1. Packages
  2. Sysdig Provider
  3. API Docs
  4. SecureManagedPolicy
sysdig 1.56.0 published on Wednesday, Apr 30, 2025 by sysdiglabs

sysdig.SecureManagedPolicy

Explore with Pulumi AI

sysdig logo
sysdig 1.56.0 published on Wednesday, Apr 30, 2025 by sysdiglabs

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as sysdig from "@pulumi/sysdig";
    
    const emailNotificationChannel = sysdig.getSecureNotificationChannel({
        name: "Test Email Channel",
    });
    const sysdigRuntimeThreatDetection = new sysdig.SecureManagedPolicy("sysdigRuntimeThreatDetection", {
        type: "falco",
        enabled: true,
        runbook: "https://runbook.com",
        scope: "container.id != \"\"",
        disabledRules: ["Hexadecimal string detected"],
        actions: [{
            container: "stop",
            captures: [{
                secondsBeforeEvent: 5,
                secondsAfterEvent: 10,
            }],
        }],
        notificationChannels: [emailNotificationChannel.then(emailNotificationChannel => emailNotificationChannel.id)],
    });
    
    import pulumi
    import pulumi_sysdig as sysdig
    
    email_notification_channel = sysdig.get_secure_notification_channel(name="Test Email Channel")
    sysdig_runtime_threat_detection = sysdig.SecureManagedPolicy("sysdigRuntimeThreatDetection",
        type="falco",
        enabled=True,
        runbook="https://runbook.com",
        scope="container.id != \"\"",
        disabled_rules=["Hexadecimal string detected"],
        actions=[{
            "container": "stop",
            "captures": [{
                "seconds_before_event": 5,
                "seconds_after_event": 10,
            }],
        }],
        notification_channels=[email_notification_channel.id])
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/sysdig"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		emailNotificationChannel, err := sysdig.GetSecureNotificationChannel(ctx, &sysdig.GetSecureNotificationChannelArgs{
    			Name: "Test Email Channel",
    		}, nil)
    		if err != nil {
    			return err
    		}
    		_, err = sysdig.NewSecureManagedPolicy(ctx, "sysdigRuntimeThreatDetection", &sysdig.SecureManagedPolicyArgs{
    			Type:    pulumi.String("falco"),
    			Enabled: pulumi.Bool(true),
    			Runbook: pulumi.String("https://runbook.com"),
    			Scope:   pulumi.String("container.id != \"\""),
    			DisabledRules: pulumi.StringArray{
    				pulumi.String("Hexadecimal string detected"),
    			},
    			Actions: sysdig.SecureManagedPolicyActionArray{
    				&sysdig.SecureManagedPolicyActionArgs{
    					Container: pulumi.String("stop"),
    					Captures: sysdig.SecureManagedPolicyActionCaptureArray{
    						&sysdig.SecureManagedPolicyActionCaptureArgs{
    							SecondsBeforeEvent: pulumi.Float64(5),
    							SecondsAfterEvent:  pulumi.Float64(10),
    						},
    					},
    				},
    			},
    			NotificationChannels: pulumi.Float64Array{
    				pulumi.String(emailNotificationChannel.Id),
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Sysdig = Pulumi.Sysdig;
    
    return await Deployment.RunAsync(() => 
    {
        var emailNotificationChannel = Sysdig.GetSecureNotificationChannel.Invoke(new()
        {
            Name = "Test Email Channel",
        });
    
        var sysdigRuntimeThreatDetection = new Sysdig.SecureManagedPolicy("sysdigRuntimeThreatDetection", new()
        {
            Type = "falco",
            Enabled = true,
            Runbook = "https://runbook.com",
            Scope = "container.id != \"\"",
            DisabledRules = new[]
            {
                "Hexadecimal string detected",
            },
            Actions = new[]
            {
                new Sysdig.Inputs.SecureManagedPolicyActionArgs
                {
                    Container = "stop",
                    Captures = new[]
                    {
                        new Sysdig.Inputs.SecureManagedPolicyActionCaptureArgs
                        {
                            SecondsBeforeEvent = 5,
                            SecondsAfterEvent = 10,
                        },
                    },
                },
            },
            NotificationChannels = new[]
            {
                emailNotificationChannel.Apply(getSecureNotificationChannelResult => getSecureNotificationChannelResult.Id),
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.sysdig.SysdigFunctions;
    import com.pulumi.sysdig.inputs.GetSecureNotificationChannelArgs;
    import com.pulumi.sysdig.SecureManagedPolicy;
    import com.pulumi.sysdig.SecureManagedPolicyArgs;
    import com.pulumi.sysdig.inputs.SecureManagedPolicyActionArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            final var emailNotificationChannel = SysdigFunctions.getSecureNotificationChannel(GetSecureNotificationChannelArgs.builder()
                .name("Test Email Channel")
                .build());
    
            var sysdigRuntimeThreatDetection = new SecureManagedPolicy("sysdigRuntimeThreatDetection", SecureManagedPolicyArgs.builder()
                .type("falco")
                .enabled(true)
                .runbook("https://runbook.com")
                .scope("container.id != \"\"")
                .disabledRules("Hexadecimal string detected")
                .actions(SecureManagedPolicyActionArgs.builder()
                    .container("stop")
                    .captures(SecureManagedPolicyActionCaptureArgs.builder()
                        .secondsBeforeEvent(5)
                        .secondsAfterEvent(10)
                        .build())
                    .build())
                .notificationChannels(emailNotificationChannel.applyValue(getSecureNotificationChannelResult -> getSecureNotificationChannelResult.id()))
                .build());
    
        }
    }
    
    resources:
      sysdigRuntimeThreatDetection:
        type: sysdig:SecureManagedPolicy
        properties:
          type: falco
          enabled: true
          runbook: https://runbook.com
          # Scope selection
          scope: container.id != ""
          # Disabling rules
          disabledRules:
            - Hexadecimal string detected
          actions:
            - container: stop
              captures:
                - secondsBeforeEvent: 5
                  secondsAfterEvent: 10
          notificationChannels:
            - ${emailNotificationChannel.id}
    variables:
      emailNotificationChannel:
        fn::invoke:
          function: sysdig:getSecureNotificationChannel
          arguments:
            name: Test Email Channel
    

    Create SecureManagedPolicy Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new SecureManagedPolicy(name: string, args?: SecureManagedPolicyArgs, opts?: CustomResourceOptions);
    @overload
    def SecureManagedPolicy(resource_name: str,
                            args: Optional[SecureManagedPolicyArgs] = None,
                            opts: Optional[ResourceOptions] = None)
    
    @overload
    def SecureManagedPolicy(resource_name: str,
                            opts: Optional[ResourceOptions] = None,
                            actions: Optional[Sequence[SecureManagedPolicyActionArgs]] = None,
                            disabled_rules: Optional[Sequence[str]] = None,
                            enabled: Optional[bool] = None,
                            name: Optional[str] = None,
                            notification_channels: Optional[Sequence[float]] = None,
                            runbook: Optional[str] = None,
                            scope: Optional[str] = None,
                            secure_managed_policy_id: Optional[str] = None,
                            timeouts: Optional[SecureManagedPolicyTimeoutsArgs] = None,
                            type: Optional[str] = None)
    func NewSecureManagedPolicy(ctx *Context, name string, args *SecureManagedPolicyArgs, opts ...ResourceOption) (*SecureManagedPolicy, error)
    public SecureManagedPolicy(string name, SecureManagedPolicyArgs? args = null, CustomResourceOptions? opts = null)
    public SecureManagedPolicy(String name, SecureManagedPolicyArgs args)
    public SecureManagedPolicy(String name, SecureManagedPolicyArgs args, CustomResourceOptions options)
    
    type: sysdig:SecureManagedPolicy
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args SecureManagedPolicyArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args SecureManagedPolicyArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args SecureManagedPolicyArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args SecureManagedPolicyArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args SecureManagedPolicyArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var secureManagedPolicyResource = new Sysdig.SecureManagedPolicy("secureManagedPolicyResource", new()
    {
        Actions = new[]
        {
            new Sysdig.Inputs.SecureManagedPolicyActionArgs
            {
                Captures = new[]
                {
                    new Sysdig.Inputs.SecureManagedPolicyActionCaptureArgs
                    {
                        Name = "string",
                        SecondsAfterEvent = 0,
                        SecondsBeforeEvent = 0,
                        BucketName = "string",
                        Filter = "string",
                        Folder = "string",
                    },
                },
                Container = "string",
                KillProcess = false,
            },
        },
        DisabledRules = new[]
        {
            "string",
        },
        Enabled = false,
        Name = "string",
        NotificationChannels = new[]
        {
            0,
        },
        Runbook = "string",
        Scope = "string",
        SecureManagedPolicyId = "string",
        Timeouts = new Sysdig.Inputs.SecureManagedPolicyTimeoutsArgs
        {
            Create = "string",
            Delete = "string",
            Read = "string",
            Update = "string",
        },
        Type = "string",
    });
    
    example, err := sysdig.NewSecureManagedPolicy(ctx, "secureManagedPolicyResource", &sysdig.SecureManagedPolicyArgs{
    	Actions: sysdig.SecureManagedPolicyActionArray{
    		&sysdig.SecureManagedPolicyActionArgs{
    			Captures: sysdig.SecureManagedPolicyActionCaptureArray{
    				&sysdig.SecureManagedPolicyActionCaptureArgs{
    					Name:               pulumi.String("string"),
    					SecondsAfterEvent:  pulumi.Float64(0),
    					SecondsBeforeEvent: pulumi.Float64(0),
    					BucketName:         pulumi.String("string"),
    					Filter:             pulumi.String("string"),
    					Folder:             pulumi.String("string"),
    				},
    			},
    			Container:   pulumi.String("string"),
    			KillProcess: pulumi.Bool(false),
    		},
    	},
    	DisabledRules: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	Enabled: pulumi.Bool(false),
    	Name:    pulumi.String("string"),
    	NotificationChannels: pulumi.Float64Array{
    		pulumi.Float64(0),
    	},
    	Runbook:               pulumi.String("string"),
    	Scope:                 pulumi.String("string"),
    	SecureManagedPolicyId: pulumi.String("string"),
    	Timeouts: &sysdig.SecureManagedPolicyTimeoutsArgs{
    		Create: pulumi.String("string"),
    		Delete: pulumi.String("string"),
    		Read:   pulumi.String("string"),
    		Update: pulumi.String("string"),
    	},
    	Type: pulumi.String("string"),
    })
    
    var secureManagedPolicyResource = new SecureManagedPolicy("secureManagedPolicyResource", SecureManagedPolicyArgs.builder()
        .actions(SecureManagedPolicyActionArgs.builder()
            .captures(SecureManagedPolicyActionCaptureArgs.builder()
                .name("string")
                .secondsAfterEvent(0)
                .secondsBeforeEvent(0)
                .bucketName("string")
                .filter("string")
                .folder("string")
                .build())
            .container("string")
            .killProcess(false)
            .build())
        .disabledRules("string")
        .enabled(false)
        .name("string")
        .notificationChannels(0)
        .runbook("string")
        .scope("string")
        .secureManagedPolicyId("string")
        .timeouts(SecureManagedPolicyTimeoutsArgs.builder()
            .create("string")
            .delete("string")
            .read("string")
            .update("string")
            .build())
        .type("string")
        .build());
    
    secure_managed_policy_resource = sysdig.SecureManagedPolicy("secureManagedPolicyResource",
        actions=[{
            "captures": [{
                "name": "string",
                "seconds_after_event": 0,
                "seconds_before_event": 0,
                "bucket_name": "string",
                "filter": "string",
                "folder": "string",
            }],
            "container": "string",
            "kill_process": False,
        }],
        disabled_rules=["string"],
        enabled=False,
        name="string",
        notification_channels=[0],
        runbook="string",
        scope="string",
        secure_managed_policy_id="string",
        timeouts={
            "create": "string",
            "delete": "string",
            "read": "string",
            "update": "string",
        },
        type="string")
    
    const secureManagedPolicyResource = new sysdig.SecureManagedPolicy("secureManagedPolicyResource", {
        actions: [{
            captures: [{
                name: "string",
                secondsAfterEvent: 0,
                secondsBeforeEvent: 0,
                bucketName: "string",
                filter: "string",
                folder: "string",
            }],
            container: "string",
            killProcess: false,
        }],
        disabledRules: ["string"],
        enabled: false,
        name: "string",
        notificationChannels: [0],
        runbook: "string",
        scope: "string",
        secureManagedPolicyId: "string",
        timeouts: {
            create: "string",
            "delete": "string",
            read: "string",
            update: "string",
        },
        type: "string",
    });
    
    type: sysdig:SecureManagedPolicy
    properties:
        actions:
            - captures:
                - bucketName: string
                  filter: string
                  folder: string
                  name: string
                  secondsAfterEvent: 0
                  secondsBeforeEvent: 0
              container: string
              killProcess: false
        disabledRules:
            - string
        enabled: false
        name: string
        notificationChannels:
            - 0
        runbook: string
        scope: string
        secureManagedPolicyId: string
        timeouts:
            create: string
            delete: string
            read: string
            update: string
        type: string
    

    SecureManagedPolicy Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The SecureManagedPolicy resource accepts the following input properties:

    Actions List<SecureManagedPolicyAction>
    DisabledRules List<string>
    Enabled bool
    Will secure process with this policy?. By default this is true.
    Name string
    The name of the Secure managed policy. It must match the name of an existing managed policy.
    NotificationChannels List<double>
    Runbook string
    Customer provided url that provides a runbook for a given policy.


    Scope string
    SecureManagedPolicyId string
    Timeouts SecureManagedPolicyTimeouts
    Type string
    Specifies the type of the runtime policy. Must be one of: falco, list_matching, k8s_audit, aws_cloudtrail, gcp_auditlog, azure_platformlogs, awscloudtrail, okta, github, guardduty. By default it is falco.
    Actions []SecureManagedPolicyActionArgs
    DisabledRules []string
    Enabled bool
    Will secure process with this policy?. By default this is true.
    Name string
    The name of the Secure managed policy. It must match the name of an existing managed policy.
    NotificationChannels []float64
    Runbook string
    Customer provided url that provides a runbook for a given policy.


    Scope string
    SecureManagedPolicyId string
    Timeouts SecureManagedPolicyTimeoutsArgs
    Type string
    Specifies the type of the runtime policy. Must be one of: falco, list_matching, k8s_audit, aws_cloudtrail, gcp_auditlog, azure_platformlogs, awscloudtrail, okta, github, guardduty. By default it is falco.
    actions List<SecureManagedPolicyAction>
    disabledRules List<String>
    enabled Boolean
    Will secure process with this policy?. By default this is true.
    name String
    The name of the Secure managed policy. It must match the name of an existing managed policy.
    notificationChannels List<Double>
    runbook String
    Customer provided url that provides a runbook for a given policy.


    scope String
    secureManagedPolicyId String
    timeouts SecureManagedPolicyTimeouts
    type String
    Specifies the type of the runtime policy. Must be one of: falco, list_matching, k8s_audit, aws_cloudtrail, gcp_auditlog, azure_platformlogs, awscloudtrail, okta, github, guardduty. By default it is falco.
    actions SecureManagedPolicyAction[]
    disabledRules string[]
    enabled boolean
    Will secure process with this policy?. By default this is true.
    name string
    The name of the Secure managed policy. It must match the name of an existing managed policy.
    notificationChannels number[]
    runbook string
    Customer provided url that provides a runbook for a given policy.


    scope string
    secureManagedPolicyId string
    timeouts SecureManagedPolicyTimeouts
    type string
    Specifies the type of the runtime policy. Must be one of: falco, list_matching, k8s_audit, aws_cloudtrail, gcp_auditlog, azure_platformlogs, awscloudtrail, okta, github, guardduty. By default it is falco.
    actions Sequence[SecureManagedPolicyActionArgs]
    disabled_rules Sequence[str]
    enabled bool
    Will secure process with this policy?. By default this is true.
    name str
    The name of the Secure managed policy. It must match the name of an existing managed policy.
    notification_channels Sequence[float]
    runbook str
    Customer provided url that provides a runbook for a given policy.


    scope str
    secure_managed_policy_id str
    timeouts SecureManagedPolicyTimeoutsArgs
    type str
    Specifies the type of the runtime policy. Must be one of: falco, list_matching, k8s_audit, aws_cloudtrail, gcp_auditlog, azure_platformlogs, awscloudtrail, okta, github, guardduty. By default it is falco.
    actions List<Property Map>
    disabledRules List<String>
    enabled Boolean
    Will secure process with this policy?. By default this is true.
    name String
    The name of the Secure managed policy. It must match the name of an existing managed policy.
    notificationChannels List<Number>
    runbook String
    Customer provided url that provides a runbook for a given policy.


    scope String
    secureManagedPolicyId String
    timeouts Property Map
    type String
    Specifies the type of the runtime policy. Must be one of: falco, list_matching, k8s_audit, aws_cloudtrail, gcp_auditlog, azure_platformlogs, awscloudtrail, okta, github, guardduty. By default it is falco.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the SecureManagedPolicy resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Version double
    Id string
    The provider-assigned unique ID for this managed resource.
    Version float64
    id String
    The provider-assigned unique ID for this managed resource.
    version Double
    id string
    The provider-assigned unique ID for this managed resource.
    version number
    id str
    The provider-assigned unique ID for this managed resource.
    version float
    id String
    The provider-assigned unique ID for this managed resource.
    version Number

    Look up Existing SecureManagedPolicy Resource

    Get an existing SecureManagedPolicy resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: SecureManagedPolicyState, opts?: CustomResourceOptions): SecureManagedPolicy
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            actions: Optional[Sequence[SecureManagedPolicyActionArgs]] = None,
            disabled_rules: Optional[Sequence[str]] = None,
            enabled: Optional[bool] = None,
            name: Optional[str] = None,
            notification_channels: Optional[Sequence[float]] = None,
            runbook: Optional[str] = None,
            scope: Optional[str] = None,
            secure_managed_policy_id: Optional[str] = None,
            timeouts: Optional[SecureManagedPolicyTimeoutsArgs] = None,
            type: Optional[str] = None,
            version: Optional[float] = None) -> SecureManagedPolicy
    func GetSecureManagedPolicy(ctx *Context, name string, id IDInput, state *SecureManagedPolicyState, opts ...ResourceOption) (*SecureManagedPolicy, error)
    public static SecureManagedPolicy Get(string name, Input<string> id, SecureManagedPolicyState? state, CustomResourceOptions? opts = null)
    public static SecureManagedPolicy get(String name, Output<String> id, SecureManagedPolicyState state, CustomResourceOptions options)
    resources:  _:    type: sysdig:SecureManagedPolicy    get:      id: ${id}
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    Actions List<SecureManagedPolicyAction>
    DisabledRules List<string>
    Enabled bool
    Will secure process with this policy?. By default this is true.
    Name string
    The name of the Secure managed policy. It must match the name of an existing managed policy.
    NotificationChannels List<double>
    Runbook string
    Customer provided url that provides a runbook for a given policy.


    Scope string
    SecureManagedPolicyId string
    Timeouts SecureManagedPolicyTimeouts
    Type string
    Specifies the type of the runtime policy. Must be one of: falco, list_matching, k8s_audit, aws_cloudtrail, gcp_auditlog, azure_platformlogs, awscloudtrail, okta, github, guardduty. By default it is falco.
    Version double
    Actions []SecureManagedPolicyActionArgs
    DisabledRules []string
    Enabled bool
    Will secure process with this policy?. By default this is true.
    Name string
    The name of the Secure managed policy. It must match the name of an existing managed policy.
    NotificationChannels []float64
    Runbook string
    Customer provided url that provides a runbook for a given policy.


    Scope string
    SecureManagedPolicyId string
    Timeouts SecureManagedPolicyTimeoutsArgs
    Type string
    Specifies the type of the runtime policy. Must be one of: falco, list_matching, k8s_audit, aws_cloudtrail, gcp_auditlog, azure_platformlogs, awscloudtrail, okta, github, guardduty. By default it is falco.
    Version float64
    actions List<SecureManagedPolicyAction>
    disabledRules List<String>
    enabled Boolean
    Will secure process with this policy?. By default this is true.
    name String
    The name of the Secure managed policy. It must match the name of an existing managed policy.
    notificationChannels List<Double>
    runbook String
    Customer provided url that provides a runbook for a given policy.


    scope String
    secureManagedPolicyId String
    timeouts SecureManagedPolicyTimeouts
    type String
    Specifies the type of the runtime policy. Must be one of: falco, list_matching, k8s_audit, aws_cloudtrail, gcp_auditlog, azure_platformlogs, awscloudtrail, okta, github, guardduty. By default it is falco.
    version Double
    actions SecureManagedPolicyAction[]
    disabledRules string[]
    enabled boolean
    Will secure process with this policy?. By default this is true.
    name string
    The name of the Secure managed policy. It must match the name of an existing managed policy.
    notificationChannels number[]
    runbook string
    Customer provided url that provides a runbook for a given policy.


    scope string
    secureManagedPolicyId string
    timeouts SecureManagedPolicyTimeouts
    type string
    Specifies the type of the runtime policy. Must be one of: falco, list_matching, k8s_audit, aws_cloudtrail, gcp_auditlog, azure_platformlogs, awscloudtrail, okta, github, guardduty. By default it is falco.
    version number
    actions Sequence[SecureManagedPolicyActionArgs]
    disabled_rules Sequence[str]
    enabled bool
    Will secure process with this policy?. By default this is true.
    name str
    The name of the Secure managed policy. It must match the name of an existing managed policy.
    notification_channels Sequence[float]
    runbook str
    Customer provided url that provides a runbook for a given policy.


    scope str
    secure_managed_policy_id str
    timeouts SecureManagedPolicyTimeoutsArgs
    type str
    Specifies the type of the runtime policy. Must be one of: falco, list_matching, k8s_audit, aws_cloudtrail, gcp_auditlog, azure_platformlogs, awscloudtrail, okta, github, guardduty. By default it is falco.
    version float
    actions List<Property Map>
    disabledRules List<String>
    enabled Boolean
    Will secure process with this policy?. By default this is true.
    name String
    The name of the Secure managed policy. It must match the name of an existing managed policy.
    notificationChannels List<Number>
    runbook String
    Customer provided url that provides a runbook for a given policy.


    scope String
    secureManagedPolicyId String
    timeouts Property Map
    type String
    Specifies the type of the runtime policy. Must be one of: falco, list_matching, k8s_audit, aws_cloudtrail, gcp_auditlog, azure_platformlogs, awscloudtrail, okta, github, guardduty. By default it is falco.
    version Number

    Supporting Types

    SecureManagedPolicyAction, SecureManagedPolicyActionArgs

    Captures List<SecureManagedPolicyActionCapture>
    Captures with Sysdig the stream of system calls:
    Container string
    The action applied to container when this Policy is triggered. Can be stop, pause or kill. If this is not specified, no action will be applied at the container level.
    KillProcess bool
    Captures []SecureManagedPolicyActionCapture
    Captures with Sysdig the stream of system calls:
    Container string
    The action applied to container when this Policy is triggered. Can be stop, pause or kill. If this is not specified, no action will be applied at the container level.
    KillProcess bool
    captures List<SecureManagedPolicyActionCapture>
    Captures with Sysdig the stream of system calls:
    container String
    The action applied to container when this Policy is triggered. Can be stop, pause or kill. If this is not specified, no action will be applied at the container level.
    killProcess Boolean
    captures SecureManagedPolicyActionCapture[]
    Captures with Sysdig the stream of system calls:
    container string
    The action applied to container when this Policy is triggered. Can be stop, pause or kill. If this is not specified, no action will be applied at the container level.
    killProcess boolean
    captures Sequence[SecureManagedPolicyActionCapture]
    Captures with Sysdig the stream of system calls:
    container str
    The action applied to container when this Policy is triggered. Can be stop, pause or kill. If this is not specified, no action will be applied at the container level.
    kill_process bool
    captures List<Property Map>
    Captures with Sysdig the stream of system calls:
    container String
    The action applied to container when this Policy is triggered. Can be stop, pause or kill. If this is not specified, no action will be applied at the container level.
    killProcess Boolean

    SecureManagedPolicyActionCapture, SecureManagedPolicyActionCaptureArgs

    Name string
    The name of the Secure managed policy. It must match the name of an existing managed policy.
    SecondsAfterEvent double
    Captures the system calls for the amount of seconds after the policy was triggered.
    SecondsBeforeEvent double
    Captures the system calls during the amount of seconds before the policy was triggered.
    BucketName string
    Custom bucket to store capture in, bucket should be onboarded in Integrations > S3 Capture Storage. Default is to use Sysdig Secure Storage
    Filter string
    Additional filter to apply to the capture. For example: proc.name=cat
    Folder string
    Name of folder to store capture inside the bucket. By default we will store the capture file at the root of the bucket


    Name string
    The name of the Secure managed policy. It must match the name of an existing managed policy.
    SecondsAfterEvent float64
    Captures the system calls for the amount of seconds after the policy was triggered.
    SecondsBeforeEvent float64
    Captures the system calls during the amount of seconds before the policy was triggered.
    BucketName string
    Custom bucket to store capture in, bucket should be onboarded in Integrations > S3 Capture Storage. Default is to use Sysdig Secure Storage
    Filter string
    Additional filter to apply to the capture. For example: proc.name=cat
    Folder string
    Name of folder to store capture inside the bucket. By default we will store the capture file at the root of the bucket


    name String
    The name of the Secure managed policy. It must match the name of an existing managed policy.
    secondsAfterEvent Double
    Captures the system calls for the amount of seconds after the policy was triggered.
    secondsBeforeEvent Double
    Captures the system calls during the amount of seconds before the policy was triggered.
    bucketName String
    Custom bucket to store capture in, bucket should be onboarded in Integrations > S3 Capture Storage. Default is to use Sysdig Secure Storage
    filter String
    Additional filter to apply to the capture. For example: proc.name=cat
    folder String
    Name of folder to store capture inside the bucket. By default we will store the capture file at the root of the bucket


    name string
    The name of the Secure managed policy. It must match the name of an existing managed policy.
    secondsAfterEvent number
    Captures the system calls for the amount of seconds after the policy was triggered.
    secondsBeforeEvent number
    Captures the system calls during the amount of seconds before the policy was triggered.
    bucketName string
    Custom bucket to store capture in, bucket should be onboarded in Integrations > S3 Capture Storage. Default is to use Sysdig Secure Storage
    filter string
    Additional filter to apply to the capture. For example: proc.name=cat
    folder string
    Name of folder to store capture inside the bucket. By default we will store the capture file at the root of the bucket


    name str
    The name of the Secure managed policy. It must match the name of an existing managed policy.
    seconds_after_event float
    Captures the system calls for the amount of seconds after the policy was triggered.
    seconds_before_event float
    Captures the system calls during the amount of seconds before the policy was triggered.
    bucket_name str
    Custom bucket to store capture in, bucket should be onboarded in Integrations > S3 Capture Storage. Default is to use Sysdig Secure Storage
    filter str
    Additional filter to apply to the capture. For example: proc.name=cat
    folder str
    Name of folder to store capture inside the bucket. By default we will store the capture file at the root of the bucket


    name String
    The name of the Secure managed policy. It must match the name of an existing managed policy.
    secondsAfterEvent Number
    Captures the system calls for the amount of seconds after the policy was triggered.
    secondsBeforeEvent Number
    Captures the system calls during the amount of seconds before the policy was triggered.
    bucketName String
    Custom bucket to store capture in, bucket should be onboarded in Integrations > S3 Capture Storage. Default is to use Sysdig Secure Storage
    filter String
    Additional filter to apply to the capture. For example: proc.name=cat
    folder String
    Name of folder to store capture inside the bucket. By default we will store the capture file at the root of the bucket


    SecureManagedPolicyTimeouts, SecureManagedPolicyTimeoutsArgs

    Create string
    Delete string
    Read string
    Update string
    Create string
    Delete string
    Read string
    Update string
    create String
    delete String
    read String
    update String
    create string
    delete string
    read string
    update string
    create str
    delete str
    read str
    update str
    create String
    delete String
    read String
    update String

    Package Details

    Repository
    sysdig sysdiglabs/terraform-provider-sysdig
    License
    Notes
    This Pulumi package is based on the sysdig Terraform Provider.
    sysdig logo
    sysdig 1.56.0 published on Wednesday, Apr 30, 2025 by sysdiglabs