Viewing docs for Cisco Meraki v0.4.6
published on Thursday, Feb 26, 2026 by Pulumi
published on Thursday, Feb 26, 2026 by Pulumi
Viewing docs for Cisco Meraki v0.4.6
published on Thursday, Feb 26, 2026 by Pulumi
published on Thursday, Feb 26, 2026 by Pulumi
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as meraki from "@pulumi/meraki";
const example = meraki.networks.getApplianceSecurityIntrusion({
networkId: "string",
});
export const merakiNetworksApplianceSecurityIntrusionExample = example.then(example => example.item);
import pulumi
import pulumi_meraki as meraki
example = meraki.networks.get_appliance_security_intrusion(network_id="string")
pulumi.export("merakiNetworksApplianceSecurityIntrusionExample", example.item)
package main
import (
"github.com/pulumi/pulumi-meraki/sdk/go/meraki/networks"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
example, err := networks.LookupApplianceSecurityIntrusion(ctx, &networks.LookupApplianceSecurityIntrusionArgs{
NetworkId: "string",
}, nil)
if err != nil {
return err
}
ctx.Export("merakiNetworksApplianceSecurityIntrusionExample", example.Item)
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Meraki = Pulumi.Meraki;
return await Deployment.RunAsync(() =>
{
var example = Meraki.Networks.GetApplianceSecurityIntrusion.Invoke(new()
{
NetworkId = "string",
});
return new Dictionary<string, object?>
{
["merakiNetworksApplianceSecurityIntrusionExample"] = example.Apply(getApplianceSecurityIntrusionResult => getApplianceSecurityIntrusionResult.Item),
};
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.meraki.networks.NetworksFunctions;
import com.pulumi.meraki.networks.inputs.GetApplianceSecurityIntrusionArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var example = NetworksFunctions.getApplianceSecurityIntrusion(GetApplianceSecurityIntrusionArgs.builder()
.networkId("string")
.build());
ctx.export("merakiNetworksApplianceSecurityIntrusionExample", example.item());
}
}
variables:
example:
fn::invoke:
function: meraki:networks:getApplianceSecurityIntrusion
arguments:
networkId: string
outputs:
merakiNetworksApplianceSecurityIntrusionExample: ${example.item}
Using getApplianceSecurityIntrusion
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getApplianceSecurityIntrusion(args: GetApplianceSecurityIntrusionArgs, opts?: InvokeOptions): Promise<GetApplianceSecurityIntrusionResult>
function getApplianceSecurityIntrusionOutput(args: GetApplianceSecurityIntrusionOutputArgs, opts?: InvokeOptions): Output<GetApplianceSecurityIntrusionResult>def get_appliance_security_intrusion(network_id: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetApplianceSecurityIntrusionResult
def get_appliance_security_intrusion_output(network_id: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetApplianceSecurityIntrusionResult]func LookupApplianceSecurityIntrusion(ctx *Context, args *LookupApplianceSecurityIntrusionArgs, opts ...InvokeOption) (*LookupApplianceSecurityIntrusionResult, error)
func LookupApplianceSecurityIntrusionOutput(ctx *Context, args *LookupApplianceSecurityIntrusionOutputArgs, opts ...InvokeOption) LookupApplianceSecurityIntrusionResultOutput> Note: This function is named LookupApplianceSecurityIntrusion in the Go SDK.
public static class GetApplianceSecurityIntrusion
{
public static Task<GetApplianceSecurityIntrusionResult> InvokeAsync(GetApplianceSecurityIntrusionArgs args, InvokeOptions? opts = null)
public static Output<GetApplianceSecurityIntrusionResult> Invoke(GetApplianceSecurityIntrusionInvokeArgs args, InvokeOptions? opts = null)
}public static CompletableFuture<GetApplianceSecurityIntrusionResult> getApplianceSecurityIntrusion(GetApplianceSecurityIntrusionArgs args, InvokeOptions options)
public static Output<GetApplianceSecurityIntrusionResult> getApplianceSecurityIntrusion(GetApplianceSecurityIntrusionArgs args, InvokeOptions options)
fn::invoke:
function: meraki:networks/getApplianceSecurityIntrusion:getApplianceSecurityIntrusion
arguments:
# arguments dictionaryThe following arguments are supported:
- Network
Id string - networkId path parameter. Network ID
- Network
Id string - networkId path parameter. Network ID
- network
Id String - networkId path parameter. Network ID
- network
Id string - networkId path parameter. Network ID
- network_
id str - networkId path parameter. Network ID
- network
Id String - networkId path parameter. Network ID
getApplianceSecurityIntrusion Result
The following output properties are available:
- Id string
- The provider-assigned unique ID for this managed resource.
- Item
Get
Appliance Security Intrusion Item - Network
Id string - networkId path parameter. Network ID
- Id string
- The provider-assigned unique ID for this managed resource.
- Item
Get
Appliance Security Intrusion Item - Network
Id string - networkId path parameter. Network ID
- id String
- The provider-assigned unique ID for this managed resource.
- item
Get
Appliance Security Intrusion Item - network
Id String - networkId path parameter. Network ID
- id string
- The provider-assigned unique ID for this managed resource.
- item
Get
Appliance Security Intrusion Item - network
Id string - networkId path parameter. Network ID
- id str
- The provider-assigned unique ID for this managed resource.
- item
Get
Appliance Security Intrusion Item - network_
id str - networkId path parameter. Network ID
- id String
- The provider-assigned unique ID for this managed resource.
- item Property Map
- network
Id String - networkId path parameter. Network ID
Supporting Types
GetApplianceSecurityIntrusionItem
- Ids
Rulesets string - Intrusion detection ruleset
- Mode string
- Intrusion detection mode
- Protected
Networks GetAppliance Security Intrusion Item Protected Networks - Networks included in and excluded from the detection engine
- Ids
Rulesets string - Intrusion detection ruleset
- Mode string
- Intrusion detection mode
- Protected
Networks GetAppliance Security Intrusion Item Protected Networks - Networks included in and excluded from the detection engine
- ids
Rulesets String - Intrusion detection ruleset
- mode String
- Intrusion detection mode
- protected
Networks GetAppliance Security Intrusion Item Protected Networks - Networks included in and excluded from the detection engine
- ids
Rulesets string - Intrusion detection ruleset
- mode string
- Intrusion detection mode
- protected
Networks GetAppliance Security Intrusion Item Protected Networks - Networks included in and excluded from the detection engine
- ids_
rulesets str - Intrusion detection ruleset
- mode str
- Intrusion detection mode
- protected_
networks GetAppliance Security Intrusion Item Protected Networks - Networks included in and excluded from the detection engine
- ids
Rulesets String - Intrusion detection ruleset
- mode String
- Intrusion detection mode
- protected
Networks Property Map - Networks included in and excluded from the detection engine
GetApplianceSecurityIntrusionItemProtectedNetworks
- Excluded
Cidrs List<string> - List of IP addresses or subnets being excluded from protection
- Included
Cidrs List<string> - List of IP addresses or subnets being protected
- Use
Default bool - Whether special IPv4 addresses should be used (see: https://tools.ietf.org/html/rfc5735)
- Excluded
Cidrs []string - List of IP addresses or subnets being excluded from protection
- Included
Cidrs []string - List of IP addresses or subnets being protected
- Use
Default bool - Whether special IPv4 addresses should be used (see: https://tools.ietf.org/html/rfc5735)
- excluded
Cidrs List<String> - List of IP addresses or subnets being excluded from protection
- included
Cidrs List<String> - List of IP addresses or subnets being protected
- use
Default Boolean - Whether special IPv4 addresses should be used (see: https://tools.ietf.org/html/rfc5735)
- excluded
Cidrs string[] - List of IP addresses or subnets being excluded from protection
- included
Cidrs string[] - List of IP addresses or subnets being protected
- use
Default boolean - Whether special IPv4 addresses should be used (see: https://tools.ietf.org/html/rfc5735)
- excluded_
cidrs Sequence[str] - List of IP addresses or subnets being excluded from protection
- included_
cidrs Sequence[str] - List of IP addresses or subnets being protected
- use_
default bool - Whether special IPv4 addresses should be used (see: https://tools.ietf.org/html/rfc5735)
- excluded
Cidrs List<String> - List of IP addresses or subnets being excluded from protection
- included
Cidrs List<String> - List of IP addresses or subnets being protected
- use
Default Boolean - Whether special IPv4 addresses should be used (see: https://tools.ietf.org/html/rfc5735)
Package Details
- Repository
- meraki pulumi/pulumi-meraki
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
merakiTerraform Provider.
Viewing docs for Cisco Meraki v0.4.6
published on Thursday, Feb 26, 2026 by Pulumi
published on Thursday, Feb 26, 2026 by Pulumi
