All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.pulumi.azure.sentinel.kotlin.DataConnectorMicrosoftThreatIntelligenceArgs.kt Maven / Gradle / Ivy

Go to download

Build cloud applications and infrastructure by combining the safety and reliability of infrastructure as code with the power of the Kotlin programming language.

There is a newer version: 6.14.0.0
Show newest version
@file:Suppress("NAME_SHADOWING", "DEPRECATION")

package com.pulumi.azure.sentinel.kotlin

import com.pulumi.azure.sentinel.DataConnectorMicrosoftThreatIntelligenceArgs.builder
import com.pulumi.core.Output
import com.pulumi.core.Output.of
import com.pulumi.kotlin.ConvertibleToJava
import com.pulumi.kotlin.PulumiTagMarker
import kotlin.Deprecated
import kotlin.String
import kotlin.Suppress
import kotlin.jvm.JvmName

/**
 * Manages a Microsoft Threat Intelligence Data Connector.
 * ## Example Usage
 * 
 * ```typescript
 * import * as pulumi from "@pulumi/pulumi";
 * import * as azure from "@pulumi/azure";
 * const example = new azure.core.ResourceGroup("example", {
 *     name: "example-rg",
 *     location: "east us",
 * });
 * const exampleAnalyticsWorkspace = new azure.operationalinsights.AnalyticsWorkspace("example", {
 *     name: "example-workspace",
 *     location: example.location,
 *     resourceGroupName: example.name,
 *     sku: "PerGB2018",
 * });
 * const exampleLogAnalyticsWorkspaceOnboarding = new azure.sentinel.LogAnalyticsWorkspaceOnboarding("example", {workspaceId: exampleAnalyticsWorkspace.id});
 * const exampleDataConnectorMicrosoftThreatIntelligence = new azure.sentinel.DataConnectorMicrosoftThreatIntelligence("example", {
 *     name: "example-dc-msti",
 *     logAnalyticsWorkspaceId: exampleLogAnalyticsWorkspaceOnboarding.workspaceId,
 *     microsoftEmergingThreatFeedLookbackDate: "1970-01-01T00:00:00Z",
 * });
 * ```
 * ```python
 * import pulumi
 * import pulumi_azure as azure
 * example = azure.core.ResourceGroup("example",
 *     name="example-rg",
 *     location="east us")
 * example_analytics_workspace = azure.operationalinsights.AnalyticsWorkspace("example",
 *     name="example-workspace",
 *     location=example.location,
 *     resource_group_name=example.name,
 *     sku="PerGB2018")
 * example_log_analytics_workspace_onboarding = azure.sentinel.LogAnalyticsWorkspaceOnboarding("example", workspace_id=example_analytics_workspace.id)
 * example_data_connector_microsoft_threat_intelligence = azure.sentinel.DataConnectorMicrosoftThreatIntelligence("example",
 *     name="example-dc-msti",
 *     log_analytics_workspace_id=example_log_analytics_workspace_onboarding.workspace_id,
 *     microsoft_emerging_threat_feed_lookback_date="1970-01-01T00:00:00Z")
 * ```
 * ```csharp
 * using System.Collections.Generic;
 * using System.Linq;
 * using Pulumi;
 * using Azure = Pulumi.Azure;
 * return await Deployment.RunAsync(() =>
 * {
 *     var example = new Azure.Core.ResourceGroup("example", new()
 *     {
 *         Name = "example-rg",
 *         Location = "east us",
 *     });
 *     var exampleAnalyticsWorkspace = new Azure.OperationalInsights.AnalyticsWorkspace("example", new()
 *     {
 *         Name = "example-workspace",
 *         Location = example.Location,
 *         ResourceGroupName = example.Name,
 *         Sku = "PerGB2018",
 *     });
 *     var exampleLogAnalyticsWorkspaceOnboarding = new Azure.Sentinel.LogAnalyticsWorkspaceOnboarding("example", new()
 *     {
 *         WorkspaceId = exampleAnalyticsWorkspace.Id,
 *     });
 *     var exampleDataConnectorMicrosoftThreatIntelligence = new Azure.Sentinel.DataConnectorMicrosoftThreatIntelligence("example", new()
 *     {
 *         Name = "example-dc-msti",
 *         LogAnalyticsWorkspaceId = exampleLogAnalyticsWorkspaceOnboarding.WorkspaceId,
 *         MicrosoftEmergingThreatFeedLookbackDate = "1970-01-01T00:00:00Z",
 *     });
 * });
 * ```
 * ```go
 * package main
 * import (
 * 	"github.com/pulumi/pulumi-azure/sdk/v5/go/azure/core"
 * 	"github.com/pulumi/pulumi-azure/sdk/v5/go/azure/operationalinsights"
 * 	"github.com/pulumi/pulumi-azure/sdk/v5/go/azure/sentinel"
 * 	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
 * )
 * func main() {
 * 	pulumi.Run(func(ctx *pulumi.Context) error {
 * 		example, err := core.NewResourceGroup(ctx, "example", &core.ResourceGroupArgs{
 * 			Name:     pulumi.String("example-rg"),
 * 			Location: pulumi.String("east us"),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		exampleAnalyticsWorkspace, err := operationalinsights.NewAnalyticsWorkspace(ctx, "example", &operationalinsights.AnalyticsWorkspaceArgs{
 * 			Name:              pulumi.String("example-workspace"),
 * 			Location:          example.Location,
 * 			ResourceGroupName: example.Name,
 * 			Sku:               pulumi.String("PerGB2018"),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		exampleLogAnalyticsWorkspaceOnboarding, err := sentinel.NewLogAnalyticsWorkspaceOnboarding(ctx, "example", &sentinel.LogAnalyticsWorkspaceOnboardingArgs{
 * 			WorkspaceId: exampleAnalyticsWorkspace.ID(),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = sentinel.NewDataConnectorMicrosoftThreatIntelligence(ctx, "example", &sentinel.DataConnectorMicrosoftThreatIntelligenceArgs{
 * 			Name:                                    pulumi.String("example-dc-msti"),
 * 			LogAnalyticsWorkspaceId:                 exampleLogAnalyticsWorkspaceOnboarding.WorkspaceId,
 * 			MicrosoftEmergingThreatFeedLookbackDate: pulumi.String("1970-01-01T00:00:00Z"),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		return nil
 * 	})
 * }
 * ```
 * ```java
 * package generated_program;
 * import com.pulumi.Context;
 * import com.pulumi.Pulumi;
 * import com.pulumi.core.Output;
 * import com.pulumi.azure.core.ResourceGroup;
 * import com.pulumi.azure.core.ResourceGroupArgs;
 * import com.pulumi.azure.operationalinsights.AnalyticsWorkspace;
 * import com.pulumi.azure.operationalinsights.AnalyticsWorkspaceArgs;
 * import com.pulumi.azure.sentinel.LogAnalyticsWorkspaceOnboarding;
 * import com.pulumi.azure.sentinel.LogAnalyticsWorkspaceOnboardingArgs;
 * import com.pulumi.azure.sentinel.DataConnectorMicrosoftThreatIntelligence;
 * import com.pulumi.azure.sentinel.DataConnectorMicrosoftThreatIntelligenceArgs;
 * import java.util.List;
 * import java.util.ArrayList;
 * import java.util.Map;
 * import java.io.File;
 * import java.nio.file.Files;
 * import java.nio.file.Paths;
 * public class App {
 *     public static void main(String[] args) {
 *         Pulumi.run(App::stack);
 *     }
 *     public static void stack(Context ctx) {
 *         var example = new ResourceGroup("example", ResourceGroupArgs.builder()
 *             .name("example-rg")
 *             .location("east us")
 *             .build());
 *         var exampleAnalyticsWorkspace = new AnalyticsWorkspace("exampleAnalyticsWorkspace", AnalyticsWorkspaceArgs.builder()
 *             .name("example-workspace")
 *             .location(example.location())
 *             .resourceGroupName(example.name())
 *             .sku("PerGB2018")
 *             .build());
 *         var exampleLogAnalyticsWorkspaceOnboarding = new LogAnalyticsWorkspaceOnboarding("exampleLogAnalyticsWorkspaceOnboarding", LogAnalyticsWorkspaceOnboardingArgs.builder()
 *             .workspaceId(exampleAnalyticsWorkspace.id())
 *             .build());
 *         var exampleDataConnectorMicrosoftThreatIntelligence = new DataConnectorMicrosoftThreatIntelligence("exampleDataConnectorMicrosoftThreatIntelligence", DataConnectorMicrosoftThreatIntelligenceArgs.builder()
 *             .name("example-dc-msti")
 *             .logAnalyticsWorkspaceId(exampleLogAnalyticsWorkspaceOnboarding.workspaceId())
 *             .microsoftEmergingThreatFeedLookbackDate("1970-01-01T00:00:00Z")
 *             .build());
 *     }
 * }
 * ```
 * ```yaml
 * resources:
 *   example:
 *     type: azure:core:ResourceGroup
 *     properties:
 *       name: example-rg
 *       location: east us
 *   exampleAnalyticsWorkspace:
 *     type: azure:operationalinsights:AnalyticsWorkspace
 *     name: example
 *     properties:
 *       name: example-workspace
 *       location: ${example.location}
 *       resourceGroupName: ${example.name}
 *       sku: PerGB2018
 *   exampleLogAnalyticsWorkspaceOnboarding:
 *     type: azure:sentinel:LogAnalyticsWorkspaceOnboarding
 *     name: example
 *     properties:
 *       workspaceId: ${exampleAnalyticsWorkspace.id}
 *   exampleDataConnectorMicrosoftThreatIntelligence:
 *     type: azure:sentinel:DataConnectorMicrosoftThreatIntelligence
 *     name: example
 *     properties:
 *       name: example-dc-msti
 *       logAnalyticsWorkspaceId: ${exampleLogAnalyticsWorkspaceOnboarding.workspaceId}
 *       microsoftEmergingThreatFeedLookbackDate: 1970-01-01T00:00:00Z
 * ```
 * 
 * ## Import
 * sentinels can be imported using the `resource id`, e.g.
 * ```sh
 * $ pulumi import azure:sentinel/dataConnectorMicrosoftThreatIntelligence:DataConnectorMicrosoftThreatIntelligence example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.OperationalInsights/workspaces/workspace1/providers/Microsoft.SecurityInsights/dataConnectors/dc1
 * ```
 * @property bingSafetyPhishingUrlLookbackDate The lookback date for the Bing Safety Phishing Url in RFC3339. Changing this forces a new Data Connector to be created.
 * > **Note:** `bing_safety_phishing_url_lookback_date` has been deprecated as the API no longer supports it and will be removed in version 4.0 of the provider.
 * @property logAnalyticsWorkspaceId The ID of the Log Analytics Workspace. Changing this forces a new Data Connector to be created.
 * @property microsoftEmergingThreatFeedLookbackDate The lookback date for the Microsoft Emerging Threat Feed in RFC3339. Changing this forces a new Data Connector to be created.
 * > **Note:** `microsoft_emerging_threat_feed_lookback_date` will be required in version 4.0 of the provider.
 * > **NOTE:** At least one of `bing_safety_phishing_url_lookback_date` and `microsoft_emerging_threat_feed_lookback_date` must be specified.
 * @property name The name which should be used for this Microsoft Threat Intelligence Data Connector. Changing this forces a new Microsoft Threat Intelligence Data Connector to be created.
 * @property tenantId The ID of the tenant that this Microsoft Threat Intelligence Data Connector connects to. Changing this forces a new Microsoft Threat Intelligence Data Connector to be created.
 * > **NOTE** Currently, only the same tenant as the running account is allowed. Cross-tenant scenario is not supported yet.
 */
public data class DataConnectorMicrosoftThreatIntelligenceArgs(
    @Deprecated(
        message = """
  This field is deprecated and will be removed in version 4.0 of the AzureRM Provider.
  """,
    )
    public val bingSafetyPhishingUrlLookbackDate: Output? = null,
    public val logAnalyticsWorkspaceId: Output? = null,
    public val microsoftEmergingThreatFeedLookbackDate: Output? = null,
    public val name: Output? = null,
    public val tenantId: Output? = null,
) : ConvertibleToJava {
    override fun toJava(): com.pulumi.azure.sentinel.DataConnectorMicrosoftThreatIntelligenceArgs =
        com.pulumi.azure.sentinel.DataConnectorMicrosoftThreatIntelligenceArgs.builder()
            .bingSafetyPhishingUrlLookbackDate(
                bingSafetyPhishingUrlLookbackDate?.applyValue({ args0 ->
                    args0
                }),
            )
            .logAnalyticsWorkspaceId(logAnalyticsWorkspaceId?.applyValue({ args0 -> args0 }))
            .microsoftEmergingThreatFeedLookbackDate(
                microsoftEmergingThreatFeedLookbackDate?.applyValue({ args0 ->
                    args0
                }),
            )
            .name(name?.applyValue({ args0 -> args0 }))
            .tenantId(tenantId?.applyValue({ args0 -> args0 })).build()
}

/**
 * Builder for [DataConnectorMicrosoftThreatIntelligenceArgs].
 */
@PulumiTagMarker
public class DataConnectorMicrosoftThreatIntelligenceArgsBuilder internal constructor() {
    private var bingSafetyPhishingUrlLookbackDate: Output? = null

    private var logAnalyticsWorkspaceId: Output? = null

    private var microsoftEmergingThreatFeedLookbackDate: Output? = null

    private var name: Output? = null

    private var tenantId: Output? = null

    /**
     * @param value The lookback date for the Bing Safety Phishing Url in RFC3339. Changing this forces a new Data Connector to be created.
     * > **Note:** `bing_safety_phishing_url_lookback_date` has been deprecated as the API no longer supports it and will be removed in version 4.0 of the provider.
     */
    @Deprecated(
        message = """
  This field is deprecated and will be removed in version 4.0 of the AzureRM Provider.
  """,
    )
    @JvmName("gyrwenpwporxwikq")
    public suspend fun bingSafetyPhishingUrlLookbackDate(`value`: Output) {
        this.bingSafetyPhishingUrlLookbackDate = value
    }

    /**
     * @param value The ID of the Log Analytics Workspace. Changing this forces a new Data Connector to be created.
     */
    @JvmName("ueuiaowvyfjmixik")
    public suspend fun logAnalyticsWorkspaceId(`value`: Output) {
        this.logAnalyticsWorkspaceId = value
    }

    /**
     * @param value The lookback date for the Microsoft Emerging Threat Feed in RFC3339. Changing this forces a new Data Connector to be created.
     * > **Note:** `microsoft_emerging_threat_feed_lookback_date` will be required in version 4.0 of the provider.
     * > **NOTE:** At least one of `bing_safety_phishing_url_lookback_date` and `microsoft_emerging_threat_feed_lookback_date` must be specified.
     */
    @JvmName("oxafhihiqutcpmsr")
    public suspend fun microsoftEmergingThreatFeedLookbackDate(`value`: Output) {
        this.microsoftEmergingThreatFeedLookbackDate = value
    }

    /**
     * @param value The name which should be used for this Microsoft Threat Intelligence Data Connector. Changing this forces a new Microsoft Threat Intelligence Data Connector to be created.
     */
    @JvmName("badtwlupdvubkooh")
    public suspend fun name(`value`: Output) {
        this.name = value
    }

    /**
     * @param value The ID of the tenant that this Microsoft Threat Intelligence Data Connector connects to. Changing this forces a new Microsoft Threat Intelligence Data Connector to be created.
     * > **NOTE** Currently, only the same tenant as the running account is allowed. Cross-tenant scenario is not supported yet.
     */
    @JvmName("ixlcvdsxuntqhqau")
    public suspend fun tenantId(`value`: Output) {
        this.tenantId = value
    }

    /**
     * @param value The lookback date for the Bing Safety Phishing Url in RFC3339. Changing this forces a new Data Connector to be created.
     * > **Note:** `bing_safety_phishing_url_lookback_date` has been deprecated as the API no longer supports it and will be removed in version 4.0 of the provider.
     */
    @Deprecated(
        message = """
  This field is deprecated and will be removed in version 4.0 of the AzureRM Provider.
  """,
    )
    @JvmName("drkecbcasqgaommb")
    public suspend fun bingSafetyPhishingUrlLookbackDate(`value`: String?) {
        val toBeMapped = value
        val mapped = toBeMapped?.let({ args0 -> of(args0) })
        this.bingSafetyPhishingUrlLookbackDate = mapped
    }

    /**
     * @param value The ID of the Log Analytics Workspace. Changing this forces a new Data Connector to be created.
     */
    @JvmName("qkanmprlhqecpbme")
    public suspend fun logAnalyticsWorkspaceId(`value`: String?) {
        val toBeMapped = value
        val mapped = toBeMapped?.let({ args0 -> of(args0) })
        this.logAnalyticsWorkspaceId = mapped
    }

    /**
     * @param value The lookback date for the Microsoft Emerging Threat Feed in RFC3339. Changing this forces a new Data Connector to be created.
     * > **Note:** `microsoft_emerging_threat_feed_lookback_date` will be required in version 4.0 of the provider.
     * > **NOTE:** At least one of `bing_safety_phishing_url_lookback_date` and `microsoft_emerging_threat_feed_lookback_date` must be specified.
     */
    @JvmName("qinnanxsjeryffuh")
    public suspend fun microsoftEmergingThreatFeedLookbackDate(`value`: String?) {
        val toBeMapped = value
        val mapped = toBeMapped?.let({ args0 -> of(args0) })
        this.microsoftEmergingThreatFeedLookbackDate = mapped
    }

    /**
     * @param value The name which should be used for this Microsoft Threat Intelligence Data Connector. Changing this forces a new Microsoft Threat Intelligence Data Connector to be created.
     */
    @JvmName("lnfsrltpbvrsiggu")
    public suspend fun name(`value`: String?) {
        val toBeMapped = value
        val mapped = toBeMapped?.let({ args0 -> of(args0) })
        this.name = mapped
    }

    /**
     * @param value The ID of the tenant that this Microsoft Threat Intelligence Data Connector connects to. Changing this forces a new Microsoft Threat Intelligence Data Connector to be created.
     * > **NOTE** Currently, only the same tenant as the running account is allowed. Cross-tenant scenario is not supported yet.
     */
    @JvmName("uppkpddrlduapwwi")
    public suspend fun tenantId(`value`: String?) {
        val toBeMapped = value
        val mapped = toBeMapped?.let({ args0 -> of(args0) })
        this.tenantId = mapped
    }

    internal fun build(): DataConnectorMicrosoftThreatIntelligenceArgs =
        DataConnectorMicrosoftThreatIntelligenceArgs(
            bingSafetyPhishingUrlLookbackDate = bingSafetyPhishingUrlLookbackDate,
            logAnalyticsWorkspaceId = logAnalyticsWorkspaceId,
            microsoftEmergingThreatFeedLookbackDate = microsoftEmergingThreatFeedLookbackDate,
            name = name,
            tenantId = tenantId,
        )
}




© 2015 - 2025 Weber Informatics LLC | Privacy Policy