com.pulumi.azure.sentinel.kotlin.DataConnectorMicrosoftThreatIntelligenceArgs.kt Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of pulumi-azure-kotlin Show documentation
Show all versions of pulumi-azure-kotlin Show documentation
Build cloud applications and infrastructure by combining the safety and reliability of infrastructure as code with the power of the Kotlin programming language.
@file:Suppress("NAME_SHADOWING", "DEPRECATION")
package com.pulumi.azure.sentinel.kotlin
import com.pulumi.azure.sentinel.DataConnectorMicrosoftThreatIntelligenceArgs.builder
import com.pulumi.core.Output
import com.pulumi.core.Output.of
import com.pulumi.kotlin.ConvertibleToJava
import com.pulumi.kotlin.PulumiTagMarker
import kotlin.Deprecated
import kotlin.String
import kotlin.Suppress
import kotlin.jvm.JvmName
/**
* Manages a Microsoft Threat Intelligence Data Connector.
* ## Example Usage
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as azure from "@pulumi/azure";
* const example = new azure.core.ResourceGroup("example", {
* name: "example-rg",
* location: "east us",
* });
* const exampleAnalyticsWorkspace = new azure.operationalinsights.AnalyticsWorkspace("example", {
* name: "example-workspace",
* location: example.location,
* resourceGroupName: example.name,
* sku: "PerGB2018",
* });
* const exampleLogAnalyticsWorkspaceOnboarding = new azure.sentinel.LogAnalyticsWorkspaceOnboarding("example", {workspaceId: exampleAnalyticsWorkspace.id});
* const exampleDataConnectorMicrosoftThreatIntelligence = new azure.sentinel.DataConnectorMicrosoftThreatIntelligence("example", {
* name: "example-dc-msti",
* logAnalyticsWorkspaceId: exampleLogAnalyticsWorkspaceOnboarding.workspaceId,
* microsoftEmergingThreatFeedLookbackDate: "1970-01-01T00:00:00Z",
* });
* ```
* ```python
* import pulumi
* import pulumi_azure as azure
* example = azure.core.ResourceGroup("example",
* name="example-rg",
* location="east us")
* example_analytics_workspace = azure.operationalinsights.AnalyticsWorkspace("example",
* name="example-workspace",
* location=example.location,
* resource_group_name=example.name,
* sku="PerGB2018")
* example_log_analytics_workspace_onboarding = azure.sentinel.LogAnalyticsWorkspaceOnboarding("example", workspace_id=example_analytics_workspace.id)
* example_data_connector_microsoft_threat_intelligence = azure.sentinel.DataConnectorMicrosoftThreatIntelligence("example",
* name="example-dc-msti",
* log_analytics_workspace_id=example_log_analytics_workspace_onboarding.workspace_id,
* microsoft_emerging_threat_feed_lookback_date="1970-01-01T00:00:00Z")
* ```
* ```csharp
* using System.Collections.Generic;
* using System.Linq;
* using Pulumi;
* using Azure = Pulumi.Azure;
* return await Deployment.RunAsync(() =>
* {
* var example = new Azure.Core.ResourceGroup("example", new()
* {
* Name = "example-rg",
* Location = "east us",
* });
* var exampleAnalyticsWorkspace = new Azure.OperationalInsights.AnalyticsWorkspace("example", new()
* {
* Name = "example-workspace",
* Location = example.Location,
* ResourceGroupName = example.Name,
* Sku = "PerGB2018",
* });
* var exampleLogAnalyticsWorkspaceOnboarding = new Azure.Sentinel.LogAnalyticsWorkspaceOnboarding("example", new()
* {
* WorkspaceId = exampleAnalyticsWorkspace.Id,
* });
* var exampleDataConnectorMicrosoftThreatIntelligence = new Azure.Sentinel.DataConnectorMicrosoftThreatIntelligence("example", new()
* {
* Name = "example-dc-msti",
* LogAnalyticsWorkspaceId = exampleLogAnalyticsWorkspaceOnboarding.WorkspaceId,
* MicrosoftEmergingThreatFeedLookbackDate = "1970-01-01T00:00:00Z",
* });
* });
* ```
* ```go
* package main
* import (
* "github.com/pulumi/pulumi-azure/sdk/v5/go/azure/core"
* "github.com/pulumi/pulumi-azure/sdk/v5/go/azure/operationalinsights"
* "github.com/pulumi/pulumi-azure/sdk/v5/go/azure/sentinel"
* "github.com/pulumi/pulumi/sdk/v3/go/pulumi"
* )
* func main() {
* pulumi.Run(func(ctx *pulumi.Context) error {
* example, err := core.NewResourceGroup(ctx, "example", &core.ResourceGroupArgs{
* Name: pulumi.String("example-rg"),
* Location: pulumi.String("east us"),
* })
* if err != nil {
* return err
* }
* exampleAnalyticsWorkspace, err := operationalinsights.NewAnalyticsWorkspace(ctx, "example", &operationalinsights.AnalyticsWorkspaceArgs{
* Name: pulumi.String("example-workspace"),
* Location: example.Location,
* ResourceGroupName: example.Name,
* Sku: pulumi.String("PerGB2018"),
* })
* if err != nil {
* return err
* }
* exampleLogAnalyticsWorkspaceOnboarding, err := sentinel.NewLogAnalyticsWorkspaceOnboarding(ctx, "example", &sentinel.LogAnalyticsWorkspaceOnboardingArgs{
* WorkspaceId: exampleAnalyticsWorkspace.ID(),
* })
* if err != nil {
* return err
* }
* _, err = sentinel.NewDataConnectorMicrosoftThreatIntelligence(ctx, "example", &sentinel.DataConnectorMicrosoftThreatIntelligenceArgs{
* Name: pulumi.String("example-dc-msti"),
* LogAnalyticsWorkspaceId: exampleLogAnalyticsWorkspaceOnboarding.WorkspaceId,
* MicrosoftEmergingThreatFeedLookbackDate: pulumi.String("1970-01-01T00:00:00Z"),
* })
* if err != nil {
* return err
* }
* return nil
* })
* }
* ```
* ```java
* package generated_program;
* import com.pulumi.Context;
* import com.pulumi.Pulumi;
* import com.pulumi.core.Output;
* import com.pulumi.azure.core.ResourceGroup;
* import com.pulumi.azure.core.ResourceGroupArgs;
* import com.pulumi.azure.operationalinsights.AnalyticsWorkspace;
* import com.pulumi.azure.operationalinsights.AnalyticsWorkspaceArgs;
* import com.pulumi.azure.sentinel.LogAnalyticsWorkspaceOnboarding;
* import com.pulumi.azure.sentinel.LogAnalyticsWorkspaceOnboardingArgs;
* import com.pulumi.azure.sentinel.DataConnectorMicrosoftThreatIntelligence;
* import com.pulumi.azure.sentinel.DataConnectorMicrosoftThreatIntelligenceArgs;
* import java.util.List;
* import java.util.ArrayList;
* import java.util.Map;
* import java.io.File;
* import java.nio.file.Files;
* import java.nio.file.Paths;
* public class App {
* public static void main(String[] args) {
* Pulumi.run(App::stack);
* }
* public static void stack(Context ctx) {
* var example = new ResourceGroup("example", ResourceGroupArgs.builder()
* .name("example-rg")
* .location("east us")
* .build());
* var exampleAnalyticsWorkspace = new AnalyticsWorkspace("exampleAnalyticsWorkspace", AnalyticsWorkspaceArgs.builder()
* .name("example-workspace")
* .location(example.location())
* .resourceGroupName(example.name())
* .sku("PerGB2018")
* .build());
* var exampleLogAnalyticsWorkspaceOnboarding = new LogAnalyticsWorkspaceOnboarding("exampleLogAnalyticsWorkspaceOnboarding", LogAnalyticsWorkspaceOnboardingArgs.builder()
* .workspaceId(exampleAnalyticsWorkspace.id())
* .build());
* var exampleDataConnectorMicrosoftThreatIntelligence = new DataConnectorMicrosoftThreatIntelligence("exampleDataConnectorMicrosoftThreatIntelligence", DataConnectorMicrosoftThreatIntelligenceArgs.builder()
* .name("example-dc-msti")
* .logAnalyticsWorkspaceId(exampleLogAnalyticsWorkspaceOnboarding.workspaceId())
* .microsoftEmergingThreatFeedLookbackDate("1970-01-01T00:00:00Z")
* .build());
* }
* }
* ```
* ```yaml
* resources:
* example:
* type: azure:core:ResourceGroup
* properties:
* name: example-rg
* location: east us
* exampleAnalyticsWorkspace:
* type: azure:operationalinsights:AnalyticsWorkspace
* name: example
* properties:
* name: example-workspace
* location: ${example.location}
* resourceGroupName: ${example.name}
* sku: PerGB2018
* exampleLogAnalyticsWorkspaceOnboarding:
* type: azure:sentinel:LogAnalyticsWorkspaceOnboarding
* name: example
* properties:
* workspaceId: ${exampleAnalyticsWorkspace.id}
* exampleDataConnectorMicrosoftThreatIntelligence:
* type: azure:sentinel:DataConnectorMicrosoftThreatIntelligence
* name: example
* properties:
* name: example-dc-msti
* logAnalyticsWorkspaceId: ${exampleLogAnalyticsWorkspaceOnboarding.workspaceId}
* microsoftEmergingThreatFeedLookbackDate: 1970-01-01T00:00:00Z
* ```
*
* ## Import
* sentinels can be imported using the `resource id`, e.g.
* ```sh
* $ pulumi import azure:sentinel/dataConnectorMicrosoftThreatIntelligence:DataConnectorMicrosoftThreatIntelligence example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.OperationalInsights/workspaces/workspace1/providers/Microsoft.SecurityInsights/dataConnectors/dc1
* ```
* @property bingSafetyPhishingUrlLookbackDate The lookback date for the Bing Safety Phishing Url in RFC3339. Changing this forces a new Data Connector to be created.
* > **Note:** `bing_safety_phishing_url_lookback_date` has been deprecated as the API no longer supports it and will be removed in version 4.0 of the provider.
* @property logAnalyticsWorkspaceId The ID of the Log Analytics Workspace. Changing this forces a new Data Connector to be created.
* @property microsoftEmergingThreatFeedLookbackDate The lookback date for the Microsoft Emerging Threat Feed in RFC3339. Changing this forces a new Data Connector to be created.
* > **Note:** `microsoft_emerging_threat_feed_lookback_date` will be required in version 4.0 of the provider.
* > **NOTE:** At least one of `bing_safety_phishing_url_lookback_date` and `microsoft_emerging_threat_feed_lookback_date` must be specified.
* @property name The name which should be used for this Microsoft Threat Intelligence Data Connector. Changing this forces a new Microsoft Threat Intelligence Data Connector to be created.
* @property tenantId The ID of the tenant that this Microsoft Threat Intelligence Data Connector connects to. Changing this forces a new Microsoft Threat Intelligence Data Connector to be created.
* > **NOTE** Currently, only the same tenant as the running account is allowed. Cross-tenant scenario is not supported yet.
*/
public data class DataConnectorMicrosoftThreatIntelligenceArgs(
@Deprecated(
message = """
This field is deprecated and will be removed in version 4.0 of the AzureRM Provider.
""",
)
public val bingSafetyPhishingUrlLookbackDate: Output? = null,
public val logAnalyticsWorkspaceId: Output? = null,
public val microsoftEmergingThreatFeedLookbackDate: Output? = null,
public val name: Output? = null,
public val tenantId: Output? = null,
) : ConvertibleToJava {
override fun toJava(): com.pulumi.azure.sentinel.DataConnectorMicrosoftThreatIntelligenceArgs =
com.pulumi.azure.sentinel.DataConnectorMicrosoftThreatIntelligenceArgs.builder()
.bingSafetyPhishingUrlLookbackDate(
bingSafetyPhishingUrlLookbackDate?.applyValue({ args0 ->
args0
}),
)
.logAnalyticsWorkspaceId(logAnalyticsWorkspaceId?.applyValue({ args0 -> args0 }))
.microsoftEmergingThreatFeedLookbackDate(
microsoftEmergingThreatFeedLookbackDate?.applyValue({ args0 ->
args0
}),
)
.name(name?.applyValue({ args0 -> args0 }))
.tenantId(tenantId?.applyValue({ args0 -> args0 })).build()
}
/**
* Builder for [DataConnectorMicrosoftThreatIntelligenceArgs].
*/
@PulumiTagMarker
public class DataConnectorMicrosoftThreatIntelligenceArgsBuilder internal constructor() {
private var bingSafetyPhishingUrlLookbackDate: Output? = null
private var logAnalyticsWorkspaceId: Output? = null
private var microsoftEmergingThreatFeedLookbackDate: Output? = null
private var name: Output? = null
private var tenantId: Output? = null
/**
* @param value The lookback date for the Bing Safety Phishing Url in RFC3339. Changing this forces a new Data Connector to be created.
* > **Note:** `bing_safety_phishing_url_lookback_date` has been deprecated as the API no longer supports it and will be removed in version 4.0 of the provider.
*/
@Deprecated(
message = """
This field is deprecated and will be removed in version 4.0 of the AzureRM Provider.
""",
)
@JvmName("gyrwenpwporxwikq")
public suspend fun bingSafetyPhishingUrlLookbackDate(`value`: Output) {
this.bingSafetyPhishingUrlLookbackDate = value
}
/**
* @param value The ID of the Log Analytics Workspace. Changing this forces a new Data Connector to be created.
*/
@JvmName("ueuiaowvyfjmixik")
public suspend fun logAnalyticsWorkspaceId(`value`: Output) {
this.logAnalyticsWorkspaceId = value
}
/**
* @param value The lookback date for the Microsoft Emerging Threat Feed in RFC3339. Changing this forces a new Data Connector to be created.
* > **Note:** `microsoft_emerging_threat_feed_lookback_date` will be required in version 4.0 of the provider.
* > **NOTE:** At least one of `bing_safety_phishing_url_lookback_date` and `microsoft_emerging_threat_feed_lookback_date` must be specified.
*/
@JvmName("oxafhihiqutcpmsr")
public suspend fun microsoftEmergingThreatFeedLookbackDate(`value`: Output) {
this.microsoftEmergingThreatFeedLookbackDate = value
}
/**
* @param value The name which should be used for this Microsoft Threat Intelligence Data Connector. Changing this forces a new Microsoft Threat Intelligence Data Connector to be created.
*/
@JvmName("badtwlupdvubkooh")
public suspend fun name(`value`: Output) {
this.name = value
}
/**
* @param value The ID of the tenant that this Microsoft Threat Intelligence Data Connector connects to. Changing this forces a new Microsoft Threat Intelligence Data Connector to be created.
* > **NOTE** Currently, only the same tenant as the running account is allowed. Cross-tenant scenario is not supported yet.
*/
@JvmName("ixlcvdsxuntqhqau")
public suspend fun tenantId(`value`: Output) {
this.tenantId = value
}
/**
* @param value The lookback date for the Bing Safety Phishing Url in RFC3339. Changing this forces a new Data Connector to be created.
* > **Note:** `bing_safety_phishing_url_lookback_date` has been deprecated as the API no longer supports it and will be removed in version 4.0 of the provider.
*/
@Deprecated(
message = """
This field is deprecated and will be removed in version 4.0 of the AzureRM Provider.
""",
)
@JvmName("drkecbcasqgaommb")
public suspend fun bingSafetyPhishingUrlLookbackDate(`value`: String?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.bingSafetyPhishingUrlLookbackDate = mapped
}
/**
* @param value The ID of the Log Analytics Workspace. Changing this forces a new Data Connector to be created.
*/
@JvmName("qkanmprlhqecpbme")
public suspend fun logAnalyticsWorkspaceId(`value`: String?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.logAnalyticsWorkspaceId = mapped
}
/**
* @param value The lookback date for the Microsoft Emerging Threat Feed in RFC3339. Changing this forces a new Data Connector to be created.
* > **Note:** `microsoft_emerging_threat_feed_lookback_date` will be required in version 4.0 of the provider.
* > **NOTE:** At least one of `bing_safety_phishing_url_lookback_date` and `microsoft_emerging_threat_feed_lookback_date` must be specified.
*/
@JvmName("qinnanxsjeryffuh")
public suspend fun microsoftEmergingThreatFeedLookbackDate(`value`: String?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.microsoftEmergingThreatFeedLookbackDate = mapped
}
/**
* @param value The name which should be used for this Microsoft Threat Intelligence Data Connector. Changing this forces a new Microsoft Threat Intelligence Data Connector to be created.
*/
@JvmName("lnfsrltpbvrsiggu")
public suspend fun name(`value`: String?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.name = mapped
}
/**
* @param value The ID of the tenant that this Microsoft Threat Intelligence Data Connector connects to. Changing this forces a new Microsoft Threat Intelligence Data Connector to be created.
* > **NOTE** Currently, only the same tenant as the running account is allowed. Cross-tenant scenario is not supported yet.
*/
@JvmName("uppkpddrlduapwwi")
public suspend fun tenantId(`value`: String?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.tenantId = mapped
}
internal fun build(): DataConnectorMicrosoftThreatIntelligenceArgs =
DataConnectorMicrosoftThreatIntelligenceArgs(
bingSafetyPhishingUrlLookbackDate = bingSafetyPhishingUrlLookbackDate,
logAnalyticsWorkspaceId = logAnalyticsWorkspaceId,
microsoftEmergingThreatFeedLookbackDate = microsoftEmergingThreatFeedLookbackDate,
name = name,
tenantId = tenantId,
)
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy