dynatrace.VulnerabilityThirdPartyK8s
Explore with Pulumi AI
This resource requires the API token scopes Read security problems (
securityProblems.read
) and Write security problems (securityProblems.write
)
This resource is excluded by default in the export utility, please explicitly specify the resource to retrieve existing configuration.
Dynatrace Documentation
Runtime Vulnerability Analytics - https://www.dynatrace.com/support/help/platform-modules/application-security/vulnerability-analytics
Settings API - https://www.dynatrace.com/support/help/dynatrace-api/environment-api/settings (schemaId:
builtin:appsec.third-party-vulnerability-kubernetes-label-rule-settings
)
Resource Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as dynatrace from "@pulumiverse/dynatrace";
const _name_ = new dynatrace.VulnerabilityThirdPartyK8s("#name#", {
enabled: false,
kubernetesLabelConditions: {
kubernetesLabelConditions: [
{
kubernetesLabelKey: "kubernetes.azure.com/mode",
kubernetesLabelValue: "#name#",
matcher: "NOT_EQUALS",
},
{
kubernetesLabelKey: "agentpool",
kubernetesLabelValue: "#name#",
matcher: "CONTAINS",
},
],
},
metadata: {
comment: "#name#",
},
ruleName: "#name#",
vulnerabilityDetectionControl: {
monitoringMode: "MONITORING_OFF",
},
});
import pulumi
import pulumiverse_dynatrace as dynatrace
_name_ = dynatrace.VulnerabilityThirdPartyK8s("#name#",
enabled=False,
kubernetes_label_conditions={
"kubernetes_label_conditions": [
{
"kubernetes_label_key": "kubernetes.azure.com/mode",
"kubernetes_label_value": "#name#",
"matcher": "NOT_EQUALS",
},
{
"kubernetes_label_key": "agentpool",
"kubernetes_label_value": "#name#",
"matcher": "CONTAINS",
},
],
},
metadata={
"comment": "#name#",
},
rule_name="#name#",
vulnerability_detection_control={
"monitoring_mode": "MONITORING_OFF",
})
package main
import (
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
"github.com/pulumiverse/pulumi-dynatrace/sdk/go/dynatrace"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := dynatrace.NewVulnerabilityThirdPartyK8s(ctx, "#name#", &dynatrace.VulnerabilityThirdPartyK8sArgs{
Enabled: pulumi.Bool(false),
KubernetesLabelConditions: &dynatrace.VulnerabilityThirdPartyK8sKubernetesLabelConditionsArgs{
KubernetesLabelConditions: dynatrace.VulnerabilityThirdPartyK8sKubernetesLabelConditionsKubernetesLabelConditionArray{
&dynatrace.VulnerabilityThirdPartyK8sKubernetesLabelConditionsKubernetesLabelConditionArgs{
KubernetesLabelKey: pulumi.String("kubernetes.azure.com/mode"),
KubernetesLabelValue: pulumi.String("#name#"),
Matcher: pulumi.String("NOT_EQUALS"),
},
&dynatrace.VulnerabilityThirdPartyK8sKubernetesLabelConditionsKubernetesLabelConditionArgs{
KubernetesLabelKey: pulumi.String("agentpool"),
KubernetesLabelValue: pulumi.String("#name#"),
Matcher: pulumi.String("CONTAINS"),
},
},
},
Metadata: &dynatrace.VulnerabilityThirdPartyK8sMetadataArgs{
Comment: pulumi.String("#name#"),
},
RuleName: pulumi.String("#name#"),
VulnerabilityDetectionControl: &dynatrace.VulnerabilityThirdPartyK8sVulnerabilityDetectionControlArgs{
MonitoringMode: pulumi.String("MONITORING_OFF"),
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Dynatrace = Pulumiverse.Dynatrace;
return await Deployment.RunAsync(() =>
{
var _name_ = new Dynatrace.VulnerabilityThirdPartyK8s("#name#", new()
{
Enabled = false,
KubernetesLabelConditions = new Dynatrace.Inputs.VulnerabilityThirdPartyK8sKubernetesLabelConditionsArgs
{
KubernetesLabelConditions = new[]
{
new Dynatrace.Inputs.VulnerabilityThirdPartyK8sKubernetesLabelConditionsKubernetesLabelConditionArgs
{
KubernetesLabelKey = "kubernetes.azure.com/mode",
KubernetesLabelValue = "#name#",
Matcher = "NOT_EQUALS",
},
new Dynatrace.Inputs.VulnerabilityThirdPartyK8sKubernetesLabelConditionsKubernetesLabelConditionArgs
{
KubernetesLabelKey = "agentpool",
KubernetesLabelValue = "#name#",
Matcher = "CONTAINS",
},
},
},
Metadata = new Dynatrace.Inputs.VulnerabilityThirdPartyK8sMetadataArgs
{
Comment = "#name#",
},
RuleName = "#name#",
VulnerabilityDetectionControl = new Dynatrace.Inputs.VulnerabilityThirdPartyK8sVulnerabilityDetectionControlArgs
{
MonitoringMode = "MONITORING_OFF",
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.dynatrace.VulnerabilityThirdPartyK8s;
import com.pulumi.dynatrace.VulnerabilityThirdPartyK8sArgs;
import com.pulumi.dynatrace.inputs.VulnerabilityThirdPartyK8sKubernetesLabelConditionsArgs;
import com.pulumi.dynatrace.inputs.VulnerabilityThirdPartyK8sMetadataArgs;
import com.pulumi.dynatrace.inputs.VulnerabilityThirdPartyK8sVulnerabilityDetectionControlArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var _name_ = new VulnerabilityThirdPartyK8s("#name#", VulnerabilityThirdPartyK8sArgs.builder()
.enabled(false)
.kubernetesLabelConditions(VulnerabilityThirdPartyK8sKubernetesLabelConditionsArgs.builder()
.kubernetesLabelConditions(
VulnerabilityThirdPartyK8sKubernetesLabelConditionsKubernetesLabelConditionArgs.builder()
.kubernetesLabelKey("kubernetes.azure.com/mode")
.kubernetesLabelValue("#name#")
.matcher("NOT_EQUALS")
.build(),
VulnerabilityThirdPartyK8sKubernetesLabelConditionsKubernetesLabelConditionArgs.builder()
.kubernetesLabelKey("agentpool")
.kubernetesLabelValue("#name#")
.matcher("CONTAINS")
.build())
.build())
.metadata(VulnerabilityThirdPartyK8sMetadataArgs.builder()
.comment("#name#")
.build())
.ruleName("#name#")
.vulnerabilityDetectionControl(VulnerabilityThirdPartyK8sVulnerabilityDetectionControlArgs.builder()
.monitoringMode("MONITORING_OFF")
.build())
.build());
}
}
resources:
'#name#':
type: dynatrace:VulnerabilityThirdPartyK8s
properties:
enabled: false
kubernetesLabelConditions:
kubernetesLabelConditions:
- kubernetesLabelKey: kubernetes.azure.com/mode
kubernetesLabelValue: '#name#'
matcher: NOT_EQUALS
- kubernetesLabelKey: agentpool
kubernetesLabelValue: '#name#'
matcher: CONTAINS
metadata:
comment: '#name#'
ruleName: '#name#'
vulnerabilityDetectionControl:
monitoringMode: MONITORING_OFF
Create VulnerabilityThirdPartyK8s Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new VulnerabilityThirdPartyK8s(name: string, args: VulnerabilityThirdPartyK8sArgs, opts?: CustomResourceOptions);
@overload
def VulnerabilityThirdPartyK8s(resource_name: str,
args: VulnerabilityThirdPartyK8sArgs,
opts: Optional[ResourceOptions] = None)
@overload
def VulnerabilityThirdPartyK8s(resource_name: str,
opts: Optional[ResourceOptions] = None,
enabled: Optional[bool] = None,
metadata: Optional[VulnerabilityThirdPartyK8sMetadataArgs] = None,
vulnerability_detection_control: Optional[VulnerabilityThirdPartyK8sVulnerabilityDetectionControlArgs] = None,
insert_after: Optional[str] = None,
kubernetes_label_conditions: Optional[VulnerabilityThirdPartyK8sKubernetesLabelConditionsArgs] = None,
rule_name: Optional[str] = None)
func NewVulnerabilityThirdPartyK8s(ctx *Context, name string, args VulnerabilityThirdPartyK8sArgs, opts ...ResourceOption) (*VulnerabilityThirdPartyK8s, error)
public VulnerabilityThirdPartyK8s(string name, VulnerabilityThirdPartyK8sArgs args, CustomResourceOptions? opts = null)
public VulnerabilityThirdPartyK8s(String name, VulnerabilityThirdPartyK8sArgs args)
public VulnerabilityThirdPartyK8s(String name, VulnerabilityThirdPartyK8sArgs args, CustomResourceOptions options)
type: dynatrace:VulnerabilityThirdPartyK8s
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args VulnerabilityThirdPartyK8sArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args VulnerabilityThirdPartyK8sArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args VulnerabilityThirdPartyK8sArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args VulnerabilityThirdPartyK8sArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args VulnerabilityThirdPartyK8sArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var vulnerabilityThirdPartyK8sResource = new Dynatrace.VulnerabilityThirdPartyK8s("vulnerabilityThirdPartyK8sResource", new()
{
Enabled = false,
Metadata = new Dynatrace.Inputs.VulnerabilityThirdPartyK8sMetadataArgs
{
Comment = "string",
},
VulnerabilityDetectionControl = new Dynatrace.Inputs.VulnerabilityThirdPartyK8sVulnerabilityDetectionControlArgs
{
MonitoringMode = "string",
},
InsertAfter = "string",
KubernetesLabelConditions = new Dynatrace.Inputs.VulnerabilityThirdPartyK8sKubernetesLabelConditionsArgs
{
KubernetesLabelConditions = new[]
{
new Dynatrace.Inputs.VulnerabilityThirdPartyK8sKubernetesLabelConditionsKubernetesLabelConditionArgs
{
KubernetesLabelKey = "string",
Matcher = "string",
KubernetesLabelValue = "string",
},
},
},
RuleName = "string",
});
example, err := dynatrace.NewVulnerabilityThirdPartyK8s(ctx, "vulnerabilityThirdPartyK8sResource", &dynatrace.VulnerabilityThirdPartyK8sArgs{
Enabled: pulumi.Bool(false),
Metadata: &dynatrace.VulnerabilityThirdPartyK8sMetadataArgs{
Comment: pulumi.String("string"),
},
VulnerabilityDetectionControl: &dynatrace.VulnerabilityThirdPartyK8sVulnerabilityDetectionControlArgs{
MonitoringMode: pulumi.String("string"),
},
InsertAfter: pulumi.String("string"),
KubernetesLabelConditions: &dynatrace.VulnerabilityThirdPartyK8sKubernetesLabelConditionsArgs{
KubernetesLabelConditions: dynatrace.VulnerabilityThirdPartyK8sKubernetesLabelConditionsKubernetesLabelConditionArray{
&dynatrace.VulnerabilityThirdPartyK8sKubernetesLabelConditionsKubernetesLabelConditionArgs{
KubernetesLabelKey: pulumi.String("string"),
Matcher: pulumi.String("string"),
KubernetesLabelValue: pulumi.String("string"),
},
},
},
RuleName: pulumi.String("string"),
})
var vulnerabilityThirdPartyK8sResource = new VulnerabilityThirdPartyK8s("vulnerabilityThirdPartyK8sResource", VulnerabilityThirdPartyK8sArgs.builder()
.enabled(false)
.metadata(VulnerabilityThirdPartyK8sMetadataArgs.builder()
.comment("string")
.build())
.vulnerabilityDetectionControl(VulnerabilityThirdPartyK8sVulnerabilityDetectionControlArgs.builder()
.monitoringMode("string")
.build())
.insertAfter("string")
.kubernetesLabelConditions(VulnerabilityThirdPartyK8sKubernetesLabelConditionsArgs.builder()
.kubernetesLabelConditions(VulnerabilityThirdPartyK8sKubernetesLabelConditionsKubernetesLabelConditionArgs.builder()
.kubernetesLabelKey("string")
.matcher("string")
.kubernetesLabelValue("string")
.build())
.build())
.ruleName("string")
.build());
vulnerability_third_party_k8s_resource = dynatrace.VulnerabilityThirdPartyK8s("vulnerabilityThirdPartyK8sResource",
enabled=False,
metadata={
"comment": "string",
},
vulnerability_detection_control={
"monitoring_mode": "string",
},
insert_after="string",
kubernetes_label_conditions={
"kubernetes_label_conditions": [{
"kubernetes_label_key": "string",
"matcher": "string",
"kubernetes_label_value": "string",
}],
},
rule_name="string")
const vulnerabilityThirdPartyK8sResource = new dynatrace.VulnerabilityThirdPartyK8s("vulnerabilityThirdPartyK8sResource", {
enabled: false,
metadata: {
comment: "string",
},
vulnerabilityDetectionControl: {
monitoringMode: "string",
},
insertAfter: "string",
kubernetesLabelConditions: {
kubernetesLabelConditions: [{
kubernetesLabelKey: "string",
matcher: "string",
kubernetesLabelValue: "string",
}],
},
ruleName: "string",
});
type: dynatrace:VulnerabilityThirdPartyK8s
properties:
enabled: false
insertAfter: string
kubernetesLabelConditions:
kubernetesLabelConditions:
- kubernetesLabelKey: string
kubernetesLabelValue: string
matcher: string
metadata:
comment: string
ruleName: string
vulnerabilityDetectionControl:
monitoringMode: string
VulnerabilityThirdPartyK8s Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The VulnerabilityThirdPartyK8s resource accepts the following input properties:
- Enabled bool
- This setting is enabled (
true
) or disabled (false
) - Metadata
Pulumiverse.
Dynatrace. Inputs. Vulnerability Third Party K8s Metadata - Step 3: Leave comment (optional)
- Vulnerability
Detection Pulumiverse.Control Dynatrace. Inputs. Vulnerability Third Party K8s Vulnerability Detection Control - Step 1: Select third-party vulnerability detection behavior
- Insert
After string - Because this resource allows for ordering you may specify the ID of the resource instance that comes before this instance regarding order. If not specified when creating the setting will be added to the end of the list. If not specified during update the order will remain untouched
- Kubernetes
Label Pulumiverse.Conditions Dynatrace. Inputs. Vulnerability Third Party K8s Kubernetes Label Conditions - When you add multiple conditions, the rule applies if all conditions apply.
- Rule
Name string - Rule name
- Enabled bool
- This setting is enabled (
true
) or disabled (false
) - Metadata
Vulnerability
Third Party K8s Metadata Args - Step 3: Leave comment (optional)
- Vulnerability
Detection VulnerabilityControl Third Party K8s Vulnerability Detection Control Args - Step 1: Select third-party vulnerability detection behavior
- Insert
After string - Because this resource allows for ordering you may specify the ID of the resource instance that comes before this instance regarding order. If not specified when creating the setting will be added to the end of the list. If not specified during update the order will remain untouched
- Kubernetes
Label VulnerabilityConditions Third Party K8s Kubernetes Label Conditions Args - When you add multiple conditions, the rule applies if all conditions apply.
- Rule
Name string - Rule name
- enabled Boolean
- This setting is enabled (
true
) or disabled (false
) - metadata
Vulnerability
Third Party K8s Metadata - Step 3: Leave comment (optional)
- vulnerability
Detection VulnerabilityControl Third Party K8s Vulnerability Detection Control - Step 1: Select third-party vulnerability detection behavior
- insert
After String - Because this resource allows for ordering you may specify the ID of the resource instance that comes before this instance regarding order. If not specified when creating the setting will be added to the end of the list. If not specified during update the order will remain untouched
- kubernetes
Label VulnerabilityConditions Third Party K8s Kubernetes Label Conditions - When you add multiple conditions, the rule applies if all conditions apply.
- rule
Name String - Rule name
- enabled boolean
- This setting is enabled (
true
) or disabled (false
) - metadata
Vulnerability
Third Party K8s Metadata - Step 3: Leave comment (optional)
- vulnerability
Detection VulnerabilityControl Third Party K8s Vulnerability Detection Control - Step 1: Select third-party vulnerability detection behavior
- insert
After string - Because this resource allows for ordering you may specify the ID of the resource instance that comes before this instance regarding order. If not specified when creating the setting will be added to the end of the list. If not specified during update the order will remain untouched
- kubernetes
Label VulnerabilityConditions Third Party K8s Kubernetes Label Conditions - When you add multiple conditions, the rule applies if all conditions apply.
- rule
Name string - Rule name
- enabled bool
- This setting is enabled (
true
) or disabled (false
) - metadata
Vulnerability
Third Party K8s Metadata Args - Step 3: Leave comment (optional)
- vulnerability_
detection_ Vulnerabilitycontrol Third Party K8s Vulnerability Detection Control Args - Step 1: Select third-party vulnerability detection behavior
- insert_
after str - Because this resource allows for ordering you may specify the ID of the resource instance that comes before this instance regarding order. If not specified when creating the setting will be added to the end of the list. If not specified during update the order will remain untouched
- kubernetes_
label_ Vulnerabilityconditions Third Party K8s Kubernetes Label Conditions Args - When you add multiple conditions, the rule applies if all conditions apply.
- rule_
name str - Rule name
- enabled Boolean
- This setting is enabled (
true
) or disabled (false
) - metadata Property Map
- Step 3: Leave comment (optional)
- vulnerability
Detection Property MapControl - Step 1: Select third-party vulnerability detection behavior
- insert
After String - Because this resource allows for ordering you may specify the ID of the resource instance that comes before this instance regarding order. If not specified when creating the setting will be added to the end of the list. If not specified during update the order will remain untouched
- kubernetes
Label Property MapConditions - When you add multiple conditions, the rule applies if all conditions apply.
- rule
Name String - Rule name
Outputs
All input properties are implicitly available as output properties. Additionally, the VulnerabilityThirdPartyK8s resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing VulnerabilityThirdPartyK8s Resource
Get an existing VulnerabilityThirdPartyK8s resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: VulnerabilityThirdPartyK8sState, opts?: CustomResourceOptions): VulnerabilityThirdPartyK8s
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
enabled: Optional[bool] = None,
insert_after: Optional[str] = None,
kubernetes_label_conditions: Optional[VulnerabilityThirdPartyK8sKubernetesLabelConditionsArgs] = None,
metadata: Optional[VulnerabilityThirdPartyK8sMetadataArgs] = None,
rule_name: Optional[str] = None,
vulnerability_detection_control: Optional[VulnerabilityThirdPartyK8sVulnerabilityDetectionControlArgs] = None) -> VulnerabilityThirdPartyK8s
func GetVulnerabilityThirdPartyK8s(ctx *Context, name string, id IDInput, state *VulnerabilityThirdPartyK8sState, opts ...ResourceOption) (*VulnerabilityThirdPartyK8s, error)
public static VulnerabilityThirdPartyK8s Get(string name, Input<string> id, VulnerabilityThirdPartyK8sState? state, CustomResourceOptions? opts = null)
public static VulnerabilityThirdPartyK8s get(String name, Output<String> id, VulnerabilityThirdPartyK8sState state, CustomResourceOptions options)
resources: _: type: dynatrace:VulnerabilityThirdPartyK8s get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Enabled bool
- This setting is enabled (
true
) or disabled (false
) - Insert
After string - Because this resource allows for ordering you may specify the ID of the resource instance that comes before this instance regarding order. If not specified when creating the setting will be added to the end of the list. If not specified during update the order will remain untouched
- Kubernetes
Label Pulumiverse.Conditions Dynatrace. Inputs. Vulnerability Third Party K8s Kubernetes Label Conditions - When you add multiple conditions, the rule applies if all conditions apply.
- Metadata
Pulumiverse.
Dynatrace. Inputs. Vulnerability Third Party K8s Metadata - Step 3: Leave comment (optional)
- Rule
Name string - Rule name
- Vulnerability
Detection Pulumiverse.Control Dynatrace. Inputs. Vulnerability Third Party K8s Vulnerability Detection Control - Step 1: Select third-party vulnerability detection behavior
- Enabled bool
- This setting is enabled (
true
) or disabled (false
) - Insert
After string - Because this resource allows for ordering you may specify the ID of the resource instance that comes before this instance regarding order. If not specified when creating the setting will be added to the end of the list. If not specified during update the order will remain untouched
- Kubernetes
Label VulnerabilityConditions Third Party K8s Kubernetes Label Conditions Args - When you add multiple conditions, the rule applies if all conditions apply.
- Metadata
Vulnerability
Third Party K8s Metadata Args - Step 3: Leave comment (optional)
- Rule
Name string - Rule name
- Vulnerability
Detection VulnerabilityControl Third Party K8s Vulnerability Detection Control Args - Step 1: Select third-party vulnerability detection behavior
- enabled Boolean
- This setting is enabled (
true
) or disabled (false
) - insert
After String - Because this resource allows for ordering you may specify the ID of the resource instance that comes before this instance regarding order. If not specified when creating the setting will be added to the end of the list. If not specified during update the order will remain untouched
- kubernetes
Label VulnerabilityConditions Third Party K8s Kubernetes Label Conditions - When you add multiple conditions, the rule applies if all conditions apply.
- metadata
Vulnerability
Third Party K8s Metadata - Step 3: Leave comment (optional)
- rule
Name String - Rule name
- vulnerability
Detection VulnerabilityControl Third Party K8s Vulnerability Detection Control - Step 1: Select third-party vulnerability detection behavior
- enabled boolean
- This setting is enabled (
true
) or disabled (false
) - insert
After string - Because this resource allows for ordering you may specify the ID of the resource instance that comes before this instance regarding order. If not specified when creating the setting will be added to the end of the list. If not specified during update the order will remain untouched
- kubernetes
Label VulnerabilityConditions Third Party K8s Kubernetes Label Conditions - When you add multiple conditions, the rule applies if all conditions apply.
- metadata
Vulnerability
Third Party K8s Metadata - Step 3: Leave comment (optional)
- rule
Name string - Rule name
- vulnerability
Detection VulnerabilityControl Third Party K8s Vulnerability Detection Control - Step 1: Select third-party vulnerability detection behavior
- enabled bool
- This setting is enabled (
true
) or disabled (false
) - insert_
after str - Because this resource allows for ordering you may specify the ID of the resource instance that comes before this instance regarding order. If not specified when creating the setting will be added to the end of the list. If not specified during update the order will remain untouched
- kubernetes_
label_ Vulnerabilityconditions Third Party K8s Kubernetes Label Conditions Args - When you add multiple conditions, the rule applies if all conditions apply.
- metadata
Vulnerability
Third Party K8s Metadata Args - Step 3: Leave comment (optional)
- rule_
name str - Rule name
- vulnerability_
detection_ Vulnerabilitycontrol Third Party K8s Vulnerability Detection Control Args - Step 1: Select third-party vulnerability detection behavior
- enabled Boolean
- This setting is enabled (
true
) or disabled (false
) - insert
After String - Because this resource allows for ordering you may specify the ID of the resource instance that comes before this instance regarding order. If not specified when creating the setting will be added to the end of the list. If not specified during update the order will remain untouched
- kubernetes
Label Property MapConditions - When you add multiple conditions, the rule applies if all conditions apply.
- metadata Property Map
- Step 3: Leave comment (optional)
- rule
Name String - Rule name
- vulnerability
Detection Property MapControl - Step 1: Select third-party vulnerability detection behavior
Supporting Types
VulnerabilityThirdPartyK8sKubernetesLabelConditions, VulnerabilityThirdPartyK8sKubernetesLabelConditionsArgs
VulnerabilityThirdPartyK8sKubernetesLabelConditionsKubernetesLabelCondition, VulnerabilityThirdPartyK8sKubernetesLabelConditionsKubernetesLabelConditionArgs
- Kubernetes
Label stringKey - Kubernetes label key
- Matcher string
- Possible Values:
CONTAINS
,DOES_NOT_CONTAIN
,DOES_NOT_END_WITH
,DOES_NOT_EXIST
,DOES_NOT_START_WITH
,ENDS_WITH
,EQUALS
,EXISTS
,NOT_EQUALS
,STARTS_WITH
- Kubernetes
Label stringValue - Kubernetes label value
- Kubernetes
Label stringKey - Kubernetes label key
- Matcher string
- Possible Values:
CONTAINS
,DOES_NOT_CONTAIN
,DOES_NOT_END_WITH
,DOES_NOT_EXIST
,DOES_NOT_START_WITH
,ENDS_WITH
,EQUALS
,EXISTS
,NOT_EQUALS
,STARTS_WITH
- Kubernetes
Label stringValue - Kubernetes label value
- kubernetes
Label StringKey - Kubernetes label key
- matcher String
- Possible Values:
CONTAINS
,DOES_NOT_CONTAIN
,DOES_NOT_END_WITH
,DOES_NOT_EXIST
,DOES_NOT_START_WITH
,ENDS_WITH
,EQUALS
,EXISTS
,NOT_EQUALS
,STARTS_WITH
- kubernetes
Label StringValue - Kubernetes label value
- kubernetes
Label stringKey - Kubernetes label key
- matcher string
- Possible Values:
CONTAINS
,DOES_NOT_CONTAIN
,DOES_NOT_END_WITH
,DOES_NOT_EXIST
,DOES_NOT_START_WITH
,ENDS_WITH
,EQUALS
,EXISTS
,NOT_EQUALS
,STARTS_WITH
- kubernetes
Label stringValue - Kubernetes label value
- kubernetes_
label_ strkey - Kubernetes label key
- matcher str
- Possible Values:
CONTAINS
,DOES_NOT_CONTAIN
,DOES_NOT_END_WITH
,DOES_NOT_EXIST
,DOES_NOT_START_WITH
,ENDS_WITH
,EQUALS
,EXISTS
,NOT_EQUALS
,STARTS_WITH
- kubernetes_
label_ strvalue - Kubernetes label value
- kubernetes
Label StringKey - Kubernetes label key
- matcher String
- Possible Values:
CONTAINS
,DOES_NOT_CONTAIN
,DOES_NOT_END_WITH
,DOES_NOT_EXIST
,DOES_NOT_START_WITH
,ENDS_WITH
,EQUALS
,EXISTS
,NOT_EQUALS
,STARTS_WITH
- kubernetes
Label StringValue - Kubernetes label value
VulnerabilityThirdPartyK8sMetadata, VulnerabilityThirdPartyK8sMetadataArgs
- Comment string
- no documentation available
- Comment string
- no documentation available
- comment String
- no documentation available
- comment string
- no documentation available
- comment str
- no documentation available
- comment String
- no documentation available
VulnerabilityThirdPartyK8sVulnerabilityDetectionControl, VulnerabilityThirdPartyK8sVulnerabilityDetectionControlArgs
- Monitoring
Mode string - Possible Values:
MONITORING_OFF
,MONITORING_ON
- Monitoring
Mode string - Possible Values:
MONITORING_OFF
,MONITORING_ON
- monitoring
Mode String - Possible Values:
MONITORING_OFF
,MONITORING_ON
- monitoring
Mode string - Possible Values:
MONITORING_OFF
,MONITORING_ON
- monitoring_
mode str - Possible Values:
MONITORING_OFF
,MONITORING_ON
- monitoring
Mode String - Possible Values:
MONITORING_OFF
,MONITORING_ON
Package Details
- Repository
- dynatrace pulumiverse/pulumi-dynatrace
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
dynatrace
Terraform Provider.