1. Packages
  2. Cisco Meraki
  3. API Docs
  4. networks
  5. getApplianceSecurityIntrusion
Cisco Meraki v0.2.10 published on Wednesday, Jul 24, 2024 by Pulumi

meraki.networks.getApplianceSecurityIntrusion

Explore with Pulumi AI

meraki logo
Cisco Meraki v0.2.10 published on Wednesday, Jul 24, 2024 by Pulumi

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as meraki from "@pulumi/meraki";
    
    const example = meraki.networks.getApplianceSecurityIntrusion({
        networkId: "string",
    });
    export const merakiNetworksApplianceSecurityIntrusionExample = example.then(example => example.item);
    
    import pulumi
    import pulumi_meraki as meraki
    
    example = meraki.networks.get_appliance_security_intrusion(network_id="string")
    pulumi.export("merakiNetworksApplianceSecurityIntrusionExample", example.item)
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-meraki/sdk/go/meraki/networks"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		example, err := networks.LookupApplianceSecurityIntrusion(ctx, &networks.LookupApplianceSecurityIntrusionArgs{
    			NetworkId: "string",
    		}, nil)
    		if err != nil {
    			return err
    		}
    		ctx.Export("merakiNetworksApplianceSecurityIntrusionExample", example.Item)
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Meraki = Pulumi.Meraki;
    
    return await Deployment.RunAsync(() => 
    {
        var example = Meraki.Networks.GetApplianceSecurityIntrusion.Invoke(new()
        {
            NetworkId = "string",
        });
    
        return new Dictionary<string, object?>
        {
            ["merakiNetworksApplianceSecurityIntrusionExample"] = example.Apply(getApplianceSecurityIntrusionResult => getApplianceSecurityIntrusionResult.Item),
        };
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.meraki.networks.NetworksFunctions;
    import com.pulumi.meraki.networks.inputs.GetApplianceSecurityIntrusionArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            final var example = NetworksFunctions.getApplianceSecurityIntrusion(GetApplianceSecurityIntrusionArgs.builder()
                .networkId("string")
                .build());
    
            ctx.export("merakiNetworksApplianceSecurityIntrusionExample", example.applyValue(getApplianceSecurityIntrusionResult -> getApplianceSecurityIntrusionResult.item()));
        }
    }
    
    variables:
      example:
        fn::invoke:
          Function: meraki:networks:getApplianceSecurityIntrusion
          Arguments:
            networkId: string
    outputs:
      merakiNetworksApplianceSecurityIntrusionExample: ${example.item}
    

    Using getApplianceSecurityIntrusion

    Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.

    function getApplianceSecurityIntrusion(args: GetApplianceSecurityIntrusionArgs, opts?: InvokeOptions): Promise<GetApplianceSecurityIntrusionResult>
    function getApplianceSecurityIntrusionOutput(args: GetApplianceSecurityIntrusionOutputArgs, opts?: InvokeOptions): Output<GetApplianceSecurityIntrusionResult>
    def get_appliance_security_intrusion(network_id: Optional[str] = None,
                                         opts: Optional[InvokeOptions] = None) -> GetApplianceSecurityIntrusionResult
    def get_appliance_security_intrusion_output(network_id: Optional[pulumi.Input[str]] = None,
                                         opts: Optional[InvokeOptions] = None) -> Output[GetApplianceSecurityIntrusionResult]
    func LookupApplianceSecurityIntrusion(ctx *Context, args *LookupApplianceSecurityIntrusionArgs, opts ...InvokeOption) (*LookupApplianceSecurityIntrusionResult, error)
    func LookupApplianceSecurityIntrusionOutput(ctx *Context, args *LookupApplianceSecurityIntrusionOutputArgs, opts ...InvokeOption) LookupApplianceSecurityIntrusionResultOutput

    > Note: This function is named LookupApplianceSecurityIntrusion in the Go SDK.

    public static class GetApplianceSecurityIntrusion 
    {
        public static Task<GetApplianceSecurityIntrusionResult> InvokeAsync(GetApplianceSecurityIntrusionArgs args, InvokeOptions? opts = null)
        public static Output<GetApplianceSecurityIntrusionResult> Invoke(GetApplianceSecurityIntrusionInvokeArgs args, InvokeOptions? opts = null)
    }
    public static CompletableFuture<GetApplianceSecurityIntrusionResult> getApplianceSecurityIntrusion(GetApplianceSecurityIntrusionArgs args, InvokeOptions options)
    // Output-based functions aren't available in Java yet
    
    fn::invoke:
      function: meraki:networks/getApplianceSecurityIntrusion:getApplianceSecurityIntrusion
      arguments:
        # arguments dictionary

    The following arguments are supported:

    NetworkId string
    networkId path parameter. Network ID
    NetworkId string
    networkId path parameter. Network ID
    networkId String
    networkId path parameter. Network ID
    networkId string
    networkId path parameter. Network ID
    network_id str
    networkId path parameter. Network ID
    networkId String
    networkId path parameter. Network ID

    getApplianceSecurityIntrusion Result

    The following output properties are available:

    Id string
    The provider-assigned unique ID for this managed resource.
    Item GetApplianceSecurityIntrusionItem
    NetworkId string
    networkId path parameter. Network ID
    Id string
    The provider-assigned unique ID for this managed resource.
    Item GetApplianceSecurityIntrusionItem
    NetworkId string
    networkId path parameter. Network ID
    id String
    The provider-assigned unique ID for this managed resource.
    item GetApplianceSecurityIntrusionItem
    networkId String
    networkId path parameter. Network ID
    id string
    The provider-assigned unique ID for this managed resource.
    item GetApplianceSecurityIntrusionItem
    networkId string
    networkId path parameter. Network ID
    id str
    The provider-assigned unique ID for this managed resource.
    item GetApplianceSecurityIntrusionItem
    network_id str
    networkId path parameter. Network ID
    id String
    The provider-assigned unique ID for this managed resource.
    item Property Map
    networkId String
    networkId path parameter. Network ID

    Supporting Types

    GetApplianceSecurityIntrusionItem

    IdsRulesets string
    Intrusion detection ruleset
    Mode string
    Intrusion detection mode
    ProtectedNetworks GetApplianceSecurityIntrusionItemProtectedNetworks
    Networks included in and excluded from the detection engine
    IdsRulesets string
    Intrusion detection ruleset
    Mode string
    Intrusion detection mode
    ProtectedNetworks GetApplianceSecurityIntrusionItemProtectedNetworks
    Networks included in and excluded from the detection engine
    idsRulesets String
    Intrusion detection ruleset
    mode String
    Intrusion detection mode
    protectedNetworks GetApplianceSecurityIntrusionItemProtectedNetworks
    Networks included in and excluded from the detection engine
    idsRulesets string
    Intrusion detection ruleset
    mode string
    Intrusion detection mode
    protectedNetworks GetApplianceSecurityIntrusionItemProtectedNetworks
    Networks included in and excluded from the detection engine
    ids_rulesets str
    Intrusion detection ruleset
    mode str
    Intrusion detection mode
    protected_networks GetApplianceSecurityIntrusionItemProtectedNetworks
    Networks included in and excluded from the detection engine
    idsRulesets String
    Intrusion detection ruleset
    mode String
    Intrusion detection mode
    protectedNetworks Property Map
    Networks included in and excluded from the detection engine

    GetApplianceSecurityIntrusionItemProtectedNetworks

    ExcludedCidrs List<string>
    List of IP addresses or subnets being excluded from protection
    IncludedCidrs List<string>
    List of IP addresses or subnets being protected
    UseDefault bool
    Whether special IPv4 addresses should be used (see: https://tools.ietf.org/html/rfc5735)
    ExcludedCidrs []string
    List of IP addresses or subnets being excluded from protection
    IncludedCidrs []string
    List of IP addresses or subnets being protected
    UseDefault bool
    Whether special IPv4 addresses should be used (see: https://tools.ietf.org/html/rfc5735)
    excludedCidrs List<String>
    List of IP addresses or subnets being excluded from protection
    includedCidrs List<String>
    List of IP addresses or subnets being protected
    useDefault Boolean
    Whether special IPv4 addresses should be used (see: https://tools.ietf.org/html/rfc5735)
    excludedCidrs string[]
    List of IP addresses or subnets being excluded from protection
    includedCidrs string[]
    List of IP addresses or subnets being protected
    useDefault boolean
    Whether special IPv4 addresses should be used (see: https://tools.ietf.org/html/rfc5735)
    excluded_cidrs Sequence[str]
    List of IP addresses or subnets being excluded from protection
    included_cidrs Sequence[str]
    List of IP addresses or subnets being protected
    use_default bool
    Whether special IPv4 addresses should be used (see: https://tools.ietf.org/html/rfc5735)
    excludedCidrs List<String>
    List of IP addresses or subnets being excluded from protection
    includedCidrs List<String>
    List of IP addresses or subnets being protected
    useDefault Boolean
    Whether special IPv4 addresses should be used (see: https://tools.ietf.org/html/rfc5735)

    Package Details

    Repository
    meraki pulumi/pulumi-meraki
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the meraki Terraform Provider.
    meraki logo
    Cisco Meraki v0.2.10 published on Wednesday, Jul 24, 2024 by Pulumi