All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.pulumi.azurenative.securityinsights.ThreatIntelligenceIndicator Maven / Gradle / Ivy

There is a newer version: 2.82.0
Show newest version
// *** WARNING: this file was generated by pulumi-java-gen. ***
// *** Do not edit by hand unless you're certain you know what you are doing! ***

package com.pulumi.azurenative.securityinsights;

import com.pulumi.azurenative.Utilities;
import com.pulumi.azurenative.securityinsights.ThreatIntelligenceIndicatorArgs;
import com.pulumi.azurenative.securityinsights.outputs.SystemDataResponse;
import com.pulumi.core.Alias;
import com.pulumi.core.Output;
import com.pulumi.core.annotations.Export;
import com.pulumi.core.annotations.ResourceType;
import com.pulumi.core.internal.Codegen;
import java.lang.String;
import java.util.List;
import java.util.Optional;
import javax.annotation.Nullable;

/**
 * Threat intelligence information object.
 * Azure REST API version: 2023-02-01. Prior API version in Azure Native 1.x: 2019-01-01-preview.
 * 
 * Other available API versions: 2021-04-01, 2021-09-01-preview, 2023-06-01-preview, 2023-07-01-preview, 2023-08-01-preview, 2023-09-01-preview, 2023-10-01-preview, 2023-11-01, 2023-12-01-preview, 2024-01-01-preview, 2024-03-01, 2024-04-01-preview.
 * 
 * ## Example Usage
 * ### Update a threat Intelligence indicator
 * 
 * 
 * {@code
 * package generated_program;
 * 
 * import com.pulumi.Context;
 * import com.pulumi.Pulumi;
 * import com.pulumi.core.Output;
 * import com.pulumi.azurenative.securityinsights.ThreatIntelligenceIndicator;
 * import com.pulumi.azurenative.securityinsights.ThreatIntelligenceIndicatorArgs;
 * import java.util.List;
 * import java.util.ArrayList;
 * import java.util.Map;
 * import java.io.File;
 * import java.nio.file.Files;
 * import java.nio.file.Paths;
 * 
 * public class App }{{@code
 *     public static void main(String[] args) }{{@code
 *         Pulumi.run(App::stack);
 *     }}{@code
 * 
 *     public static void stack(Context ctx) }{{@code
 *         var threatIntelligenceIndicator = new ThreatIntelligenceIndicator("threatIntelligenceIndicator", ThreatIntelligenceIndicatorArgs.builder()
 *             .confidence(78)
 *             .createdByRef("contoso}{@literal @}{@code contoso.com")
 *             .description("debugging indicators")
 *             .displayName("new schema")
 *             .externalReferences()
 *             .granularMarkings()
 *             .killChainPhases()
 *             .kind("indicator")
 *             .labels()
 *             .modified("")
 *             .name("d9cd6f0b-96b9-3984-17cd-a779d1e15a93")
 *             .pattern("[url:value = 'https://www.contoso.com']")
 *             .patternType("url")
 *             .resourceGroupName("myRg")
 *             .revoked(false)
 *             .source("Azure Sentinel")
 *             .threatIntelligenceTags("new schema")
 *             .threatTypes("compromised")
 *             .validFrom("2020-04-15T17:44:00.114052Z")
 *             .validUntil("")
 *             .workspaceName("myWorkspace")
 *             .build());
 * 
 *     }}{@code
 * }}{@code
 * 
 * }
 * 
* * ## Import * * An existing resource can be imported using its type token, name, and identifier, e.g. * * ```sh * $ pulumi import azure-native:securityinsights:ThreatIntelligenceIndicator 180105c7-a28d-b1a2-4a78-234f6ec80fd6 /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.OperationalInsights/workspaces/{workspaceName}/providers/Microsoft.SecurityInsights/threatIntelligence/main/indicators/{name} * ``` * */ @ResourceType(type="azure-native:securityinsights:ThreatIntelligenceIndicator") public class ThreatIntelligenceIndicator extends com.pulumi.resources.CustomResource { /** * Etag of the azure resource * */ @Export(name="etag", refs={String.class}, tree="[0]") private Output etag; /** * @return Etag of the azure resource * */ public Output> etag() { return Codegen.optional(this.etag); } /** * The kind of the entity. * */ @Export(name="kind", refs={String.class}, tree="[0]") private Output kind; /** * @return The kind of the entity. * */ public Output kind() { return this.kind; } /** * The name of the resource * */ @Export(name="name", refs={String.class}, tree="[0]") private Output name; /** * @return The name of the resource * */ public Output name() { return this.name; } /** * Azure Resource Manager metadata containing createdBy and modifiedBy information. * */ @Export(name="systemData", refs={SystemDataResponse.class}, tree="[0]") private Output systemData; /** * @return Azure Resource Manager metadata containing createdBy and modifiedBy information. * */ public Output systemData() { return this.systemData; } /** * The type of the resource. E.g. "Microsoft.Compute/virtualMachines" or "Microsoft.Storage/storageAccounts" * */ @Export(name="type", refs={String.class}, tree="[0]") private Output type; /** * @return The type of the resource. E.g. "Microsoft.Compute/virtualMachines" or "Microsoft.Storage/storageAccounts" * */ public Output type() { return this.type; } /** * * @param name The _unique_ name of the resulting resource. */ public ThreatIntelligenceIndicator(java.lang.String name) { this(name, ThreatIntelligenceIndicatorArgs.Empty); } /** * * @param name The _unique_ name of the resulting resource. * @param args The arguments to use to populate this resource's properties. */ public ThreatIntelligenceIndicator(java.lang.String name, ThreatIntelligenceIndicatorArgs args) { this(name, args, null); } /** * * @param name The _unique_ name of the resulting resource. * @param args The arguments to use to populate this resource's properties. * @param options A bag of options that control this resource's behavior. */ public ThreatIntelligenceIndicator(java.lang.String name, ThreatIntelligenceIndicatorArgs args, @Nullable com.pulumi.resources.CustomResourceOptions options) { super("azure-native:securityinsights:ThreatIntelligenceIndicator", name, makeArgs(args, options), makeResourceOptions(options, Codegen.empty()), false); } private ThreatIntelligenceIndicator(java.lang.String name, Output id, @Nullable com.pulumi.resources.CustomResourceOptions options) { super("azure-native:securityinsights:ThreatIntelligenceIndicator", name, null, makeResourceOptions(options, id), false); } private static ThreatIntelligenceIndicatorArgs makeArgs(ThreatIntelligenceIndicatorArgs args, @Nullable com.pulumi.resources.CustomResourceOptions options) { if (options != null && options.getUrn().isPresent()) { return null; } var builder = args == null ? ThreatIntelligenceIndicatorArgs.builder() : ThreatIntelligenceIndicatorArgs.builder(args); return builder .kind("indicator") .build(); } private static com.pulumi.resources.CustomResourceOptions makeResourceOptions(@Nullable com.pulumi.resources.CustomResourceOptions options, @Nullable Output id) { var defaultOptions = com.pulumi.resources.CustomResourceOptions.builder() .version(Utilities.getVersion()) .aliases(List.of( Output.of(Alias.builder().type("azure-native:securityinsights/v20190101preview:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20210401:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20210901preview:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20211001:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20211001preview:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20220101preview:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20220401preview:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20220501preview:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20220601preview:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20220701preview:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20220801:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20220801preview:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20220901preview:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20221001preview:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20221101:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20221101preview:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20221201preview:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20230201:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20230201preview:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20230301preview:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20230401preview:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20230501preview:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20230601preview:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20230701preview:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20230801preview:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20230901preview:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20231001preview:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20231101:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20231201preview:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20240101preview:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20240301:ThreatIntelligenceIndicator").build()), Output.of(Alias.builder().type("azure-native:securityinsights/v20240401preview:ThreatIntelligenceIndicator").build()) )) .build(); return com.pulumi.resources.CustomResourceOptions.merge(defaultOptions, options, id); } /** * Get an existing Host resource's state with the given name, ID, and optional extra * properties used to qualify the lookup. * * @param name The _unique_ name of the resulting resource. * @param id The _unique_ provider ID of the resource to lookup. * @param options Optional settings to control the behavior of the CustomResource. */ public static ThreatIntelligenceIndicator get(java.lang.String name, Output id, @Nullable com.pulumi.resources.CustomResourceOptions options) { return new ThreatIntelligenceIndicator(name, id, options); } }




© 2015 - 2025 Weber Informatics LLC | Privacy Policy