotificationAttackCandidateBasedEmailPayloadArgs
    Attack candidate based email payload, required when trigger equals ATTACK_CANDIDATE and type equals EMAIL
    attack_candidate_based_jira_payload AppsecNotificationAttackCandidateBasedJiraPayloadArgs
    Attack candidate based Jira payload, required when trigger equals ATTACK_CANDIDATE and type equals JIRA
    attack_candidate_based_webhook_payload AppsecNotificationAttackCandidateBasedWebhookPayloadArgs
    Attack candidate based webhook payload, required when trigger equals ATTACK_CANDIDATE and type equals WEBHOOK
    display_name str
    Display name of the security notification
    email_configuration AppsecNotificationEmailConfigurationArgs
    Email configuration, required when type equals EMAIL
    enabled bool
    Enable/Disable the security notification, enabled (true) or disabled (false)
    jira_configuration AppsecNotificationJiraConfigurationArgs
    Jira configuration, required when type equals JIRA
    security_problem_based_alerting_profile str
    For security problem alerts, select an alerting profile to control the delivery of security notifications related to this integration.
    security_problem_based_email_payload AppsecNotificationSecurityProblemBasedEmailPayloadArgs
    Security problem based email payload, required when trigger equals SECURITY_PROBLEM and type equals EMAIL
    security_problem_based_jira_payload AppsecNotificationSecurityProblemBasedJiraPayloadArgs
    Security problem based Jira payload, required when trigger equals SECURITY_PROBLEM and type equals JIRA
    security_problem_based_webhook_payload AppsecNotificationSecurityProblemBasedWebhookPayloadArgs
    Security problem based webhook payload, required when trigger equals SECURITY_PROBLEM and type equals WEBHOOK
    trigger str
    Security alert type, possible Values: ATTACK_CANDIDATE, SECURITY_PROBLEM
    type str
    Notification type, possible Values: EMAIL, JIRA, WEBHOOK
    webhook_configuration AppsecNotificationWebhookConfigurationArgs
    Webhook configuration, required when type equals WEBHOOK
    attackCandidateBasedAlertingProfile String
    For attack candidate alerts, select an alerting profile to control the delivery of security notifications related to this integration.
    attackCandidateBasedEmailPayload Property Map
    Attack candidate based email payload, required when trigger equals ATTACK_CANDIDATE and type equals EMAIL
    attackCandidateBasedJiraPayload Property Map
    Attack candidate based Jira payload, required when trigger equals ATTACK_CANDIDATE and type equals JIRA
    attackCandidateBasedWebhookPayload Property Map
    Attack candidate based webhook payload, required when trigger equals ATTACK_CANDIDATE and type equals WEBHOOK
    displayName String
    Display name of the security notification
    emailConfiguration Property Map
    Email configuration, required when type equals EMAIL
    enabled Boolean
    Enable/Disable the security notification, enabled (true) or disabled (false)
    jiraConfiguration Property Map
    Jira configuration, required when type equals JIRA
    securityProblemBasedAlertingProfile String
    For security problem alerts, select an alerting profile to control the delivery of security notifications related to this integration.
    securityProblemBasedEmailPayload Property Map
    Security problem based email payload, required when trigger equals SECURITY_PROBLEM and type equals EMAIL
    securityProblemBasedJiraPayload Property Map
    Security problem based Jira payload, required when trigger equals SECURITY_PROBLEM and type equals JIRA
    securityProblemBasedWebhookPayload Property Map
    Security problem based webhook payload, required when trigger equals SECURITY_PROBLEM and type equals WEBHOOK
    trigger String
    Security alert type, possible Values: ATTACK_CANDIDATE, SECURITY_PROBLEM
    type String
    Notification type, possible Values: EMAIL, JIRA, WEBHOOK
    webhookConfiguration Property Map
    Webhook configuration, required when type equals WEBHOOK

    Supporting Types

    AppsecNotificationAttackCandidateBasedEmailPayload, AppsecNotificationAttackCandidateBasedEmailPayloadArgs

    Body string

    The template of the email notifications.
    In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the body might leak information to untrusted parties.

    Available placeholders:
    {AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
    {Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
    {Type}: The type of attack, for example: "SQL Injection".
    {AttackUrl}: URL of the attack in Dynatrace.
    {ProcessGroupId}: Details about the process group attacked.
    {EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
    {Status}: The status of the attack, for example: "Exploited"
    {Timestamp}: When the attack happened.
    {VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

    Subject string
    The subject of the email notifications.. Available placeholders:
    {AttackDisplayId}: The unique identifier assigned by Dynatrace, for example, "A-1234".
    {Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
    {Type}: The type of attack, for example: "SQL Injection".
    {AttackUrl}: URL of the attack in Dynatrace.
    {ProcessGroupId}: Details about the process group attacked.
    {EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
    {Status}: The status of the attack, for example: "Exploited"
    {Timestamp}: When the attack happened.
    {VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.
    Body string

    The template of the email notifications.
    In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the body might leak information to untrusted parties.

    Available placeholders:
    {AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
    {Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
    {Type}: The type of attack, for example: "SQL Injection".
    {AttackUrl}: URL of the attack in Dynatrace.
    {ProcessGroupId}: Details about the process group attacked.
    {EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
    {Status}: The status of the attack, for example: "Exploited"
    {Timestamp}: When the attack happened.
    {VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

    Subject string
    The subject of the email notifications.. Available placeholders:
    {AttackDisplayId}: The unique identifier assigned by Dynatrace, for example, "A-1234".
    {Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
    {Type}: The type of attack, for example: "SQL Injection".
    {AttackUrl}: URL of the attack in Dynatrace.
    {ProcessGroupId}: Details about the process group attacked.
    {EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
    {Status}: The status of the attack, for example: "Exploited"
    {Timestamp}: When the attack happened.
    {VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.
    body String

    The template of the email notifications.
    In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the body might leak information to untrusted parties.

    Available placeholders:
    {AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
    {Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
    {Type}: The type of attack, for example: "SQL Injection".
    {AttackUrl}: URL of the attack in Dynatrace.
    {ProcessGroupId}: Details about the process group attacked.
    {EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
    {Status}: The status of the attack, for example: "Exploited"
    {Timestamp}: When the attack happened.
    {VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

    subject String
    The subject of the email notifications.. Available placeholders:
    {AttackDisplayId}: The unique identifier assigned by Dynatrace, for example, "A-1234".
    {Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
    {Type}: The type of attack, for example: "SQL Injection".
    {AttackUrl}: URL of the attack in Dynatrace.
    {ProcessGroupId}: Details about the process group attacked.
    {EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
    {Status}: The status of the attack, for example: "Exploited"
    {Timestamp}: When the attack happened.
    {VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.
    body string

    The template of the email notifications.
    In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the body might leak information to untrusted parties.

    Available placeholders:
    {AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
    {Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
    {Type}: The type of attack, for example: "SQL Injection".
    {AttackUrl}: URL of the attack in Dynatrace.
    {ProcessGroupId}: Details about the process group attacked.
    {EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
    {Status}: The status of the attack, for example: "Exploited"
    {Timestamp}: When the attack happened.
    {VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

    subject string
    The subject of the email notifications.. Available placeholders:
    {AttackDisplayId}: The unique identifier assigned by Dynatrace, for example, "A-1234".
    {Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
    {Type}: The type of attack, for example: "SQL Injection".
    {AttackUrl}: URL of the attack in Dynatrace.
    {ProcessGroupId}: Details about the process group attacked.
    {EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
    {Status}: The status of the attack, for example: "Exploited"
    {Timestamp}: When the attack happened.
    {VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.
    body str

    The template of the email notifications.
    In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the body might leak information to untrusted parties.

    Available placeholders:
    {AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
    {Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
    {Type}: The type of attack, for example: "SQL Injection".
    {AttackUrl}: URL of the attack in Dynatrace.
    {ProcessGroupId}: Details about the process group attacked.
    {EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
    {Status}: The status of the attack, for example: "Exploited"
    {Timestamp}: When the attack happened.
    {VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

    subject str
    The subject of the email notifications.. Available placeholders:
    {AttackDisplayId}: The unique identifier assigned by Dynatrace, for example, "A-1234".
    {Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
    {Type}: The type of attack, for example: "SQL Injection".
    {AttackUrl}: URL of the attack in Dynatrace.
    {ProcessGroupId}: Details about the process group attacked.
    {EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
    {Status}: The status of the attack, for example: "Exploited"
    {Timestamp}: When the attack happened.
    {VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.
    body String

    The template of the email notifications.
    In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the body might leak information to untrusted parties.

    Available placeholders:
    {AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
    {Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
    {Type}: The type of attack, for example: "SQL Injection".
    {AttackUrl}: URL of the attack in Dynatrace.
    {ProcessGroupId}: Details about the process group attacked.
    {EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
    {Status}: The status of the attack, for example: "Exploited"
    {Timestamp}: When the attack happened.
    {VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

    subject String
    The subject of the email notifications.. Available placeholders:
    {AttackDisplayId}: The unique identifier assigned by Dynatrace, for example, "A-1234".
    {Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
    {Type}: The type of attack, for example: "SQL Injection".
    {AttackUrl}: URL of the attack in Dynatrace.
    {ProcessGroupId}: Details about the process group attacked.
    {EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
    {Status}: The status of the attack, for example: "Exploited"
    {Timestamp}: When the attack happened.
    {VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

    AppsecNotificationAttackCandidateBasedJiraPayload, AppsecNotificationAttackCandidateBasedJiraPayloadArgs

    Description string

    The description of the Jira issue to be created by this notification.
    In case a value of an attack is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

    Available placeholders:
    {AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
    {Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
    {Type}: The type of attack, for example: "SQL Injection".
    {AttackUrl}: URL of the attack in Dynatrace.
    {ProcessGroupId}: Details about the process group attacked.
    {EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
    {Status}: The status of the attack, for example: "Exploited"
    {Timestamp}: When the attack happened.
    {VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

    Summary string

    The summary of the Jira issue to be created by this notification.. Note: The Jira summary field must contain less than 255 characters. Any content exceeding this limit after evaluating the placeholders will be discarded.

    Available placeholders:
    {AttackDisplayId}: The unique identifier assigned by Dynatrace, for example, "A-1234".
    {Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
    {Type}: The type of attack, for example: "SQL Injection".
    {AttackUrl}: URL of the attack in Dynatrace.
    {ProcessGroupId}: Details about the process group attacked.
    {EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
    {Status}: The status of the attack, for example: "Exploited"
    {Timestamp}: When the attack happened.
    {VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

    Description string

    The description of the Jira issue to be created by this notification.
    In case a value of an attack is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

    Available placeholders:
    {AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
    {Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
    {Type}: The type of attack, for example: "SQL Injection".
    {AttackUrl}: URL of the attack in Dynatrace.
    {ProcessGroupId}: Details about the process group attacked.
    {EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
    {Status}: The status of the attack, for example: "Exploited"
    {Timestamp}: When the attack happened.
    {VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

    Summary string

    The summary of the Jira issue to be created by this notification.. Note: The Jira summary field must contain less than 255 characters. Any content exceeding this limit after evaluating the placeholders will be discarded.

    Available placeholders:
    {AttackDisplayId}: The unique identifier assigned by Dynatrace, for example, "A-1234".
    {Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
    {Type}: The type of attack, for example: "SQL Injection".
    {AttackUrl}: URL of the attack in Dynatrace.
    {ProcessGroupId}: Details about the process group attacked.
    {EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
    {Status}: The status of the attack, for example: "Exploited"
    {Timestamp}: When the attack happened.
    {VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

    description String

    The description of the Jira issue to be created by this notification.
    In case a value of an attack is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

    Available placeholders:
    {AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
    {Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
    {Type}: The type of attack, for example: "SQL Injection".
    {AttackUrl}: URL of the attack in Dynatrace.
    {ProcessGroupId}: Details about the process group attacked.
    {EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
    {Status}: The status of the attack, for example: "Exploited"
    {Timestamp}: When the attack happened.
    {VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

    summary String

    The summary of the Jira issue to be created by this notification.. Note: The Jira summary field must contain less than 255 characters. Any content exceeding this limit after evaluating the placeholders will be discarded.

    Available placeholders:
    {AttackDisplayId}: The unique identifier assigned by Dynatrace, for example, "A-1234".
    {Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
    {Type}: The type of attack, for example: "SQL Injection".
    {AttackUrl}: URL of the attack in Dynatrace.
    {ProcessGroupId}: Details about the process group attacked.
    {EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
    {Status}: The status of the attack, for example: "Exploited"
    {Timestamp}: When the attack happened.
    {VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

    description string

    The description of the Jira issue to be created by this notification.
    In case a value of an attack is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

    Available placeholders:
    {AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
    {Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
    {Type}: The type of attack, for example: "SQL Injection".
    {AttackUrl}: URL of the attack in Dynatrace.
    {ProcessGroupId}: Details about the process group attacked.
    {EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
    {Status}: The status of the attack, for example: "Exploited"
    {Timestamp}: When the attack happened.
    {VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

    summary string

    The summary of the Jira issue to be created by this notification.. Note: The Jira summary field must contain less than 255 characters. Any content exceeding this limit after evaluating the placeholders will be discarded.

    Available placeholders:
    {AttackDisplayId}: The unique identifier assigned by Dynatrace, for example, "A-1234".
    {Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
    {Type}: The type of attack, for example: "SQL Injection".
    {AttackUrl}: URL of the attack in Dynatrace.
    {ProcessGroupId}: Details about the process group attacked.
    {EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
    {Status}: The status of the attack, for example: "Exploited"
    {Timestamp}: When the attack happened.
    {VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

    description str

    The description of the Jira issue to be created by this notification.
    In case a value of an attack is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

    Available placeholders:
    {AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
    {Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
    {Type}: The type of attack, for example: "SQL Injection".
    {AttackUrl}: URL of the attack in Dynatrace.
    {ProcessGroupId}: Details about the process group attacked.
    {EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
    {Status}: The status of the attack, for example: "Exploited"
    {Timestamp}: When the attack happened.
    {VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

    summary str

    The summary of the Jira issue to be created by this notification.. Note: The Jira summary field must contain less than 255 characters. Any content exceeding this limit after evaluating the placeholders will be discarded.

    Available placeholders:
    {AttackDisplayId}: The unique identifier assigned by Dynatrace, for example, "A-1234".
    {Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
    {Type}: The type of attack, for example: "SQL Injection".
    {AttackUrl}: URL of the attack in Dynatrace.
    {ProcessGroupId}: Details about the process group attacked.
    {EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
    {Status}: The status of the attack, for example: "Exploited"
    {Timestamp}: When the attack happened.
    {VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

    description String

    The description of the Jira issue to be created by this notification.
    In case a value of an attack is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

    Available placeholders:
    {AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
    {Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
    {Type}: The type of attack, for example: "SQL Injection".
    {AttackUrl}: URL of the attack in Dynatrace.
    {ProcessGroupId}: Details about the process group attacked.
    {EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
    {Status}: The status of the attack, for example: "Exploited"
    {Timestamp}: When the attack happened.
    {VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

    summary String

    The summary of the Jira issue to be created by this notification.. Note: The Jira summary field must contain less than 255 characters. Any content exceeding this limit after evaluating the placeholders will be discarded.

    Available placeholders:
    {AttackDisplayId}: The unique identifier assigned by Dynatrace, for example, "A-1234".
    {Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
    {Type}: The type of attack, for example: "SQL Injection".
    {AttackUrl}: URL of the attack in Dynatrace.
    {ProcessGroupId}: Details about the process group attacked.
    {EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
    {Status}: The status of the attack, for example: "Exploited"
    {Timestamp}: When the attack happened.
    {VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

    AppsecNotificationAttackCandidateBasedWebhookPayload, AppsecNotificationAttackCandidateBasedWebhookPayloadArgs

    Payload string

    This is the content your notification message will include when users view it.
    In case a value of an attack is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the custom payload might leak information to untrusted parties.

    Available placeholders:
    {AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
    {Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
    {Type}: The type of attack, for example: "SQL Injection".
    {AttackUrl}: URL of the attack in Dynatrace.
    {ProcessGroupId}: Details about the process group attacked.
    {EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
    {Status}: The status of the attack, for example: "Exploited"
    {Timestamp}: When the attack happened.
    {VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

    Payload string

    This is the content your notification message will include when users view it.
    In case a value of an attack is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the custom payload might leak information to untrusted parties.

    Available placeholders:
    {AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
    {Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
    {Type}: The type of attack, for example: "SQL Injection".
    {AttackUrl}: URL of the attack in Dynatrace.
    {ProcessGroupId}: Details about the process group attacked.
    {EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
    {Status}: The status of the attack, for example: "Exploited"
    {Timestamp}: When the attack happened.
    {VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

    payload String

    This is the content your notification message will include when users view it.
    In case a value of an attack is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the custom payload might leak information to untrusted parties.

    Available placeholders:
    {AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
    {Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
    {Type}: The type of attack, for example: "SQL Injection".
    {AttackUrl}: URL of the attack in Dynatrace.
    {ProcessGroupId}: Details about the process group attacked.
    {EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
    {Status}: The status of the attack, for example: "Exploited"
    {Timestamp}: When the attack happened.
    {VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

    payload string

    This is the content your notification message will include when users view it.
    In case a value of an attack is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the custom payload might leak information to untrusted parties.

    Available placeholders:
    {AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
    {Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
    {Type}: The type of attack, for example: "SQL Injection".
    {AttackUrl}: URL of the attack in Dynatrace.
    {ProcessGroupId}: Details about the process group attacked.
    {EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
    {Status}: The status of the attack, for example: "Exploited"
    {Timestamp}: When the attack happened.
    {VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

    payload str

    This is the content your notification message will include when users view it.
    In case a value of an attack is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the custom payload might leak information to untrusted parties.

    Available placeholders:
    {AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
    {Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
    {Type}: The type of attack, for example: "SQL Injection".
    {AttackUrl}: URL of the attack in Dynatrace.
    {ProcessGroupId}: Details about the process group attacked.
    {EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
    {Status}: The status of the attack, for example: "Exploited"
    {Timestamp}: When the attack happened.
    {VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

    payload String

    This is the content your notification message will include when users view it.
    In case a value of an attack is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the custom payload might leak information to untrusted parties.

    Available placeholders:
    {AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
    {Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
    {Type}: The type of attack, for example: "SQL Injection".
    {AttackUrl}: URL of the attack in Dynatrace.
    {ProcessGroupId}: Details about the process group attacked.
    {EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
    {Status}: The status of the attack, for example: "Exploited"
    {Timestamp}: When the attack happened.
    {VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

    AppsecNotificationEmailConfiguration, AppsecNotificationEmailConfigurationArgs

    Recipients List<string>
    To
    BccRecipients List<string>
    BCC
    CcRecipients List<string>
    CC
    Recipients []string
    To
    BccRecipients []string
    BCC
    CcRecipients []string
    CC
    recipients List<String>
    To
    bccRecipients List<String>
    BCC
    ccRecipients List<String>
    CC
    recipients string[]
    To
    bccRecipients string[]
    BCC
    ccRecipients string[]
    CC
    recipients Sequence[str]
    To
    bcc_recipients Sequence[str]
    BCC
    cc_recipients Sequence[str]
    CC
    recipients List<String>
    To
    bccRecipients List<String>
    BCC
    ccRecipients List<String>
    CC

    AppsecNotificationJiraConfiguration, AppsecNotificationJiraConfigurationArgs

    ApiToken string
    The API token for the Jira profile. Using password authentication was deprecated by Jira
    IssueType string

    The type of the Jira issue to be created by this notification.

    To find all available issue types or create your own, in Jira, go to Project settings > Issue types.

    ProjectKey string
    The project key of the Jira issue to be created by this notification.
    Url string
    The URL of the Jira API endpoint.
    Username string
    The username of the Jira profile.
    ApiToken string
    The API token for the Jira profile. Using password authentication was deprecated by Jira
    IssueType string

    The type of the Jira issue to be created by this notification.

    To find all available issue types or create your own, in Jira, go to Project settings > Issue types.

    ProjectKey string
    The project key of the Jira issue to be created by this notification.
    Url string
    The URL of the Jira API endpoint.
    Username string
    The username of the Jira profile.
    apiToken String
    The API token for the Jira profile. Using password authentication was deprecated by Jira
    issueType String

    The type of the Jira issue to be created by this notification.

    To find all available issue types or create your own, in Jira, go to Project settings > Issue types.

    projectKey String
    The project key of the Jira issue to be created by this notification.
    url String
    The URL of the Jira API endpoint.
    username String
    The username of the Jira profile.
    apiToken string
    The API token for the Jira profile. Using password authentication was deprecated by Jira
    issueType string

    The type of the Jira issue to be created by this notification.

    To find all available issue types or create your own, in Jira, go to Project settings > Issue types.

    projectKey string
    The project key of the Jira issue to be created by this notification.
    url string
    The URL of the Jira API endpoint.
    username string
    The username of the Jira profile.
    api_token str
    The API token for the Jira profile. Using password authentication was deprecated by Jira
    issue_type str

    The type of the Jira issue to be created by this notification.

    To find all available issue types or create your own, in Jira, go to Project settings > Issue types.

    project_key str
    The project key of the Jira issue to be created by this notification.
    url str
    The URL of the Jira API endpoint.
    username str
    The username of the Jira profile.
    apiToken String
    The API token for the Jira profile. Using password authentication was deprecated by Jira
    issueType String

    The type of the Jira issue to be created by this notification.

    To find all available issue types or create your own, in Jira, go to Project settings > Issue types.

    projectKey String
    The project key of the Jira issue to be created by this notification.
    url String
    The URL of the Jira API endpoint.
    username String
    The username of the Jira profile.

    AppsecNotificationSecurityProblemBasedEmailPayload, AppsecNotificationSecurityProblemBasedEmailPayloadArgs

    Body string

    The template of the email notifications.
    In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

    Available placeholders:
    {SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
    {Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
    {Description}: A more detailed description of the vulnerability.
    {CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
    {Severity}: The security problem severity, for example, "Critical" or "Medium".
    {SecurityProblemUrl}: URL of the security problem in Dynatrace.
    {AffectedEntities}: Details about the entities affected by the security problem in a json array.
    {ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
    {Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
    {Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
    {DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
    {ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

    Subject string
    The subject of the email notifications.. Available placeholders:
    {SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
    {Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
    {CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
    {Severity}: The security problem severity, for example, "Critical" or "Medium".
    {SecurityProblemUrl}: URL of the security problem in Dynatrace.
    {Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
    {DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
    {ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".
    Body string

    The template of the email notifications.
    In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

    Available placeholders:
    {SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
    {Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
    {Description}: A more detailed description of the vulnerability.
    {CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
    {Severity}: The security problem severity, for example, "Critical" or "Medium".
    {SecurityProblemUrl}: URL of the security problem in Dynatrace.
    {AffectedEntities}: Details about the entities affected by the security problem in a json array.
    {ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
    {Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
    {Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
    {DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
    {ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

    Subject string
    The subject of the email notifications.. Available placeholders:
    {SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
    {Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
    {CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
    {Severity}: The security problem severity, for example, "Critical" or "Medium".
    {SecurityProblemUrl}: URL of the security problem in Dynatrace.
    {Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
    {DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
    {ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".
    body String

    The template of the email notifications.
    In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

    Available placeholders:
    {SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
    {Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
    {Description}: A more detailed description of the vulnerability.
    {CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
    {Severity}: The security problem severity, for example, "Critical" or "Medium".
    {SecurityProblemUrl}: URL of the security problem in Dynatrace.
    {AffectedEntities}: Details about the entities affected by the security problem in a json array.
    {ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
    {Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
    {Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
    {DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
    {ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

    subject String
    The subject of the email notifications.. Available placeholders:
    {SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
    {Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
    {CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
    {Severity}: The security problem severity, for example, "Critical" or "Medium".
    {SecurityProblemUrl}: URL of the security problem in Dynatrace.
    {Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
    {DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
    {ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".
    body string

    The template of the email notifications.
    In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

    Available placeholders:
    {SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
    {Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
    {Description}: A more detailed description of the vulnerability.
    {CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
    {Severity}: The security problem severity, for example, "Critical" or "Medium".
    {SecurityProblemUrl}: URL of the security problem in Dynatrace.
    {AffectedEntities}: Details about the entities affected by the security problem in a json array.
    {ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
    {Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
    {Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
    {DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
    {ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

    subject string
    The subject of the email notifications.. Available placeholders:
    {SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
    {Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
    {CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
    {Severity}: The security problem severity, for example, "Critical" or "Medium".
    {SecurityProblemUrl}: URL of the security problem in Dynatrace.
    {Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
    {DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
    {ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".
    body str

    The template of the email notifications.
    In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

    Available placeholders:
    {SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
    {Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
    {Description}: A more detailed description of the vulnerability.
    {CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
    {Severity}: The security problem severity, for example, "Critical" or "Medium".
    {SecurityProblemUrl}: URL of the security problem in Dynatrace.
    {AffectedEntities}: Details about the entities affected by the security problem in a json array.
    {ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
    {Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
    {Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
    {DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
    {ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

    subject str
    The subject of the email notifications.. Available placeholders:
    {SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
    {Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
    {CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
    {Severity}: The security problem severity, for example, "Critical" or "Medium".
    {SecurityProblemUrl}: URL of the security problem in Dynatrace.
    {Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
    {DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
    {ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".
    body String

    The template of the email notifications.
    In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

    Available placeholders:
    {SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
    {Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
    {Description}: A more detailed description of the vulnerability.
    {CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
    {Severity}: The security problem severity, for example, "Critical" or "Medium".
    {SecurityProblemUrl}: URL of the security problem in Dynatrace.
    {AffectedEntities}: Details about the entities affected by the security problem in a json array.
    {ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
    {Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
    {Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
    {DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
    {ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

    subject String
    The subject of the email notifications.. Available placeholders:
    {SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
    {Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
    {CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
    {Severity}: The security problem severity, for example, "Critical" or "Medium".
    {SecurityProblemUrl}: URL of the security problem in Dynatrace.
    {Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
    {DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
    {ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

    AppsecNotificationSecurityProblemBasedJiraPayload, AppsecNotificationSecurityProblemBasedJiraPayloadArgs

    Description string

    The description of the Jira issue to be created by this notification.
    In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

    Available placeholders:
    {SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
    {Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
    {Description}: A more detailed description of the vulnerability.
    {CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
    {Severity}: The security problem severity, for example, "Critical" or "Medium".
    {SecurityProblemUrl}: URL of the security problem in Dynatrace.
    {AffectedEntities}: Details about the entities affected by the security problem in a json array.
    {ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
    {Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
    {Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
    {DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
    {ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

    Summary string

    The summary of the Jira issue to be created by this notification.. Note: The Jira summary field must contain less than 255 characters. Any content exceeding this limit after evaluating the placeholders will be discarded.

    Available placeholders:
    {SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
    {Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
    {CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
    {Severity}: The security problem severity, for example, "Critical" or "Medium".
    {SecurityProblemUrl}: URL of the security problem in Dynatrace.
    {Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
    {DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
    {ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

    Description string

    The description of the Jira issue to be created by this notification.
    In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

    Available placeholders:
    {SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
    {Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
    {Description}: A more detailed description of the vulnerability.
    {CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
    {Severity}: The security problem severity, for example, "Critical" or "Medium".
    {SecurityProblemUrl}: URL of the security problem in Dynatrace.
    {AffectedEntities}: Details about the entities affected by the security problem in a json array.
    {ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
    {Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
    {Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
    {DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
    {ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

    Summary string

    The summary of the Jira issue to be created by this notification.. Note: The Jira summary field must contain less than 255 characters. Any content exceeding this limit after evaluating the placeholders will be discarded.

    Available placeholders:
    {SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
    {Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
    {CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
    {Severity}: The security problem severity, for example, "Critical" or "Medium".
    {SecurityProblemUrl}: URL of the security problem in Dynatrace.
    {Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
    {DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
    {ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

    description String

    The description of the Jira issue to be created by this notification.
    In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

    Available placeholders:
    {SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
    {Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
    {Description}: A more detailed description of the vulnerability.
    {CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
    {Severity}: The security problem severity, for example, "Critical" or "Medium".
    {SecurityProblemUrl}: URL of the security problem in Dynatrace.
    {AffectedEntities}: Details about the entities affected by the security problem in a json array.
    {ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
    {Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
    {Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
    {DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
    {ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

    summary String

    The summary of the Jira issue to be created by this notification.. Note: The Jira summary field must contain less than 255 characters. Any content exceeding this limit after evaluating the placeholders will be discarded.

    Available placeholders:
    {SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
    {Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
    {CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
    {Severity}: The security problem severity, for example, "Critical" or "Medium".
    {SecurityProblemUrl}: URL of the security problem in Dynatrace.
    {Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
    {DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
    {ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

    description string

    The description of the Jira issue to be created by this notification.
    In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

    Available placeholders:
    {SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
    {Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
    {Description}: A more detailed description of the vulnerability.
    {CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
    {Severity}: The security problem severity, for example, "Critical" or "Medium".
    {SecurityProblemUrl}: URL of the security problem in Dynatrace.
    {AffectedEntities}: Details about the entities affected by the security problem in a json array.
    {ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
    {Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
    {Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
    {DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
    {ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

    summary string

    The summary of the Jira issue to be created by this notification.. Note: The Jira summary field must contain less than 255 characters. Any content exceeding this limit after evaluating the placeholders will be discarded.

    Available placeholders:
    {SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
    {Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
    {CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
    {Severity}: The security problem severity, for example, "Critical" or "Medium".
    {SecurityProblemUrl}: URL of the security problem in Dynatrace.
    {Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
    {DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
    {ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

    description str

    The description of the Jira issue to be created by this notification.
    In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

    Available placeholders:
    {SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
    {Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
    {Description}: A more detailed description of the vulnerability.
    {CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
    {Severity}: The security problem severity, for example, "Critical" or "Medium".
    {SecurityProblemUrl}: URL of the security problem in Dynatrace.
    {AffectedEntities}: Details about the entities affected by the security problem in a json array.
    {ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
    {Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
    {Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
    {DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
    {ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

    summary str

    The summary of the Jira issue to be created by this notification.. Note: The Jira summary field must contain less than 255 characters. Any content exceeding this limit after evaluating the placeholders will be discarded.

    Available placeholders:
    {SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
    {Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
    {CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
    {Severity}: The security problem severity, for example, "Critical" or "Medium".
    {SecurityProblemUrl}: URL of the security problem in Dynatrace.
    {Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
    {DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
    {ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

    description String

    The description of the Jira issue to be created by this notification.
    In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

    Available placeholders:
    {SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
    {Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
    {Description}: A more detailed description of the vulnerability.
    {CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
    {Severity}: The security problem severity, for example, "Critical" or "Medium".
    {SecurityProblemUrl}: URL of the security problem in Dynatrace.
    {AffectedEntities}: Details about the entities affected by the security problem in a json array.
    {ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
    {Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
    {Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
    {DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
    {ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

    summary String

    The summary of the Jira issue to be created by this notification.. Note: The Jira summary field must contain less than 255 characters. Any content exceeding this limit after evaluating the placeholders will be discarded.

    Available placeholders:
    {SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
    {Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
    {CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
    {Severity}: The security problem severity, for example, "Critical" or "Medium".
    {SecurityProblemUrl}: URL of the security problem in Dynatrace.
    {Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
    {DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
    {ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

    AppsecNotificationSecurityProblemBasedWebhookPayload, AppsecNotificationSecurityProblemBasedWebhookPayloadArgs

    Payload string

    This is the content your notification message will include when users view it.
    In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the custom payload might leak information to untrusted parties.

    Available placeholders:
    {SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
    {Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
    {Description}: A more detailed description of the vulnerability.
    {CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
    {Severity}: The security problem severity, for example, "Critical" or "Medium".
    {SecurityProblemUrl}: URL of the security problem in Dynatrace.
    {AffectedEntities}: Details about the entities affected by the security problem in a json array.
    {ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
    {Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
    {Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
    {DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
    {ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

    Payload string

    This is the content your notification message will include when users view it.
    In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the custom payload might leak information to untrusted parties.

    Available placeholders:
    {SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
    {Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
    {Description}: A more detailed description of the vulnerability.
    {CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
    {Severity}: The security problem severity, for example, "Critical" or "Medium".
    {SecurityProblemUrl}: URL of the security problem in Dynatrace.
    {AffectedEntities}: Details about the entities affected by the security problem in a json array.
    {ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
    {Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
    {Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
    {DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
    {ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

    payload String

    This is the content your notification message will include when users view it.
    In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the custom payload might leak information to untrusted parties.

    Available placeholders:
    {SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
    {Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
    {Description}: A more detailed description of the vulnerability.
    {CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
    {Severity}: The security problem severity, for example, "Critical" or "Medium".
    {SecurityProblemUrl}: URL of the security problem in Dynatrace.
    {AffectedEntities}: Details about the entities affected by the security problem in a json array.
    {ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
    {Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
    {Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
    {DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
    {ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

    payload string

    This is the content your notification message will include when users view it.
    In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the custom payload might leak information to untrusted parties.

    Available placeholders:
    {SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
    {Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
    {Description}: A more detailed description of the vulnerability.
    {CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
    {Severity}: The security problem severity, for example, "Critical" or "Medium".
    {SecurityProblemUrl}: URL of the security problem in Dynatrace.
    {AffectedEntities}: Details about the entities affected by the security problem in a json array.
    {ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
    {Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
    {Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
    {DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
    {ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

    payload str

    This is the content your notification message will include when users view it.
    In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the custom payload might leak information to untrusted parties.

    Available placeholders:
    {SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
    {Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
    {Description}: A more detailed description of the vulnerability.
    {CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
    {Severity}: The security problem severity, for example, "Critical" or "Medium".
    {SecurityProblemUrl}: URL of the security problem in Dynatrace.
    {AffectedEntities}: Details about the entities affected by the security problem in a json array.
    {ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
    {Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
    {Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
    {DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
    {ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

    payload String

    This is the content your notification message will include when users view it.
    In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the custom payload might leak information to untrusted parties.

    Available placeholders:
    {SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
    {Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
    {Description}: A more detailed description of the vulnerability.
    {CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
    {Severity}: The security problem severity, for example, "Critical" or "Medium".
    {SecurityProblemUrl}: URL of the security problem in Dynatrace.
    {AffectedEntities}: Details about the entities affected by the security problem in a json array.
    {ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
    {Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
    {Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
    {DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
    {ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

    AppsecNotificationWebhookConfiguration, AppsecNotificationWebhookConfigurationArgs

    AcceptAnyCertificate bool
    Accept any SSL certificate (including self-signed and invalid certificates)
    Url string
    Webhook endpoint URL
    Headers Pulumiverse.Dynatrace.Inputs.AppsecNotificationWebhookConfigurationHeaders

    Use additional HTTP headers to attach any additional information, for example, configuration, authorization, or metadata.

    Note that JSON-based webhook endpoints require the addition of the Content-Type: application/json header to enable escaping of special characters and to avoid malformed JSON content.

    AcceptAnyCertificate bool
    Accept any SSL certificate (including self-signed and invalid certificates)
    Url string
    Webhook endpoint URL
    Headers AppsecNotificationWebhookConfigurationHeaders

    Use additional HTTP headers to attach any additional information, for example, configuration, authorization, or metadata.

    Note that JSON-based webhook endpoints require the addition of the Content-Type: application/json header to enable escaping of special characters and to avoid malformed JSON content.

    acceptAnyCertificate Boolean
    Accept any SSL certificate (including self-signed and invalid certificates)
    url String
    Webhook endpoint URL
    headers AppsecNotificationWebhookConfigurationHeaders

    Use additional HTTP headers to attach any additional information, for example, configuration, authorization, or metadata.

    Note that JSON-based webhook endpoints require the addition of the Content-Type: application/json header to enable escaping of special characters and to avoid malformed JSON content.

    acceptAnyCertificate boolean
    Accept any SSL certificate (including self-signed and invalid certificates)
    url string
    Webhook endpoint URL
    headers AppsecNotificationWebhookConfigurationHeaders

    Use additional HTTP headers to attach any additional information, for example, configuration, authorization, or metadata.

    Note that JSON-based webhook endpoints require the addition of the Content-Type: application/json header to enable escaping of special characters and to avoid malformed JSON content.

    accept_any_certificate bool
    Accept any SSL certificate (including self-signed and invalid certificates)
    url str
    Webhook endpoint URL
    headers AppsecNotificationWebhookConfigurationHeaders

    Use additional HTTP headers to attach any additional information, for example, configuration, authorization, or metadata.

    Note that JSON-based webhook endpoints require the addition of the Content-Type: application/json header to enable escaping of special characters and to avoid malformed JSON content.

    acceptAnyCertificate Boolean
    Accept any SSL certificate (including self-signed and invalid certificates)
    url String
    Webhook endpoint URL
    headers Property Map

    Use additional HTTP headers to attach any additional information, for example, configuration, authorization, or metadata.

    Note that JSON-based webhook endpoints require the addition of the Content-Type: application/json header to enable escaping of special characters and to avoid malformed JSON content.

    AppsecNotificationWebhookConfigurationHeaders, AppsecNotificationWebhookConfigurationHeadersArgs

    AppsecNotificationWebhookConfigurationHeadersHeader, AppsecNotificationWebhookConfigurationHeadersHeaderArgs

    Name string
    no documentation available
    Secret bool
    Secret HTTP header value
    SecretValue string
    The secret value of the HTTP header. May contain an empty value.
    Value string
    The value of the HTTP header. May contain an empty value.
    Name string
    no documentation available
    Secret bool
    Secret HTTP header value
    SecretValue string
    The secret value of the HTTP header. May contain an empty value.
    Value string
    The value of the HTTP header. May contain an empty value.
    name String
    no documentation available
    secret Boolean
    Secret HTTP header value
    secretValue String
    The secret value of the HTTP header. May contain an empty value.
    value String
    The value of the HTTP header. May contain an empty value.
    name string
    no documentation available
    secret boolean
    Secret HTTP header value
    secretValue string
    The secret value of the HTTP header. May contain an empty value.
    value string
    The value of the HTTP header. May contain an empty value.
    name str
    no documentation available
    secret bool
    Secret HTTP header value
    secret_value str
    The secret value of the HTTP header. May contain an empty value.
    value str
    The value of the HTTP header. May contain an empty value.
    name String
    no documentation available
    secret Boolean
    Secret HTTP header value
    secretValue String
    The secret value of the HTTP header. May contain an empty value.
    value String
    The value of the HTTP header. May contain an empty value.

    Package Details

    Repository
    dynatrace pulumiverse/pulumi-dynatrace
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the dynatrace Terraform Provider.
    dynatrace logo
    Dynatrace v0.10.0 published on Friday, Jun 7, 2024 by Pulumiverse